Networks and Network Security Flashcards
Active packet sniffing
an attack where data packets are manipulated in transit
Address Resolution Protocol (ARP
Use to determine the MAC address of the next router or device to traverse
Bandwidth
The maximum data transmission capacity over a network, measured by bits per second
Baseline configuration
A documented set of specifications within a system that is used as a basis for future builds, releases, and updates
Bluetooth
Used for wireless communication with nearby physical devices
Botnet
A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot herder”
Cloud-based firewalls
Software firewalls that are hosted by the cloud service provider
Cloud computing
The practice of using remote servers, application, and network services that are hosted on the internet instead of on local physical devices
Cloud network
A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet
Controlled zone
A subnet that protects the internal network from the uncontrolled zone
Data packet
A basic unit of information that travels from one device to another within a network
Denial of service (DoS) attack
An attack that targets a network or server and floods it with network traffic
Domain Name System (DNS)
A networking protocol that translates internet domain names into IP addresses
Encapsulation
A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets
File Transfer Protocol (FTP)
Used to transfer files from one device to another over a network
Firewall
A network security device that monitors traffic to or from your network
Forward proxy server
A server that regulates and restricts a person’s access to the internet
Hardware
The physical components of a computer
Hub
A network device that broadcasts information to every device on the network
Hypertext Transfer Protocol (HTTP)
An application layer protocol that provides a method of communication between clients and website servers
Hypertext Transfer Protocol Secure (HTTPS)
A network protocol that provides a secure method of communication between clients and servers
Identity and access management (IAM)
A collection of processes and technologies that helps organizations manage digital identities in their environment
IEEE 802.11 (Wi-Fi)
A set of standards that define communication for wireless LANs
Internet Control Message Protocol (ICMP)
An internet protocol used by devices to tell each other about data transmission errors across the network
Internet Control Message Protocol (ICMP) flood
A type of DoS attack performed by an attacker repeatedly sending ICMP request packets to a network server
Internet Protocol (IP)
A set of standards used for routing and addressing data packets as they travel between devices on a network
Internet Protocol (IP) address
A unique string of characters that identifies the location of a device on the internet
IP spoofing
A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network