Summary Questions, Chapters 40-42 Flashcards
Firewall
Hardware or software protecting against unauthorised access to a network
What are the two ways of creating a firewall?
- packet filtering
* stateful inspection
What is packet filtering?
A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules.
What is stateful inspection?
A technique for examining the contents of packets on a network and rejecting them if they do not form part of a recognised communication.
Why does routing through a proxy server increase security?
There is no direct connection between the computer on the LAN and the internet, so all requests are passed through the proxy server.
What is symmetric encryption?
Where the sender and receiver both use the same key to encrypt and decrypt data.
What is key exchange?
When the sender sends the encryption key to the receiver
What is asymmetric encryption?
When a public and private key are used to encrypt and decrypt data.
What is a private key?
A code used to encrypt and decrypt data that is only known by one user, but is mathematically linked to a corresponding public key.
What is a public key?
A code used to encrypt and decrypt data that can be made public and is linked to a corresponding private key.
What is a digital certificate?
A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a Certification Authority.
What is a Certification Authority?
A trusted organisation that provides digital certificates and signatures.
What is a digital signature?
A method of ensuring that an encrypted message is from a trusted source as the have a unique, encrypted signature, verified by a Certification Authority.
What is a Trojan?
Malware that is hidden within another file on your computer.
What is a virus?
A generic term for malware where the program attaches itself to another file in order to infect a computer.
What is a worm?
Malware or type of virus that replicates itself and spreads around a computer system, but does not need to be attached to a file in order to infect a computer.
List ways of reducing the risk of a virus entering your network.
- firewall
- keep OS up to date
- encrypt data files
- ensure requests are coming from recognised sources
- keep anti-virus software up to date
Which type of encryption is more secure?
Asymmetric
What is TCP/IP?
A set of protocols for all TCP/IP network transmissions.
What are the four layers of TCP/IP?
Application, Transport, Internet, Link
What is the purpose of the Application Layer?
Handles Domain Name System and some protocols.
What is the purpose of the Transport Layer?
Ensures all packets have arrived and that there are no errors in them.
What is the purpose of the Internet Layer?
Defines IP addresses of devices that send and receive data, creates and routes packets
What is the purpose of the Link Layer?
Controls physical characteristics, provides synchronisation of devices, identifies network topology being used
What is a port?
An addressable location on a network that links to a process or application.
What is HTTP?
A protocol for transmitting and displaying web pages.