Network Protocols & Security - 1.3.2 Flashcards
What is a network protocol?
Set of rules of how devices communicate and how data is transmitted across a network
What is a MAC address (5)?
Assigned to all network enabled devices by the manufacturer
Unique to the device
Cannot be change
48-64 bits long
Mainly used by Ethernet protocol on LAN’s so switches can read them and direct data to the right device
What is an IP address (3)?
Internet protocol - well-known set of rules and instructions
Used when sending data between networks
Unique addresses across the internet assigned manually or automatically to a device
What are the 2 versions of IP addresses?
IPv4 - uses 32 bits, split into 8 bit chunks and each one is a denary number e.g. 37.153.62.136
IPv6 - uses 128 bit, was created due to the increasing number of devices that needed unique IP addresses
What does the TCP/IP do (3)?
Dictates how data is sent between networks
Made up of two protocols:
Transmission Control Protocol - rules for how devices connect on the internet, splits data into packets
Internet Protocol - directs packets to their destination
What are the 6 other protocols and their function?
HTTP (hyper text transfer protocol) - transfers webpages from server to client
HTTPS (HTTP secure) - more secure HTTP, uses encryption
FTP (file transfer protocol) - access, edit, move files between devices on a network
POP3 (post office protocol) - retrieves emails from servers, original is deleted
IMAP (internet message access protocol) - retrieves emails, original is not deleted
SMTP (simple mail transfer protocol) - sending emails, transfer from one server to another
What is a layer (2)?
A group of protocols with similar functions
Each layer serves the layer above
What are the 4 layers of the TCP stack?
Application
Transport
Network
Data
What happens in the application layer and with which protocols?
User sends an email or opens a webpage - FTP, POP3, IMAP, SMTP, HTTPS, HTTP
What happens in the transport layer and with which protocol?
The email or webpage is split into packets by the OS - TCP
What happens in the network layer and with which protocol?
A sender and recipient address is put on the packets - IPv4 or IPv6
What happens in the data layer and with which protocol?
Each packet makes its way through the network - Ethernet protocol
What is malware (2)?
Malicious software
Installed on someone’s device without their knowledge or consent
Actions of malware (4)?
Deleting or modifying files
Scareware
Locking files
Spyware
Types of malware (3):
Viruses - attach to certain files, spread when copied, activate by opening
Worms - like viruses but self-replicate, spread very quickly
Trojans - malware disguised as legitimate software, users install them accidentally