Network Security Flashcards
CC Domain 4
security appliance
general term used to describe a network device that performs some kind of security function
Endpoint
general term used to describe a computing device on a network (such as a laptop, desktop, mobile device, smartphone, tablet, or even a server).
Internet of Things (IoT)
general term that is loosely used to describe devices that historically did not connect to the Internet (or a network) that now have network connectivity.
Application (Layer 7)
consists of protocols used by computer applications to perform certain functions (such as a web browser using the HTTP protocol to access a website).
Presentation (Layer 6)
responsible for translating data from something the user expects to something the network expects (and vice versa) so that it may be transferred over a network.
Session (Layer 5)
responsible for setting up, controlling, and tearing down the connection between applications communicating between two different computers
Transport (Layer 4)
handles end-to-end transport services and the establishment of logical connections between two computers (e.g., a clientserver connection).
Network (Layer 3)
responsible for the routing and route selection for network packets based on logical IP addresses.
Data Link (Layer 2)
responsible for transmitting and delivery of frames throughout a LAN based on the unique physical MAC addresses of the devices on the network.
Physical (Layer 1)
with how bits (binary 1’s and 0’s) are transmitted and received
(TCP/IP) model
The Application Layer of the TCP/IP model
provides various services, processes, and protocols that run on a network and are used by user applications (such as a web browser).
Application, Presentation and Session osi model
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
protocols are often lumped together in conversation since the SSL protocol was the predecessor to TLS; however, they are different protocols
Host-to-Host Layer of the TCP/IP model
sometimes also called the Transport Layer since it loosely maps to the Transport Layer of the OSI model.