Domain 4: Communication and Network Security Flashcards
Understand key network and communication security terms, protocols, and architectures.
Define:
10Base2
An Ethernet network standard also known as thin Ethernet or thinnet, with 10 Mbps data transfer rate, baseband signals, and supports cable lengths up to 185 meters using thin coaxial cables.
A specific type of Ethernet network standard characterized by a maximum data transfer rate of 10 Mbps, baseband transmission, and a maximum cable segment length of 185 meters. This standard, also known as thin Ethernet or thinnet, uses a thinner and more flexible coaxial cable, allowing for easier installation and management in environments such as office buildings.
For more information, view this lecture on Cable types.. Or visit this Wikipedia page.
Define:
10Base5
Also called thick Ethernet, this standard supports 10 Mbps speed over baseband transmission, using thick coaxial cables with a maximum reach of 500 meters.
A specification for thick Ethernet, a networking standard that also operates at a data transfer rate of 10 Mbps but uses thicker, more rigid coaxial cables that can transmit data over a maximum distance of 500 meters. The name ‘10Base5’ is derived from its 10 Mbps speed, baseband transmission, and 500-meter cable limit. Due to its ability to handle greater distances, it’s often used in larger, more sprawling network setups.
For more information, view this lecture on Cable types.. Or visit this Wikipedia page.
Define:
10BaseT
A form of Ethernet that uses twisted pair cabling to achieve 10 Mbps speed with baseband transmission, suited for star network configurations in small local networks.
An Ethernet standard that operates at 10 Mbps and uses baseband transmission over twisted pair cabling. The ‘T’ in 10BaseT stands for ‘Twisted pair,’ indicating the type of cabling used. It is designed for small, local networks and supports star network configurations, which centralize network control and allow easier detection of connection issues.
For more information, view this lecture on Cable types.. Or visit this Wikipedia page.
Define:
3-Legged DMZ
A network layout that includes three distinct zones: the untrusted Internet, a demilitarized zone (DMZ) for public-facing services, and a trusted internal network for additional security.
A network design strategy that uses three security zones - the Internet (untrusted), an intermediary area known as the Demilitarized Zone (DMZ), and the internal network (trusted). The DMZ hosts public-facing services, acting as a buffer between the Internet and the internal network. This model adds an extra layer of protection by ensuring direct traffic between the Internet and the trusted network is minimized and strictly controlled.
For more information, view this lecture on Firewalls Part 2. Or visit this Wikipedia page.
Define:
3-Way Handshake
The process used in TCP/IP networks to establish a connection between a client and server, involving sequential SYN, SYN-ACK, and ACK packets for reliable communication initiation.
A three-step process used in network communications to establish a connection between a client and a server in TCP/IP protocol. The handshake begins when the client sends a SYN (synchronize) packet to the server to request a connection. The server then responds with a SYN-ACK (synchronize-acknowledge) packet to acknowledge the request. Finally, the client sends an ACK (acknowledge) packet back to the server to confirm. Once this process is completed, the TCP connection is established, allowing for data transmission to take place. This handshake is essential for initiating a reliable session between two devices over a network.
For more information, view this lecture on MAC, HMAC, SSL, and TLS. Or visit this Wikipedia page.
Define:
Access Point
(AP)
A device that connects wireless devices to a wired network, enabling communication and access to network resources, such as routers and wireless hotspots.
A device that connects wireless devices to a wired network, allowing them to communicate and access resources on the network. It is used in wireless networks to provide connectivity and access to network resources. Examples of access points include routers and wireless hotspots.
For more information, view this lecture on WiFi - Part 1. Or visit this Wikipedia page.
Define:
Acknowledgment
(ACK)
A communication signal confirming successful data reception, used to maintain the reliability of communication systems.
A signal sent between devices during a communication process to confirm that data has been successfully received. Typically, an ACK is sent from the receiver back to the sender after a packet of data has been received. The use of acknowledgments helps to ensure the reliability of communication systems, as it allows for error detection and prompts retransmission of data if an ACK is not received within a certain time frame.
For more information, view this lecture on MAC, HMAC, SSL, and TLS. Or visit this Wikipedia page.
Define:
Ad Hoc Mode
A wireless network configuration where devices connect directly to each other without a central access point, used for temporary network setups like peer-to-peer file sharing.
A wireless network mode where devices connect directly to each other without the use of a central access point. It is used in situations where a temporary network is needed, such as a group of friends sharing files at a party. Examples include Wi-Fi Direct, Bluetooth, and peer-to-peer networking.
For more information, view this lecture on WiFi - Part 2. Or visit this Wikipedia page.
Define:
Address Resolution Protocol
(ARP)
A networking protocol used to map a network IP address to its corresponding physical MAC address, facilitating device communication on a local network.
a networking protocol that maps a network’s logical IP address to its physical MAC address. It is used to enable communication between devices on a network. Examples include ARP requests, and ARP replies in the process of resolving an IP address to a MAC address.
For more information, view this lecture on IP support protocols - Part 1. Or visit this Wikipedia page.
Define:
Address Space
The range of memory addresses that can be used by a system or network, ensuring unique addressing for devices to communicate on a network.
The range of addresses that can be assigned to devices on a network. Address space refers to the range of IP addresses that can be assigned to devices on a network, including both IPv4 and IPv6 addresses. This is used in networking to ensure that each device on the network has a unique address and can communicate with other devices. It is used to identify and locate devices on a network.
For more information, view this lecture on IP addresses, MAC addresses, and port numbers- Part 1. Or visit this Wikipedia page.
Define:
Address Space Layout Randomization
(ASLR)
A security technique that randomly arranges key data areas of a program in memory, making it more difficult for attackers to predict and exploit memory addresses.
A security technique that randomly arranges the positions of key data areas of a program—including the base of the executable and position of libraries, heap, and stack—in a process’s address space. By doing so, it makes it harder for an attacker to predict target addresses, thus mitigating the risk of exploitation techniques such as buffer overflow attacks. ASLR is widely used in modern operating systems to enhance their security posture.
For more information, view this lecture on Hardware architecture- Part 2. Or visit this Wikipedia page.
Define:
Addressing
The process of assigning a unique identifier, such as an IP address, to network devices to enable communication and data packet routing.
In the context of computer networks, addressing refers to the assignment of a unique identifier to each device or destination on the network. This identifier, also known as an IP address, allows devices to communicate with each other and route data packets to their intended destination. Examples of addressing include the use of IP addresses in the Internet Protocol (IP) to identify computers on the Internet and the use of MAC addresses in local area networks (LANs) to identify individual network devices.
For more information, view this lecture on IP addresses, MAC addresses, and port numbers- Part 1..
Define:
Alternative Routing
A network management method where traffic is redirected via a different path in case of primary route failure, congestion, or maintenance, ensuring continuous service.
A method used in telecommunications and network management where traffic is directed over a different path or route than the primary one in case of failure, congestion, or maintenance. Alternative routing aims to ensure that there is no interruption in service by having backup paths available. In sophisticated networks, routing protocols can automatically detect outages or suboptimal performance and switch to alternate routes in real time, maintaining consistent data flow and service availability. This concept is integral to network resilience and business continuity planning.
For more information, view this lecture on The OSI model- Part 1..
Define:
Amplifiers
Devices that increase the signal strength in communication systems, used to enhance signal clarity and reach for both audio and radio transmissions.
Devices or systems that increase the strength or magnitude of a signal, such as an audio or radio signal. It is used in communication systems to boost the signal and improve its clarity and reach. Examples of amplifiers include audio amplifiers in speakers and microphones and radio frequency amplifiers in wireless transmitters and receivers.
For more information, view this lecture on Cable types.. Or visit this Wikipedia page.
Define:
Analog
A method of signal transmission that varies continuously in response to changes in sound or light, used in traditional telephony and various audio systems, as opposed to digital signals.
In telecommunications, analog refers to the transmission of voice, video, or data through continuous signals that vary in frequency or amplitude in response to changes in sound or light. Traditional landline telephones, for instance, convert voice sounds into electrical signals that mimic the sound waves. These analog signals can be transmitted over copper wires and are subject to degradation from noise and distance, contrasting with digital signals, which can be more easily cleaned and amplified. While much of modern telecommunications has shifted toward digital technologies for their efficiency and fidelity, analog technology is still in use in various capacities, such as radio broadcasting and certain audio systems.
For more information, view this lecture on Networking basics and definitions.. Or visit this Wikipedia page.
Define:
Anycast
A network addressing method where multiple servers share the same IP address, distributing traffic to improve performance and enhance redundancy.
A networking technique that allows multiple servers to share the same IP address, with the objective of distributing network traffic and improving availability and performance. When a user makes a request to an anycast IP address, the network routes the request to the nearest or best-performing server based on factors like geographic proximity, latency, and server load. This technique is widely used in content delivery networks (CDNs) and domain name system (DNS) services to ensure fast response times and resilience against outages or attacks.
Or visit this Wikipedia page.
Define:
API Security
API Security focuses on safeguarding APIs from unauthorized access, data breaches, and exploitation. API Gateway Security provides central control and policy enforcement for managing traffic, authentication, threat detection.
API Security includes designing, implementing, and monitoring protective measures that prevent malicious activities and data leakage through APIs. It involves secure authentication, authorization, rate limiting, and data validation. An API Gateway acts as a single entry point for requests, enforcing policies, routing traffic, and blocking suspicious behavior. Centralizing these functions simplifies management and ensures consistent protection across multiple services. Effective API Security enhances reliability, preserves trust, and minimizes the risk of critical data exposure or unauthorized transactions.
Or visit this Wikipedia page.
Define:
Application Layer
The 7th layer in the OSI model, interfacing directly with end-user applications, responsible for high-level protocols such as HTTP, FTP, and SMTP, and managing network communications.
In the Open Systems Interconnection (OSI) model, the application layer is the 7th layer, which interfaces directly with end-user software applications to manage network communications. It is responsible for high-level protocols such as HTTP for web browsing, FTP for file transfers, and SMTP for email. In the simpler TCP/IP model, the application layer is often conceptualized as layer 4, which encompasses the functionalities of the OSI’s application, presentation, and session layers. This topmost layer in the TCP/IP model enables user applications to interact with the network stack, ensuring that data is properly packaged for communication and interpreted upon receipt.
For more information, view this lecture on The OSI model- Part 2.. Or visit this Wikipedia page.
Define:
Application-Level Gateway Firewall
A type of firewall that operates at the application layer of the network, inspecting the content of data packets to detect and filter out malicious traffic for improved security.
A type of firewall that operates at the application layer of a network’s protocol stack. It filters incoming traffic to certain network services like FTP and Telnet servers and can inspect the actual content of the data packets, not just the source, destination, and port. This allows for a more thorough examination of the packet payload to detect malicious code or protocols, offering a higher level of security compared to other types of firewalls.
For more information, view this lecture on Firewalls Part 1. Or visit this Wikipedia page.
Define:
ARCNET
(Attached Resource Computer Network)
An early LAN technology known for simplicity and reliable deterministic performance.
ARCNET is one of the first local area network (LAN) technologies that provided a simple and robust network communication method. Known for its predictable performance and ease of installation, ARCNET was widely adopted in early computer networks. Although newer technologies have supplanted it, ARCNET’s fundamental principles influenced modern networking standards and provided a foundation for deterministic network design.
For more information, view this lecture on LAN topologies.. Or visit this Wikipedia page.
Define:
Area Border Router
(ABR)
A router connecting different OSPF areas within a network, facilitating communication between them and identified by a unique Autonomous System Number (ASN).
A router that connects different OSPF (Open Shortest Path First) areas within a network. It is used to connect different OSPF areas and allow for communication between them. Examples include routers in a large enterprise network or a service provider network.
For more information, view this lecture on WAN protocols.. Or visit this Wikipedia page.
Define:
ARP Spoofing/Poisoning
A type of cyberattack where false ARP messages are sent to a network, misleading devices to send data to an incorrect MAC address for intercepting traffic.
A cyber-attack where a malicious actor sends fake ARP (Address Resolution Protocol) messages to a network, tricking other devices into sending data to the wrong MAC (Media Access Control) address. It is used to intercept and modify network traffic, steal sensitive information, or launch further attacks. Examples include redirecting traffic to a fake website, intercepting login credentials, or injecting malware into downloads.
For more information, view this lecture on IP support protocols - Part 1.. Or visit this Wikipedia page.
Define:
ARP Table
A table in each networked device that maps IP addresses to MAC addresses, essential for local network communication and routing.
The ARP Table, or Address Resolution Protocol Table, is a table stored in each device on a network, which maps IP addresses to MAC addresses. This table is essential for local network communication because while IP addresses are used for routing data over the network, MAC addresses are used for direct device-to-device communication within the network.
For more information, view this lecture on IP support protocols - Part 1.. Or visit this Wikipedia page.
Define:
ARPANET
(Advanced Research Projects Agency Network)
The pioneering packet-switching network that laid the foundation for the modern Internet.
Developed in the late 1960s, ARPANET was the first operational packet-switching network that connected research institutions across the United States. It introduced innovative concepts in data communication, setting the stage for the development of the modern Internet. ARPANET’s architecture and protocols have had a lasting impact on subsequent network designs and global digital communications.
For more information, view this lecture on IP addresses, MAC addresses, and port numbers- Part 1.. Or visit this Wikipedia page.