Study Deck Flashcards
Human Rights 1998
Act to give effect to the rights and freedom guaranteed under the European Convention of Human Rights
Data Protection 1998
Act to provide the regulations of the processing of information related to individuals.
Police and Justice Act 2006
Act to establish a national policing improvement agency
Computer Misuse Act 1990
Act to secure computer material against unauthorised material. Criminalises the act of accessing or modifying data stored on a computer system without permision
Well-known ports
0-1023
Registered ports
1024-49,151
Dynamic and private ports
49,152-65,535
ICMP
Internet Control Message Protocol
ICMP type 0
Echo Reply
ICMP type 3 (code 0-3)
Destination Unreachable Code 0 - Network Unreachable Code 1 - Host Unreachable Code 2 - Protocol Unreachable Code 3 - Port Unreachable
ICMP type 5
Redirect
ICMP type 8
Echo Request
ICMP type 11
Time Exceeded
ICMP type 12
Parameter Problem
Traceroute
Tracks utility tracks the route that packets have taken from a network on their way to a host
OSI
Open System Interconnection
OSI Layer 7
Application - Human computer interactions - HTTP, FTP, SMTP, IMAP
OSI Layer 6
Presentation - ensures data is in a usable format and is where data encryptions occurs - Proxies, Firewalls, encryption compressions and character sets.
OSI Layer 5
Session - Maintains connections and is responsible for controlling ports and sessions - Firewalls
OSI Layer 4
Transport - transmits data using transmission protocols such as TCP and UDP
OSI Layer 3
Network - decides which physical path the data will take
OSI Layer 2
Data Link - defines the format of data on the network - WAN, LAN protocols
OSI Layer 1
Physical - transmits raw bit stream over physical medium
Ingress Filtering
Concept of fire-walling traffic that enter the network from external sources such as the internet