terms Flashcards

1
Q

is the transfer of information from one point to another; consist of message, sender, medium, receiver

A

Data communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

information that has been processed and organized, it can be alphabetical, numeric, or symbolic information

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

single transmission line; one bit is transmitted at one time; long distance communications; (serial-by-bit transmission)

A

Serial Data Transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

transfer data on a parallel link, a separate line is used as a clock signal; data transmission speed is high

A

Parallel Data Transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

involves only two locations or stations.

A

Two-point configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

involves three or more stations or terminals.

A

Multipoint configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is when signals travel in one direction only.

A

Simplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is when signals travel in both directions, but one at a time

A

Half duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a two-way communications and signals travel in both directions simultaneously.

A

Full duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

corrupted data during transmission.

A

Error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

only one bit is going to be changed.

A

Bit error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a change in two or more bits.

A

Multiple Bit error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

change in more than 1 consecutive bits.

A

Burst error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the process of monitoring the received data and determining when a transmission error occurred.

A

Error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

also known as parity check; it can detect single bit error.

A

VRC (VERTICAL REDUNDANCY CHECK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

also called as the two-dimensional parity; the parity bit is appended to every data block whereas in LRC, a block data bit is organized in rows and columns.

A

LRC (LONGITUDINAL REDUNDANCY CHECK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

it can detect all errors involving an odd number of bits; it can detect errors involving an even number of bits.

A

CHECKSUM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

perform binary division operation.

A

CRC (CYCLIC REDUNDANCY CHECK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

detects and corrects transmission errors at the receive end without calling for retransmission; bits are added to message prior to transmission.

A

Forward Error Correction (FEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

dependent on the number of bits in the data character.

A

HAMMING CODE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

metallic circuit formed by two conductors insulated from each other; it uses one line for transmission of electric waves in both directions.

A

Two - Wire Circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

two-way circuit using two paths so arranged that communication currents are transmitted in one direction only on one path, and in the opposite direction on the other path.

A

Four - Wire Circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Computer, Network Printers, VoIP Phones, Telepresence endpoint, Security Cameras, Mobile handled phones

A

END NODE DEVICES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

switches, wireless access point, routers, security devices (Firewall), bridges, hubs, repeaters, cell tower

A

INTERMEDIARY NODES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
ethernet, fiber optic cable, coaxial cable, USB cable
Wired Media
26
infrared, radio, microwaves, satellite
Wireless Media
27
email, storage services, file sharing, instant messaging, online game, voice over IP, video telephony, world wide web
Services
28
physical layout of nodes on a network
Physical topology
29
consists of a single cable-called a backbone-connecting all nodes on a network without intervening connectivity devices
Bus topology
30
each node is connected to the two nearest nodes so the entire network forms a circle; one method for passing data on ring networks is token passing
Ring topology
31
every node on the network is connected through a central device called hub or switch.
Star topology
32
each computer connects to every other; high level of redundancy.
Mesh Topology
33
is a combination of Bus and Star topology.
Tree topology
34
it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data.
Network security
35
protect the data that has been transmitted.
Confidentiality
36
ensuring that information cannot be modified without detection
Integrity
37
ensuring information can be accessed when needed
Availability
38
potential for violation of security; action or event that could breach security and cause harm.
Threat
39
an assault on system security that derives from an intelligent threat.
Attack
40
action that compromises the security
Security attack
41
detect, prevent, or recover from a security attack.
Security mechanism
42
enhance the security, counter security attacks and provide the service.
Security service
43
attempts to learn or make use of information from the system
PASSIVE ATTACK
44
going to understand or know what is the data that is being transmitted between the sender and the receiver
Release of message contents
45
going to observe the pattern of messages from sender and the receiver.
Traffic analysis
46
involve some modification of the data stream or the creation of a false stream.
ACTIVE ATTACK
47
is an attack that uses a fake identity
Masquerade
48
detects a data transmission and fraudulently has it delayed or repeated.
Replay
49
attack on the integrity of the original data.
Modification of messages
50
attack meant to shut down a machine or network, making it inaccessible to its intended users.
Denial of Service
51
to give a specific kind of protection to system resources; implement security policies by security mechanisms.
SECURITY SERVICES
52
assurance that the communicating entity is the one that it claims to be.
Authentication
53
provided for use at the establishment of, or at times during the data transfer phase of, a connection.
Peer Entity Authentication
54
is a property that a message has not been modified while in transit.
Data Origin Authentication
55
dictates who's allowed to access; is a security measure which is put in place to regulate the individuals that can view, use, or have access to a restricted environment.
Access Control
56
deals with protecting against the disclosure of information by ensuring that the data is limited to those authorized.
Data Confidentiality
57
refers to the accuracy and consistency of data stored in a database.
Data Integrity
58
refers to the assurance that the owner of a signature key pair cannot convincingly deny having signed the data.
Non-Repudiation
59
deals with hiding and covering of data which helps data to become confidential.
Encipherment
60
cryptographic value that is calculated from the data and a secret key known only by the signer.
Digital signature
61
intended to ensure the identity of an entity by means of information exchange.
Authentication exchange
62
produces cipher text output continuously, even in the absence of the plain text.
Traffic padding
63
means selecting and continuously changing different available routes between sender and receiver.
Routing control
64
involves use of trusted third party in communication.
Notarization
65
is perceived to be correct with respect to some criteria
Trusted functionality
66
the marking bound to a resource that names or designates the security attributes of that resource.
Security label
67
detection of security-relevant events.
Event detection
68
data collected and potentially used to facilitate a security audit.
Security audit trail
69
deals with requests from mechanism, such as event handling and takes recovery actions.
Security recovery
70
is the science of secret, or hidden writing.
Cryptography
71
practice of hiding messages
Encryption
72
is a method for encrypting messages.
Cipher
73
the key for encryption and decryptions are the same.
Symmetric Algorithms
74
encrypt data one block at a time (typically 64 bits, or 128 bits); used for a single message.
Block Ciphers
75
encrypt data one bit or one byte at a time; used if data is a constant stream of information.
Stream Ciphers
76
is determined by the size of the key.
Key Strength
77
is a method in which each letter in the alphabet is rotated by three letters.
Caesar Cipher
78
uses a sequence of monoalphabetic ciphers in tandem; (Blaise de Vigenere)
Polyalphabetic Caesar Cipher
79
this involves rearrangement of characters on the plain text into columns.
Columnar Transposition
80
the amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption.
Shannon’s Characteristics of “Good” Ciphers -
81
it is based on sound mathematics.
Properties of Trustworthy Systems
82
is the process of breaking an encryption code.
CRYPTANALYSIS
83
goal of DES is to completely scramble the data and key so that every bit of cipher text depends on every bit of data and every bit of key
Data Encryption Standard (DES)
84
Any exposure to the secret key compromise secrecy of ciphertext; a key needs to be delivered to the recipient of the coded message for it to be deciphered.
Symmetric Encryption
85
uses a pair of keys for encryption (Public key for encryption & Private key for decryption).
Asymmetric Encryption
86
developed by Ron Rivest, Adi Shamir, Len Adelman; both public and private key are interchangeable; variable Key Size (512, 1024, or 2048 buts); most popular public key algorithm.
RSA
87
developed by Taher ElGamal; variable key size (512 or 1024 bits); less common than RSA, used in protocols like PGP
El Gamal
88
hacker could generate a key pair, give the public key away and tell everybody, that it belongs to somebody else.
Man-in-the-middle Attack
89
used to improve efficiency.
Session-Key Encryption
90
Pretty Good Privacy (PGP), Secure/Multipurpose Internet Mail Extension (S/MIME), Secure Socket Layer (SSL) and Transport Layer Socket (TLS).
Encryption Protocols
91
is a method to create secret key by exchanging only public keys.
Key Agreement
92
is the process of validating the identity of a user or the integrity of a piece of data.
Authentication
93
is a fingerprint for a document.
Message digest
94
a message digest created with a key.
Message Authentication Codes
95
password is secret character string only known to user and server.
Password Authentication
96
set of rules that governs the communication of data related to authentication between the server and the user
Authentication Protocols
97
is an authentication service that uses symmetric key encryption and a key distribution center.
Kerberos
98
are hardware devices that generate unique strings that are usually used in conjunction with passwords for authentication.
Personal Tokens
99
uses certain biological characteristics for authentication (Fingerprint, Voice, Handwriting, Face, Hand Geometry Recognition, Retinal Scan).
Biometrics
100
scanning process takes advantage of the natural patterns in people's irises, digitizing them for identification purposes.
Iris Recognition
101
is a data item which accompanies or is logically associated with a digitally encoded message
Digital Signature
102
is a signed statement by a trusted party that another party’s public key belongs to them.
Digital Certificate
103
is the practice of signing a certificate with another private key that has a certificate for its public key.
Certificates Chaining