The internet - Internet security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Explain what the key exchange problem is, in relation to a symmetric cipher

A
  • How to pass the key (from the sender) to the receiver;
  • Without it being intercepted / securely;
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain what it means for a cipher to be described as being computationally secure

A

The cipher cannot be cracked, by any known method in a polynomial amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a TCP/IP protocol

A

a stack set of protocols used in turn, to format a message so it can be sent over a network
- each layer provides a specific function within the transmission of the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

layers of the TCP/IP

A
  • application layer
  • transport layer
  • network layer
  • link layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

summarise the application layer

A
  • at the top of the stack
  • uses protocols relating to the application being used to transmit data over a network, usually the Internet
  • eg SMTP,HTTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

summarise the transport layer

A
  • second layer
  • uses the TCP to establish an end to end connection with the recipient computer
  • splits data into packets, numbers them sequentially
  • adds a port number
  • performs error detection
  • any missing packets are requested to be resent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what does TCP/IP stand for

A

transmission control protocol/internet protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

summarise the network layer

A
  • adds the IP addresses of the source and destination
  • router uses IP addresses to forward the packets on to the destination
  • the addition of an IP address to the port number forms a socket
  • each router uses a routing table to instruct the next hop
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

summarise the link layer

A
  • last layer
  • physical connection between network nodes
  • adds the MAC addresses, identifying the NIC of the source and destination devices
  • MAC addresses change with each hop
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how is data received after tcp/ip

A
  • link layer removes mac address from each packet
  • passes it to network layer
  • network layer removes IP address from each packet, passes it to transport layer
  • transport layer removes removes the port number from each packet, reassembles the packet in the correct order
  • passes it to app layer
  • app layer presents the image data for the user in a brpwser
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

features of a mac address

A

uniquely identifies a physical device with an NIC (NETWORK INTERFACE CARD)
- may be the destination computer or a router
-packets move around the lower layers of the stack as they hop across routers, changing their mac address as they go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

well known ports

A

20 = file transfer protocol
80 and 8080 = HTTP
443 = HTTPS(encrypted HTTP)
25 = SMTP (simple mail transfer protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a port

A

a port determines which application must deal with a data packet as it enters your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly