Network Services 2.4 Flashcards
Can be configured to allow the clients on the network to access the network and be able to read and write to its disk
Server
Another server that could be a physical workstation or network infrastructure that provides printing functionality
Print Server
Relies on the NetBIOS protocol or SMB
Windows-based file and printer server
Ports 137, 139
Used for file or printer sharing in a Windows network
Network Basic Input/ Output System (NetBIOS)
Port 445
Used for Windows file and printer sharing services
Sever Message Block (SMB)
Provides the ability for a Linux or Unix server to be able to host files or printers that can then be used by Windows clients running the SMB protocol
Samba
Ports 20, 21
Provides insecure file transfers
File Transfer Protocol (FTP)
Allows for printing anywhere in the world
IP- based File and Printer Server / Cloud Printing
Any server that provides access to a website
Web Servers
Extensible web server software, created by Microsoft
Internet Information Services (IIS)
Most popular way to run a web server these days
Apache
Reverse proxy, load balancer, mail proxy, and HTTP cache
NGINX
Combines the fully qualified domain name with a protocol at the beginning
Uniform Resource Locator (URL)
Severs that are set up to compose a message and send it to another user
Email Server
Specifies how emails should be delivered from one mail domain to another
Operates over port 25
Simple Mail Transfer Protocol (SMTP)
Older email protocol which operates over port 110
Post Office Protocol 3 (POP3)
Mailbox server environment designed for Windows based domain environments
Microsoft Exchange
Mail retrieval protocol
port 143 and can connect to a server and receive and read messages
Internet Message Access Protocol (IMAP)
Standardized framework used for port-based authentication on wired and wireless networks
802.1x
occurs when a person’s identity is established with proof and is confirmed by the system
Authentication
A database used to centralized info about clients and objects on the network
Lightweight Directory Access Protocol (LDAP)
Used to organize and manage the network, including clients, servers, devices, users, and groups
Active Directory (AD)
Provides centralized administration of dial up, VPN, and wireless authentication services for 802.1x and the EAP
Remote Authentication Dial In User Service (RADIUS)
Propreitary version of RADIUS that can perform the role of an authenticator in 802.1x networks
Terminal Access Controller Access-Control System Plus (TACACS+)
Occurs when a user is given access to a certain piece of data or certain areas of a building
Authorization
Ensures the tracking of data, computer usage, and network resources is maintained
Accounting
Authentication protocol used by Windows to provide for two way (mutual) authentication using a system of tickets
Kerberos
Occurs when you have proof that someone has taken an action
Non-repudiation
Sends text based commands to remote devices and is a very old networking protocol
should never be used to connect to secure devices
Telnet Port 23
Encrypts everything that is being send and received between the client and the server
Secure Shell (SSH) Port 22
Provides graphical interface to connect to another computer over a network connection
Remote Desktop Protocol (RDP) Port 3389
Creates a secure connection to tunnel into the RDP
Remote desktop gateway (RDG)
Designed for thin client architectures
Virtual Network Computing (VNC) port 5900
Any kind of software that replicates the TTI I/O functionality to remotely connect to a device
Terminal Emulator (TTY)
Enables different appliances and software applications to transmit logs to a centralized server
Syslog
TCP/ IP protocol that aids in monitoring network-attached devices and computers
Simple Network Management Protocol (SNMP)
Computers and other network-attached devices monitored through the use of agents by a network management system
Agents
Software running on one or more servers to control the monitoring of network-attached devices and computers
Network Management System (NMS)
Devices that creates network connection between and end user’s client machine and a remote resource (web server)
Proxy Server
Distributes incoming requests across a number of servers inside a server farm or a cloud infrastructure
Load Balancer/ Content Switch
Involves continual flooding of victim systems with requests for services, causing the system to crash (single attacker)
Denial of Service (DoS)
Multiple machines simultaneously launch attacks on the server to force it offline (multiple attackers)
Distributed Denial of Service (DDoS)
Identifies any attacking IP addresses and routes their traffic through a Knoll interface
Blackholing/ Sinkholing
works for smallscale attacks against Dos
Intrusion Prevention System (IPS)
Allows to scale up the demand as needed
Elastic Cloud
Provides the ability to conduct security functions within a single device or network appliance
Unified Threat Management (UTM)
Rule set placed on the firewalls, routers, and other network devices that permit or allow traffic through a particular interfacae
Access Control List (ASL)
Inspects and controls that traffic that is trying to enter or leave a network’s boundary
Firewall
Provides the mechanisms for workflow and process automation by controlling machinery using embedded devices
Industrial Control System (ICS)
Includes computers, servers, networks, and cloud platforms
Information Technology (IT)
Communications network designed to implement an ICS
Operational Technology (OT)
Digital serial data communication protocol used in OT networks to link different PLCs
Fieldbus
Can be a local control panel or software that runs on a computer
Human Machine Interface (HMI)
Type of ICS used to manage large scale multi-site devices and equipment in a geographic region from a host computer
Supervisory Control and Data Acquisition (SCADA)
Computer system that is designed to perform specific and dedicated functions
Embedded Systems
Type of digital computer used in industrial or outdoor settings
Programmable Logic Controller (PLC)
Type of OS that prioritizes deterministic execution of operations that ensure consistent response for time critical tasks
Real Time Operating System (RTOS)
Processor integrates the platform functionality of multiple logical controllers onto a single chip
System on a chip
Computer system that is no longer supported by its vendor and no longer provided with security updates and patches
Legacy system
System that is owned by its developer or vendor
Proprietary System