Vocab Week 4 Flashcards
Active Wiretapping
A wiretapping attack that attempts to alter data being
communicated or otherwise affect data flow. (See: wiretapping.
Compare: active attack, passive wiretapping.)
Bump-in-the-wire
An implementation approach that places a network security
mechanism outside of the system that is to be protected. (Compare: bump-in-the-stack.)
Example: IPsec can be implemented outboard, in a physically
separate device, so that the system that receives the IPsec
protection does not need to be modified at all [R4301]. Military-
grade link encryption has mainly been implemented as bump-in-the-
wire devices.
Bridge
A gateway for traffic flowing at OSIRM Layer 2 between two
networks (usually two LANs). (Compare: bridge CA, router.)
Community String
A community name in the form of an octet string that serves as a cleartext password in SNMP version 1 (RFC 1157) and version 2
(RFC 1901). (See: password, Simple Network Management Protocol.)
Computer Network
A collection of host computers together with the subnetwork or internetwork through which they can exchange data
Domain Name
The style of identifier that is defined for subtrees in the
Internet DNS – i.e., a sequence of case-insensitive ASCII labels
separated by dots (e.g., “bbn.com”) – and also is used in other
types of Internet identifiers, such as host names (e.g., “rosslyn.bbn.com”), mailbox names (e.g., “rshirey@bbn.com”) and
URLs (e.g., “http://www.rosslyn.bbn.com/foo”). (See: domain.
Compare: DN.)
Firewall
An internetwork gateway that restricts data communication
traffic to and from one of the connected networks (the one said to be “inside” the firewall) and thus protects that network’s system resources against threats from the other network (the one that is
said to be “outside” the firewall).
Gateway
An intermediate system (interface, relay) that attaches to two (or more) computer networks that have similar functions but dissimilar implementations and that enables either one-way or two- way communication between the networks.
Extranet
A computer network that an organization uses for application data traffic between the organization and its business partners.
Ingress Filtering
A method [R2827] for countering attacks that use packets with false IP source addresses, by blocking such packets at the boundary between connected networks.
Internet Key Exchange
An Internet, IPsec, key-establishment protocol [R4306] for putting in place authenticated keying material (a) for use with ISAKMP and (b) for other security
associations, such as in AH and ESP.
Internet protocol Suite
The set of network communication protocols that are specified by the IETF, and approved as Internet Standards by the IESG,
within the oversight of the IAB. (See: OSIRM Security
Architecture. Compare: OSIRM.)
Usage: This set of protocols is popularly known as “TCP/IP”
because TCP and IP are its most basic and important components.
For clarity, this Glossary refers to IPS protocol layers by name
and capitalizes those names, and refers to OSIRM protocol layers by number.
Internet Standard
A specification, approved by the IESG and published as an RFC, that is stable and well-understood, is technically competent, has multiple, independent, and interoperable implementations with substantial operational experience, enjoys significant public support, and is recognizably useful in some or all parts of the Internet.
Tutorial: The “Internet Standards Process” is an activity of the ISOC and is organized and managed by the IAB and the IESG. The
process is concerned with all protocols, procedures, and
conventions used in or by the Internet, whether or not they are part of the IPS. The “Internet Standards Track” has three levels of increasing maturity: Proposed Standard, Draft Standard, and
Standard.
Internetwork
A system of interconnected networks; a network of networks. Usually shortened to “internet”. (See: internet, Internet.) Tutorial: An internet can be built using OSIRM Layer 3 gateways to implement connections between a set of similar subnetworks. With dissimilar subnetworks, i.e., subnetworks that differ in the Layer 3 protocol service they offer, an internet can be built by implementing a uniform internetwork protocol (e.g., IP) that operates at the top of Layer 3 and hides the underlying subnetworks’ heterogeneity from hosts that use communication services provided by the internet.
Intranet
A computer network, especially one based on Internet technology, that an organization uses for its own internal (and usually private) purposes and that is closed to outsiders