Domain 4 Flashcards
Acknowledgment (ACK)
An acknowledgment of a signal being received.
Address Resolution Protocol (ARP)
Used at the Media Access Control (MAC) layer to provide for direct communication between two devices within the same LAN segment.
Advanced Persistent Threat (APT)
An adversary with sophisticated levels of expertise and significant resources who is able to use multiple different attack vectors (e.g., cyber, physical and deception) to achieve its objectives. Its objectives are typically to establish and extend footholds within the IT infrastructure of organizations in order to continually exfiltrate information and/or to undermine or impede critical aspects of a mission, program or organization, or place itself in a position to do so in the future. Moreover, the APT pursues its objectives repeatedly over an extended period of time, adapting to a defender’s efforts to resist it, and with determination to maintain the level of interaction needed to execute its objectives.
Application Programming Interface (API)
Mobile code mechanisms that provide ways for applications to share data, methods or functions over a network. Usually implemented either in XML or JavaScript Object Notation (JSON). A reference to a software access point or library function with a well- defined syntax and well-defined functionality.
Bandwidth
The amount of information transmitted over a period of time. A process consisting of learning or education could necessitate higher bandwidth than a quick status update, which would require a lower bandwidth.
Bit
Most essential representation of data (zero or one) at layer 1 of the OSI 7-Layer Model.
Bluetooth (Wireless Personal Area Network IEEE 802.15)
Bluetooth wireless technology is an open standard for short-range RF communication used primarily to establish wireless personal area networks (WPANs). It has been integrated into many types of business and consumer devices.
Bound Network(s)
Network in which devices are connected at layer 1 by means of physical cables, wires or fiber. Often referred to as wired networks, Ethernet networks or by wiring or cable standard used, (e.g., fiber network, Cat 5 or Cat 6 network). See also Unbound (wireless) Network(s).
Boundary Routers
Primarily advertise routes that external hosts can use to reach internal ones.
Bridges
A device that creates a single aggregate network from separate network segments. Using the OSI model, this device aggregates networks at layer 2.
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
A method of flow control in a network. To prevent more than one station from accessing the network simultaneously, the sending station announces its intent to send, and other stations wait until the sending station announces its completion.
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
A method of flow control in a network. If more than one station accesses the network simultaneously, the other stations detect the event and subsequently attempt retransmission.
Cellular Network
A radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station.
Circuit-Switched Network
A network that establishes a dedicated circuit between endpoints.
Code-Division Multiple Access (CDMA)
Every call’s data is encoded with a unique key, then the calls are all transmitted at once.
Concentrators
Multiplex connected devices into one signal to be transmitted on a network.
Content Distribution Network (CDN)
A large, distributed system of servers deployed in multiple data centers, which moves content to achieve QoS and availability requirements.
Control Plane
Control of network functionality and programmability is directly made to devices at this layer. OpenFlow was the original framework/protocol specified to interface with devices through southbound interfaces.
Converged Protocols
A protocol that combines (or converges) standard protocols (such as TCP/IP) with proprietary or other non-standard protocols. These can sometimes provide greatly enhanced functionality and security to meet the needs of specific situations or industries. Adopting them can also complicate enterprise-wide security engineering efforts by requiring additional specialist knowledge and skills to manage and secure.
Domain Name Service (DNS)
This acronym can be applied to three interrelated elements: a service, a physical server and a network protocol.
Driver (Device Driver)
Software layer that provides an interface for accessing the functions of hardware devices. Typically used by the OS.
Dynamic Host Configuration Protocol (DHCP)
An industry standard protocol used to dynamically assign IP addresses to network devices.
Dynamic or Private Ports
Ports 49152-65535. Whenever a service is requested that is associated with well- known or registered ports, those services will respond with a dynamic port.
East-West Data Flow (or Traffic)
Network data traffic that flows laterally across a set of internal systems, networks or subnetworks within an IT architecture. These can be flows within a data center or between geographically disperse locations. Contrast with north-south data flows, in which northbound data is leaving the Within SDNs, east-west data flow is within a data plane, control plane or application plane. North-south data flows, in SDN terms, is data flowing up and down the stack of data/ control/application planes. organization and southbound is entering it.
Fiber Distributed Data Interface (FDDI)
A LAN standard, defined by ANSI X3T9.5, specifying a 100Mbps token- passing network using fiber-optic cable, with transmission distances of up to two kilometers.
Fibre Channel over Ethernet (FCoE)
A lightweight encapsulation protocol that lacks the reliable data transport of the TCP layer.
File Transfer Protocol (FTP)
The internet protocol (and program) used to transfer files between hosts.
Firewalls
Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules.
Firmware
Computer programs and data stored in hardware typically in read-only memory (ROM) or programmable read-only memory (PROM)—such that the programs and data cannot be dynamically written or modified during execution of the programs.
Frame
Data represented at layer 2 of the OSI 7-Layer Model.
Gateway Device
A firewall or other device sitting at the edge of a network to regulate traffic and enforce rules.
Hypertext Transfer Protocol (HTTP)
A communication protocol used to connect to servers on the World Wide Web. Its primary function is to establish a connection with a web server and transmit HTML pages to the client browser. The protocol used to transport hypertext files across the internet.
Internet Control Message Protocol (ICMP)
An IP network protocol standardized by the IETF through RFC 792 to determine if a particular service or host is available.
Internet Group Management Protocol (IGMP)
Used to manage multicasting groups that are a set of hosts anywhere on a network that are listening for a transmission.