Network Protocols & Security - 1.3.2 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is a network protocol?

A

Set of rules of how devices communicate and how data is transmitted across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a MAC address (5)?

A

Assigned to all network enabled devices by the manufacturer
Unique to the device
Cannot be change
48-64 bits long
Mainly used by Ethernet protocol on LAN’s so switches can read them and direct data to the right device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an IP address (3)?

A

Internet protocol - well-known set of rules and instructions
Used when sending data between networks
Unique addresses across the internet assigned manually or automatically to a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 2 versions of IP addresses?

A

IPv4 - uses 32 bits, split into 8 bit chunks and each one is a denary number e.g. 37.153.62.136
IPv6 - uses 128 bit, was created due to the increasing number of devices that needed unique IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the TCP/IP do (3)?

A

Dictates how data is sent between networks
Made up of two protocols:
Transmission Control Protocol - rules for how devices connect on the internet, splits data into packets
Internet Protocol - directs packets to their destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 6 other protocols and their function?

A

HTTP (hyper text transfer protocol) - transfers webpages from server to client
HTTPS (HTTP secure) - more secure HTTP, uses encryption
FTP (file transfer protocol) - access, edit, move files between devices on a network
POP3 (post office protocol) - retrieves emails from servers, original is deleted
IMAP (internet message access protocol) - retrieves emails, original is not deleted
SMTP (simple mail transfer protocol) - sending emails, transfer from one server to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a layer (2)?

A

A group of protocols with similar functions
Each layer serves the layer above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 4 layers of the TCP stack?

A

Application
Transport
Network
Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens in the application layer and with which protocols?

A

User sends an email or opens a webpage - FTP, POP3, IMAP, SMTP, HTTPS, HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What happens in the transport layer and with which protocol?

A

The email or webpage is split into packets by the OS - TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens in the network layer and with which protocol?

A

A sender and recipient address is put on the packets - IPv4 or IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What happens in the data layer and with which protocol?

A

Each packet makes its way through the network - Ethernet protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is malware (2)?

A

Malicious software
Installed on someone’s device without their knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Actions of malware (4)?

A

Deleting or modifying files
Scareware
Locking files
Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of malware (3):

A

Viruses - attach to certain files, spread when copied, activate by opening
Worms - like viruses but self-replicate, spread very quickly
Trojans - malware disguised as legitimate software, users install them accidentally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is social engineering?

A

Way of gaining sensitive information or illegal access to networks by influencing people

17
Q

Types of social engineering (2):

A

Calling employees, pretending to be someone from the company
Phishing - send emails or texts claiming their from well-known businesses, request user to update personal information

18
Q

What is SQL (2)?

A

Structured query language
Deals with databases
SELECT … FROM … WHERE …

19
Q

What is an SQL injection?

A

Pieces of SQL typed into a website’s input box which can then reveal sensitive information

20
Q

How to stop security attacks (6)?

A

Penetration testing - an organisation employ specialist to stimulate attacks on their network to identify possible weaknesses
Physical security - protects the physical parts of a network (fire, flooding, theft), could be locks, cameras
Passwords - prevent unauthorised users from accessing a network
User access levels - controls which part of the network different groups of users can access
Anti-malware - designed to stop malware from damaging a network, e.g. firewalls which examine all data entering and leaving a network
Encryption - data is altered with a specific code so if intercepted can be read but not understood