Communications & Network Security Flashcards
Serve as a gateway between a trusted & untrusted network that gives limited, authorized access to untrusted hosts.
Bastion Hosts
Interconnect devices within a relatively small area that is generally within a person’s reach.
Wireless Personal Area Networks (WPA)
A type of wireless network that connects several wireless LAN’s.
Wireless Metropolitan Area Network
A wireless network made up of radio nodes organized in a mesh topology.
Wireless Mesh Network
Links two or more devices over a short distance using a wireless distribution method, usually providing a connection through an access point for internet access.
Wireless Local Area Network
A technology that allows you to make voice calls using a broadband internet connection instead of a regular (or analog) phone line.
Voice over Internet Protocol
An encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network.
Virtual Private Network (VPN)
Provides a lightweight service for connectionless data transfer without error detection & correction
User Datagram Protocol (UDP)
Provides connection-oriented data management & reliable data transfer
Transmission Control Protocol (TCP)
A diagnostic tool that displays the path a packet traverses between a source & destination host
Traceroute
Layering model structured into four layers (link, network, transport, application)
TCP/IP Model
A method commonly used to modulate information into manageable bits that are sent over the air wirelessly
Spread Spectrum
Sublayer that provides application specific services (protocols)
Specific Application Service Element
The first line of protection between trusted & untrusted networks
Security Perimeter
A program which can extract data from output on a display intended for a human
Screen Scraper
Represent the ability to allow for the executing of objects across hosts
Remote Procedure Calls (RPC)
Authentication protocol used mainly in networked environments, such as ISPs, or for similar services requiring single sign-on for layer 3 network access, for scalable authentication combined with an acceptable degree of security.
Remote Authenication Dial-in User Services (RADIUS)
Involves a pair of keys a public key & a private key-associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data
Public Key Encryption
A basic network mapping technique that helps narrow the scope of an attack
Ping Scanning
Layering model structured into seven layers (physical, data link, network, transport, session, presentation, application)
OSI Model
Allow users remote access to a network via analog phone lines
Modems
A client/server-based directory query protocol loosely based upon X.500 commonly used for managing user information.
Lightweight Directory Access Protocol (LDAP)
Provides a means to send error message for non-transient error conditions & provides a way to probe the network in order to determine general characteristics about the network
Internet Control Message Protocol (ICMP/Ping)
Wireless technology that spreads its signal over rapidly changing frequencies
Frequency Hopping Spread Spectrum (FHSS)
Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules
Firewalls
Stateful protocol that requires two communication channels
File Transfer Protocol (FTP)
A lightweight encapsulation protocol & lacks the reliable data transport of the TCP layer
Fiber Channel over Ethernet (FCoE)
Process of transforming encrypted data back into its original form, so it can be understood.
Decryption
Wireless technology that spreads a transmission over a much larger frequency band & with corresponding smaller amplitude
Direct Sequence Spread Spectrum (DSSS)
Multiplex connected device into one signal to be transmitted on a network
Concentrators
Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses.
Bridges