Domain 4: Communication and Network Security Flashcards
Acknowledgment (ACK)
An acknowledgment of a signal being received.
Address Resolution Protocol (ARP)
Used at the Media Access Control (MAC) layer to provide for direct communication between two devices within the same LAN segment.
Advanced Persistent Threat (APT)
An adversary with sophisticated levels of expertise and significant resources who is able to use multiple different attack vectors (e.g., cyber, physical, and deception) to achieve its objectives. These are typically to establish and extend footholds within the organization’s IT infrastructure to continually exfiltrate information; undermine or impede critical aspects of a mission, program, or organization; or place itself in a position to do so in the future. Moreover, the APT pursues its objectives repeatedly over an extended period, adapting to a defender’s efforts to resist it, and with determination to maintain the level of interaction needed to execute its objectives.
Application Programming Interface (API) Object Notation (JSON).
- Mobile code mechanisms that provide ways for applications to share data, methods, or functions over a network. Usually implemented either in XML or JavaScript 2. A reference to a software access point or library function with a well-defined syntax and welldefined functionality.
Bandwidth
The amount of information transmitted over time. A process consisting of learning or education could necessitate higher bandwidth than a quick status update, which would require a lower bandwidth.
Bit
Most essential representation of data (zero or one) at Layer 1 of the OSI 7-Layer Model.
Bluetooth (Wireless Personal Area Network IEEE 802.15)
Bluetooth wireless technology is an open standard for short-range RF communication used primarily to establish wireless personal area networks (WPANs). It has been integrated into many types of business and consumer devices.
Bound Network
Network in which devices are connected at Layer 1 by means of physical cables, wires or fiber. Often referred to as wired networks or Ethernet networks or by wiring or cable standard used, (e.g., fiber network, Cat 5, or Cat 6 network). See also Unbound (wireless) Network(s).
physically bound
Boundary Routers
Primarily advertise routes that external hosts can use to reach internal ones.
Bridges
A device that creates a single aggregate network from separate network segments. Using the OSI model, this device aggregates networks at Layer 2.
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
A method of flow control in a network. To prevent more than one station from accessing the network simultaneously, the sending station announces its intent to send, and other stations wait until the sending station announces its completion.
Cellular Network
A radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station.
Circuit-Switched Network
A network that establishes a dedicated circuit between endpoints.
Code-Division Multiple Access (CDMA)
Every call’s data is encoded with a unique key, then the calls are all transmitted at once.
Concentrators
Multiplex connected devices into one signal to be transmitted on a network.
Content Distribution Network (CDN)
A large, distributed system of servers deployed in multiple data centers, which moves content to achieve QoS and availability requirements.
Control Plane
Control of network functionality and programmability is directly made to devices at this layer. OpenFlow was the original framework/protocol specified to interface with devices through southbound interfaces.
Converged Protocols
A protocol that combines or converges standard protocols such as TCP/IP with proprietary or other nonstandard protocols. These can sometimes provide greatly enhanced functionality and security to meet the needs of specific situations or industries. Adopting them can also complicate enterprise-wide security engineering efforts by requiring additional specialist knowledge and skills to manage and secure.
Domain Name Service (DNS)
This acronym can be applied to three interrelated elements: a service, a physical server, and a network protocol.
Translates friendly-names into IP addresses that can then be routed using Address resolution protocol.
Driver (Device Driver)
Software layer that provides an interface for accessing the functions of hardware devices. Typically used by the OS.
Dynamic Host Configuration Protocol (DHCP)
An industry standard protocol used to dynamically assign IP addresses to network devices.
Dynamic or Private Ports
Ports 49152– 65535. Whenever a service is requested that is associated with well-known or registered ports, those services will respond with a dynamic port.
East-West Data Flow (or Traffic)
Network data traffic that flows laterally across a set of internal systems, networks, or subnetworks within an IT architecture. These can flow within a data center or between geographically dispersed locations. Contrast with north-south data flows, in which northbound data is leaving the organization and southbound data is entering it.
Fiber Distributed Data Interface (FDDI)
A LAN standard, defined by ANSI X3T9.5, specifying a 100 Mbps token-passing network using fiber-optic cable, with transmission distances of up to two kilometers.