Cybersecurity

Description

Terminology commonly used in computer networking and cybersecurity.
Ashley Robinson
Flashcards by Ashley Robinson, updated more than 1 year ago
Ashley Robinson
Created by Ashley Robinson over 5 years ago
70
0

Resource summary

Question Answer
DevOps Is a practice. Aims to combine the roles of developer with that of system administrator. Aims to automate as much of the integration and deployment process as possible.
IP Internet Protocol Delivers packets of information across the internet from one gateway to the next. It is a connectionless protocol in which one packet does not necessarily relate to the next one delivered. Two common versions are IPv4 and IPv6. IPv6 allows for much longer addresses to be sent and is backwards compatible with IPv4.
IP address 32 bit number that identifies each sender or receiver of information that is sent in packets across the internet. It is composed of two parts: the identifier of a particular network on the internet and an identifier of the particular device (server or workstation). On the internet, only the network part of the address is being looked at.
Machine Address Also "host number" or "host address" is the part of the IP address that identifies an individual machine.
32-bit IP addressing Used in IPv4
Types of IPs Email, FTP (File Transfer Protocol), HTTP (WWW)
IP Address Classes & Formats Class A addresses are for large networks with many devices. 0|Network (7 bits)|Local address (24 bits) "network.local.local.local" Class B addresses are for medium-sized networks. 10|Network (14 bits)|Local address (16 bits) Class C addresses are for small networks (fewer than 256 devices). "network.network.network.local" 110|Network (21 bits) |Local address (8 bits) Class D addresses are multicast addresses. 1110|Multicast address (28 bits) Each address is usually represented as four decimal numbers, each representing 8 bits known as dot or dotted quad notation.
Datagrams A basic transfer of information over the internet; constituted by a header and a payload. It is a connection-less method of communication.
TCP Transmission Control Protocol Responsible for organizing the packets of information back into the original/intended order they were sent in via IP.
UDP User Datagram Protocol
Electronic Mail Three protocols comprise email: SMTP (Simple Mail Transfer Protocol), IMAP (Internet Message Access Protocol), and POP2 (Post Office Protocol 3). SMTP is used for sending mail; IMAP and POP3 is used for receiving
FTP File Transfer Protocol. Transfers files from one computer to another; commonly used for uploading a web page to a web server so that it may be seen on the www. A client is usually needed to use FTP.
HTTP HyperText Transfer Protocol is used by web servers to allow web pages to be shown in a web browser. Most browsers are capable of FTP as well as viewing web pages. HTTP tells browser what kind of information to expect.
News (Usenet) Network News Transfer Protocol (NNTP) is used for serving Usenet posts; dedicated to specific companies as well as forums that have a wide rage of topics; subdivided into several areas.
OSI Open Systems Interconnection
Potential locations of vulnerable code When exception or error messages "bubble up" to the UI due to poor exception/error handling. printStackTrace(), getStackTrace() are examples of this. Also, the setErr() and System.err field also cause this to occur
Potential Patterns for vulnerable code Page_Error (server side) --> if too specific, divulges information that may be exploited.
IPv4 Address limited to 32 bits, many circumvented this limitation by using the classless inter-domain routing (CIDR) scheme
IPv6 Supports source and destination addresses that are 128 bits (16 bytes) long. Requires IPSec support. Uses Flow Label field to identify packet flow for QoS handling by router. Allows the host to send fragments packets but not routers. Doesn't include a checksum in the header. Uses a link-local scope all-nodes multicast address. Does not require manual configuration or DHCP. Uses host address (AAAA) resource records in DNS to map host names to IPv6 addresses. Uses pointer (PTR) resource records in the IP6.ARPA DNS domain to map IPv6 addresses to host names. Supports a 1280-byte packet size (without fragmentation). Moves optional data to IPv6 extension headers. Uses Multicast Neighbor Solicitation messages to resolve IP addresses to link-layer addresses. Uses Multicast Listener Discovery (MLD) messages to manage membership in local subnet groups. Uses ICMPv6 Router Solicitation and Router Advertisement messages to determine the IP address of the best default gateway.
Flow Labels A source can use the 20-bit flow label field in the IPv6 header. A source can use this field to label those packets for which the source requests special handling by the IPv6 routers. For example, a source can request non-default quality of service or real-time service. This aspect of IPv6 is still experimental and subject to change as the requirements for flow support in the Internet become clearer. Some hosts or routers do not support the functions of the flow label field. These hosts or routers are required to set the field to zero when originating a packet. Hosts or routers forward the field without changes when forwarding a packet. Hosts or routers ignore the field when receiving a packet.
Multicast vs Unicast A Unicast transmission/stream sends IP packets to a single recipient on a network. A Multicast transmission sends IP packets to a group of hosts on a network. Packets are sent to one of these destinations in a flow.
Checksum A checksum is a small-sized datum derived from a block of digital data for the purpose of detecting errors which may have been introduced during its transmission or storage. Checksums are used as cryptographic primitives in larger authentication algorithms. For cryptographic systems with these two specific design goals, see HMAC.
Federation Federation refers to different computing entities adhering to a certain standard of operations in a collective manner to facilitate communication. It also describes operations between two distinct formally disconnected telecommunication networks with distinct internal structures. It may also describe an attempt made by groups to delegate authority of development and prevent fragmentation. Federation in networking systems means users can send messages from one system to another. Federated instant messaging (IM) networks permit communication across different IM clients and platforms. They maintain an open directory allowing the networks to message their users. A few federated networks also work on an interoperability basis, where software from two or more vendors shares data between different platforms.
Proxy Servers Proxy servers act as a firewall and web filter, provide shared network connections, and cache data to speed up common requests and a high level of privacy. A proxy server can change your IP address, so the web server doesn’t know exactly where you are in the world. It can encrypt your data, so your data is unreadable in transit. And lastly, a proxy server can block access to certain web pages, based on IP address. Organizations can also get better overall network performance with a good proxy server. Proxy servers can cache (save a copy of the website locally) popular websites A transparent proxy tells websites that it is a proxy server and it will still pass along your IP address, identifying you to the web server whereas an anonymous proxy will not. A distorting proxy server passes along a false IP address for you while identifying itself as a proxy. High Anonymity proxy servers periodically change the IP address they present to the web server, making it very difficult to keep track of what traffic belongs to who.
Show full summary Hide full summary

Similar

CCNA Security 210-260 IINS - Exam 3
Mike M
Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
CCNA Security Final Exam
Maikel Degrande
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2