Communications and Network Security (CNS) Flashcards
Access point
the connection between a wireless and wired network
Access server
Provides dial-in and dial-out connections to the network
Ad hoc Mode
Directly connect two+ clients, no access point Infrastructure Mode – connects endpoints to a central network, not directly to each other, need access point and wireless clients for IM mode wireless
Address Resolution Protocol
Used to match an IP address to a hardware MAC address. ARP sends out broadcast to a network node to reply with its hardware address. It stores the address in a dynamic table for the duration of the session, so ARP requests are only sent the first time
Addressing
IP uses the destination IP to transmit packets thru networks until delivered
ADSL
Asymmetric. More downstream bandwidth up to 18,000 feet over single copper cable pair
Analog signal
Infinite wave form, continuous signal, varied by amplification
Asynchronous communications, broadband connections, and half‐duplex links can be digital or analog.
Application
Layer 4 network
Application OSI
Provides an interface for which applications and end users can utilize networked resources.
Examples: FTP, Telnet
Application level firewall
Second generation: AKA proxy server While transferring data stream to another network, it masks the data origin. operating at Application layer of OSI
Application Proxy firewall
Layer 7: actually 3 through 7, which look at content and can involve authentication and encryption, can be more flexible and secure but also tend to be far slower.
ARCnet
Uses token passing in a star technology on coax
Asymmetric multiproccessing
AMP: used in applications that are dedicated, such as embedded systems, when individual processors can be dedicated to specific tasks at design time
Asynchronous
Sends bits of data sequentially. Same speed on both sides. Modems and dial-up remote access systems
Asynchronous Transfer Mode
ATM: very high bandwidth. It uses 53-byte fixed size cells instead of frames like Ethernet. It can allocate bandwidth up on demand making it a solution for Busty applications. Requires fiber optics
Attenuation
A decrease in amplitude as a signal propagates along a transmission medium
Access port
logical or physical identifier that a computer uses to distinguish different terminal input/output data streams
Active attack
attack on the authentication protocol where the attacker transmits data to the claimant or verifier. Examples of active attacks include a man-in-the-middle, impersonation, and session hijacking.
Active wiretapping
illegal attaching of an unauthorized device for the purpose of obtaining access to data
Bluejacking
When attackers send unsolicited messages via Bluetooth
Bluesnarfing
Targets the data or information on Bluetooth-enabled devices
Bootstrap Protocol
When wireless workstation is on-lined it sends out a BootP request with its MAC address to get an IP address and the file from which it should boot. Replaced by DHCP
Bridge
a layer 2 device that used to connect two network segments and regulate traffic
Bridges
Forwards data to all other network segments if it’s not on the local segment. Operates at level 2 (thus no IP-addressing)