TEST 1 Flashcards
Define Cybersecurity
Cyber security is protecting the confidentiality, integrity and access of the data
What are the network requirements
Speed, distance, delay, reliability, and cost
Fragmentation
Break up the message into segments and each segment gets its own envelop(header, trailer), then those segments get routed through the network to the receiver
Define what a host is
Any computer attached to a network, as that includes large servers, desktop PC’s, laptops, tablets, smartphones, etc..
What is I.P. addressing?
- logical reference to identifying the host
- Dynamic - For people who are periodic users of the network
- ex. Laptops are subscribed for a period of time - Static - Always there
- network equipment, ex. Email
What is the internet?
Collection of thousands of single networks and smaller internet’s as they all interconnect to form a single transmission system that in principle allows any internet host to reach any other host
Internet exchange points
All networks to interconnect directly via the exchange
Verizon—> internet exchange point—> AT&T
Define a Virtual Machine
Consists of many logical machines on one simple machine. Can be logically a windows server but shows a dozen others
Explain a domain name server
- type : www. Ford.com
- the internet can’t interpret that
- the browser will contact a DNS server to get to map www. Ford.com to an I. P. Address in the form of xxx.xxx.xxx…etc
- depending on where you’re coming from the address will be mapped to different servers
Net Neutrality
Principle that ISPs should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites
What are the benefits and risks of using a cloud service provider?
Benefits
- able to access data easier b/c of how big
- ease of implementation
- flexibility- system resources
- capital expense
Risks
- accessibility for attacks
- out of your control
- subject to cloud providers standards
Multiplexing
Set of technique hat allows the simultaneous transmission of signals across a single data link
What does a router do?
Routes traffic between two or more networks
What does a switch do?
Routes traffic between a single network
What does an access point do?
- creates a wireless local area
- bridge between a wireless station and a wired LAD
What is the peering point?
Or internet exchange point is a data center that allows us to connect to individually owned and managed networks of different vendors
What are the techniques to protect your device?
Firewalls- monitors and controls your network traffic
Scan for malware- software intended to damage or disable computers and computer systems
Security patches- update computer software to fix network vulnerabilities and other bugs
Encapsulation
Adding a new envelope
Name each of the five TCP/IP network layers and briefly describe their role/service in the network communication process
Email. Application- file transfer
TCP. Transport - error detection; host to host
IP. Internet - connects host to different networks
Data Links- sends segments to the same network
Wires. Physical- physically sends the signal
Interoperability
Product or a system, whose interfaces are completely understood, to work with other products or systems
Explain message ordering
“Three way handshake”
Semantics
Meaning of a message
- most common HTTP request message is a GET message, which requests a file. There’s also POST request messages, which uploads files
Syntax
How the message is organized
Equifax hack
- used “cross site scripting”
- can be fixed with input validation
- hacker inputs code to the website, the user inputs their user name and password and that information gets sent to the hacker