Network Security Flashcards
A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or web tool.
Application programming interface (API)
The most essential representation of data (zero or one) at Layer 1 of the Open Systems Interconnection (OSI) model.
Bit
This transmission is a one-to-many (one-to-everyone) form of sending internet traffic.
Broadcast
The byte is a unit of digital information that most commonly consists of eight bits.
Byte
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. NIST 800-145
Cloud computing
A system in which the cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy and compliance considerations). It may be owned, managed and operated by one or more of the organizations in the community, a third party or some combination of them, and it may exist on or off premises. NIST 800-145
Community cloud
The opposite process of encapsulation, in which bundles of data are unpacked or revealed.
De-encapsulation
The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.) Source: NIST SP 800-27 Rev A
Denial-of-Service (DoS)
This acronym that resolves hostnames to ip address can be applied to three interrelated elements: a service, a physical server and a network protocol.
Domain Name Service (DNS)
Enforcement of data hiding and code hiding during all phases of software development and operational use. Bundling together data and methods is the process of encapsulation; its opposite process may be called unpacking, revealing, or using other terms. Also used to refer to taking any set of data and packaging it or hiding it in another data structure, as is common in network protocols and encryption.
Encapsulation
The process and act of converting the message from its plaintext to ciphertext. Sometimes it is also referred to as enciphering. The two terms are sometimes used interchangeably in literature and have similar meanings.
Encryption
The internet protocol (and program) used to transfer files between hosts.
File Transfer Protocol (FTP)
An attacker fragments traffic in such a way that a system is unable to put data packets back together.
Fragment attack
The physical parts of a computer and related devices.
Hardware
A combination of public cloud storage and private cloud storage where some critical data resides in the enterprise’s private cloud while other data is stored and accessible from a public cloud storage provider.
Hybrid cloud
The provider of the core computing, storage and network hardware and software that is the foundation upon which organizations can build and then deploy applications. IaaS is popular in the data center where software and servers are purchased as a fully outsourced service and usually billed on usage and how much of the resource is used.
Infrastructure as a Service (IaaS)
An IP network protocol standardized by the Internet Engineering Task Force (IETF) through RFC 792 to determine if a particular service or host is available.
Internet Control Message Protocol (ICMP)
Standard protocol for transmission of data from source to destinations in packet-switched communications networks and interconnected systems of such networks. CNSSI 4009-2015
Internet Protocol (IPv4)
An attack where the adversary positions himself in between the user and the system so that he can intercept and alter data traveling between them. Source: NISTIR 7711
Man-in-the-Middle
Part of a zero-trust strategy that breaks LANs into very small, highly localized zones using firewalls or similar technologies. At the limit, this places firewall at every connection point.
Microsegmentation
Purposely sending a network packet that is larger than expected or larger than can be handled by the receiving system, causing the receiving system to fail unexpectedly.
Oversized Packet Attack
Representation of data at Layer 3 of the Open Systems Interconnection (OSI) model.
Packet
The primary action of a malicious code attack.
Payload
An information security standard that applies to merchants and service providers who process credit or debit card transactions.
Payment Card Industry Data Security Standard (PCI DSS)