Domain 4.2: Communication and Network Security Flashcards
Understand key network and communication security terms, protocols, and architectures.
Define:
Private Branch Exchange
(PBX)
A telephone network within an organization that allows internal and external communication.
A private telephone network used within an organization that allows users to communicate internally and externally. Modern PBX systems can integrate with VoIP and provide advanced features like call forwarding, voicemail, and conference calling.
Or visit this Wikipedia page.
Define:
Private IP Addresses
Non-publicly routable IP addresses used within private networks for device identification.
IP addresses that are not publicly routable and are used within a private network. It is used in local area networks (LANs) and virtual private networks (VPNs) to identify and communicate with devices within the network. Examples include the IP address ranges reserved for private use, such as 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.
For more information, view this lecture on IP addresses, MAC addresses, and port numbers- Part 3.. Or visit this Wikipedia page.
Define:
Private Key
A secret cryptographic key used in asymmetric encryption for decrypting data or creating digital signatures.
A cryptographic key that is kept secret and used for encrypting and decrypting data. It is used in asymmetric cryptography, where the public key is used for encryption, and the private key is used for decryption. Examples include private keys used for secure communication and authentication in protocols such as SSL/TLS and SSH.
For more information, view this lecture on Asymmetric encryption- Part 1.. Or visit this Wikipedia page.
Define:
Proactive Network Management
The practice of monitoring and addressing network issues before they impact operations.
Proactive Network Management involves continuously monitoring network performance and health to detect potential issues early. By analyzing network data, setting alerts, and performing regular maintenance, administrators can resolve problems before they escalate into major outages or service degradations. This approach minimizes downtime, ensures optimal performance, and supports a resilient, secure network infrastructure.
For more information, view this lecture on Network Performance and Traffic Management.
Define:
Promiscuous Mode
A network mode allowing a device to intercept all traffic, used for monitoring or eavesdropping.
A networking mode in which a device can receive all incoming traffic, regardless of whether it is addressed to it or not. It is used in security assessments to capture network traffic for analysis. Examples include promiscuous mode on network switches, promiscuous mode on network analyzers, and promiscuous mode on virtual machines.
For more information, view this lecture on IP addresses, MAC addresses, and port numbers- Part 2.. Or visit this Wikipedia page.
Define:
Protected Extensible Authentication Protocol
(PEAP)
A protocol enhancing wireless network security by using an encrypted TLS tunnel.
Protected Extensible Authentication Protocol (PEAP) is an authentication protocol that encapsulates Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel. It is used to enhance the security of wireless networks and VPNs by ensuring that client credentials are transmitted securely over potentially vulnerable or untrusted networks.
For more information, view this lecture on Network authentication protocols.. Or visit this Wikipedia page.
Define:
Protocol
A set of rules governing data exchange between devices, enabling communication over a network.
A set of rules and standards that govern the communication between two or more devices or systems. This is commonly used in networking and communication systems to ensure that different devices and systems can communicate with each other in a consistent and reliable manner. Examples include TCP/IP and HTTP.
For more information, view this lecture on Networking basics and definitions.. Or visit this Wikipedia page.
Define:
Protocol Converter
A device or software that allows data exchange between systems using different protocols.
A device or software that converts data from one protocol to another, allowing different devices and systems to communicate with each other. This is commonly used in networking and communication systems to enable compatibility between different protocols. Examples include modems and gateways.
Define:
Protocol Stack
A set of network protocols that work together to enable communication over a network.
A layered set of protocols that are used to implement a particular networking or communication system. This is commonly used in networking and communication systems to provide a complete and consistent set of protocols for a particular application. Examples include the OSI model and the TCP/IP stack.
Or visit this Wikipedia page.
Define:
Proxy
(and Proxy Server)
A server that intermediates requests between clients and other servers, often for security or anonymity.
A system that acts as an intermediary between a client and a server, often used to mask the client’s identity, implement access policies, cache content, and improve performance. Proxies can function at various levels of the network protocol stack and are widely used to enhance security, privacy, and control over internet traffic.
For more information, view this lecture on Firewalls Part 1. Or visit this Wikipedia page.
Define:
Public IP
An IP address that is accessible over the Internet for global communication.
A Public IP is an Internet-routable address assigned to a network device to enable connectivity with systems worldwide. It uniquely identifies a device or network on the Internet, allowing it to interact with external hosts. Public IP addresses are essential for hosting services, remote access, and ensuring that resources are available to users across the globe while necessitating robust security measures to mitigate exposure risks.
For more information, view this lecture on IP addresses, MAC addresses, and port numbers- Part 3.. Or visit this Wikipedia page.
Define:
Public Switched Telephone Network
(PSTN)
The global network of telephone lines, cellular networks, and satellites that support voice and data transmission.
A network of telephone lines, switches, and other equipment that is used to transmit voice and data over long distances. It is used in traditional telephone systems and internet telephony. Examples include landlines and cellular networks.
For more information, view this lecture on Secure Communications - Part 1. Or visit this Wikipedia page.
Define:
PVC
(Permanent Virtual Circuit)
A permanently established virtual connection that provides a constant communication pathway.
A Permanent Virtual Circuit (PVC) is a fixed network connection established in technologies like ATM or frame relay, providing a dedicated channel for data transmission. PVCs remain active continuously, ensuring a consistent and reliable link for communication. This stability benefits environments requiring predictable performance, though it offers less flexibility compared to on-demand circuit configurations.
For more information, view this lecture on WAN protocols.. Or visit this Wikipedia page.
Define:
Quality of Service
(QoS)
The overall performance of a network or internet service, ensuring efficient and reliable data transmission.
The performance level of a network or internet connection that determines the speed and reliability of data transmission. It is used in networking and telecommunications to ensure that data is transmitted smoothly and efficiently. Examples include prioritizing certain types of data traffic, such as video streaming or voice calls, and implementing bandwidth allocation mechanisms to prevent network congestion.
For more information, view this lecture on Networking basics and definitions.. Or visit this Wikipedia page.
Define:
Queue
A data structure that serves and retrieves data in a first-come-first-served basis, maintaining order in data processing.
A data structure that allows for the storage and retrieval of items in a specific order. It is used in the field of computer science to manage the flow of data and ensure efficient processing. Examples include the use of queues in operating systems to manage the execution of tasks, the use of queues in networks to manage the flow of packets, and the use of queues in databases to manage the flow of queries.
Or visit this Wikipedia page.
Define:
Registered Ports
Ports ranging from 1024 to 49151, designated for specific services and applications by the Internet Assigned Numbers Authority (IANA).
The range of port numbers that are reserved for well-known services, such as HTTP (port 80) and HTTPS (port 443). They are used in networking to identify the type of service running on a particular port. Examples include port 25 for SMTP, port 53 for DNS, and port 3389 for RDP.
For more information, view this lecture on IP addresses, MAC addresses, and port numbers- Part 1.. Or visit this Wikipedia page.
Define:
Remote Access
The ability to access and use a computer or network from a remote location, via technologies such as VPNs or remote desktop software.
The capability of accessing a computer or a network from a distant location. This can be achieved through various technologies like Virtual Private Networks (VPN), remote desktop software, or other secure access tools. Remote access enables users to access files, data, and applications on the remote system as if they were physically present at that location, providing flexibility and enabling collaboration.
For more information, view this lecture on Networking basics and definitions.. Or visit this Wikipedia page.
Define:
Remote Authentication Dial-In User Service
(RADIUS)
A protocol that provides centralized authentication and authorization for users connecting to a network.
A networking protocol that provides centralized authentication, authorization, and account management for users who connect and use a network service. With RADIUS, rather than managing user authentication at each network access server, it’s managed from a central server. This enhances security and simplifies administration as changes like adding a user or modifying a password only need to be made one time at the central server.
For more information, view this lecture on Authentication protocols - Part 1. Or visit this Wikipedia page.
Define:
Remote Browser Isolation
(RBI)
RBI isolates web browsing activities away from user devices, typically on a cloud or remote server, preventing malicious code from ever reaching endpoints.
By rendering webpages in a secure container, RBI sends only sanitized visuals or interactive streams back to the user. Even if a site contains exploits or drive-by downloads, they remain within the isolation environment. This dramatically reduces risk from malicious links and email attachments. RBI is especially beneficial for high-risk browsing or privileges. Implementation can integrate with corporate gateways, reducing endpoint exposures and optimizing threat containment.
Or visit this Wikipedia page.
Define:
Remote Desktop Protocol
(RDP)
A protocol developed by Microsoft that provides a user with a graphical interface to connect to another computer over a network connection.
A protocol used to remotely connect and control a computer or network. It is commonly used for remote access to work on computers or remote administration of networks. Examples include accessing a work computer from home, remotely troubleshooting a network issue, or remotely managing servers in a data center.
For more information, view this lecture on IP addresses, MAC addresses, and port numbers- Part 1.. Or visit this Wikipedia page.
Define:
Remote Job Entry
(RJE)
An older technology allowing jobs to be submitted to a remote mainframe or batch server for processing.
Traditionally used in mainframe and batch processing environments, RJE allows users to submit jobs to remote systems for execution. Although less common today due to advancements in computing, the concept lives on in distributed computing and cloud services.
Or visit this Wikipedia page.
Define:
Remote Procedure Call
(RPC)
A protocol enabling a program to request services from software on another computer within a network.
A protocol that one program can use to request a service from a program located on another computer on a network. RPC uses the client-server model, where the requesting program is a client, and the service-providing program is the server. It allows inter-process communication and is designed to streamline the development of network-based applications.
Or visit this Wikipedia page.
Define:
Repeaters
Devices that receive and amplify signals in a network to extend communication distances and improve signal quality.
A network device used to regenerate or replicate a signal. Repeaters are used in communication networks to extend the reach of a signal, overcome attenuation, or improve signal quality. They operate at the physical layer of the OSI model, receiving a signal, regenerating it, and then retransmitting it, thereby extending the physical limits or range of coverage of a network.
For more information, view this lecture on Layer 1 to 3 networking devices.. Or visit this Wikipedia page.