Domain 4 Flashcards
Network Security
API
Application Programming Interface. Set of routines, standards protocols, & tools for building software applications to access web-based software applications/web tools
Bit
most essential representation of data (zero or one) at Layer 1 of the Open Systems Interconnection (OSI) model
Broadcast
transmission is a one-to-many (one-to-everyone) form of sending internet traffic
Byte
unit of digital information that most commonly consists of eight bits
Cloud Computing
model for enabling ubiquitous, convenient, on-demand network access to a shared pool of computing resources (networks, servers, etc)
Community Cloud
system which cloud infrastructure is for exclusive use for specific group of consumers with shared concerns. Owned/Managed/Operated by 1+ organizations, third party, or combination on/off premises
De-encapsulation
opposite process of encapsulation, bundles of data are unpacked/revealed
DoS
Denial-of-Service. Prevention of authorized access to resources or delaying of time-critical operations
DNS
Domain Name Service. Service, physical server, & network protocol
Encapsulation
bundling together data & methods. Taking any set of data & packaging it/hiding it in another data structure
Encryption
process & act of converting the message from its plaintext to ciphertext. “Enciphering”
File Transfer Protocol
internet protocol/program used to transfer files between hosts
Fragment Attack
attacker fragments traffic in a way where the system is unable to put packets back together
Hardware
physical parts of computer & related devices
Hybrid Cloud
combination of public cloud storage & private where critical data is in private & other data is public
IaaS
Infrastructure as a Service. Provider of core computing, storage, & network hardware/software as foundation for organizations can build/deploy applications. Popular in data centers, purchased as outsourced service billed on usage
ICMP
Internet Control Message Protocol. IP network protocol standardized by IETF (Internet Engineering Task Force) through RFC 792 to determine if a particular service/host is available
IPv4
Internet Protocol. Standard for transmission of data from source to destinations in packet-switched communications networks & interconnected systems
Man-in-the-Middle
attack where threat positions itself between user & system to intercept/alter data traveling between
Microsegmentation
part of zero-trust strategy that breaks LANs into small, localized zones using firewalls or similar technology. Places firewall at every connection point (ideal)
Oversized Packets Attack
purposely sending network packet larger than expected/can be handled, causing receiving system to fail unexpectedly
Packet
Representation of data at Layer 3 of the Open Systems Interconnection (OSI) model
Payload
primary action of malicious code attack
PCI DSS
Payment Card Industry Data Security Standard. IS Standard administered by PCI SSC (council) that applies to merchants/service providers who process card transactions