Chapter 4 Flashcards
(32 cards)
Application programming interface (API)
set of routines, standards, protocols, and tools for building software applications
Allow different software applications to communicate with eachother to exchange data, features, and functionality
Bit
Representation of data (zero or 1) at Layer 1 of the Open Systems Interconnection (OSI) Model
Broadcast
one to many form of sending internet traffic
Byte
unit of digital information that most commonly consists of eight bits
Cloud computing
model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction
Community cloud
cloud infrastructure provisioned for exclusive use by specific community of consumers
De-encapsulation
opposite process of encapsulation, where bundles of data are unpacked or revealed
File Transfer Protocol (FTP)
standard internet protocol (and program) used for the transfer of computer files from a server to a client on a computer network.
Fragment attack
Attacker fragments traffic in such a way that the system is unable to put data packets back together- exploiting the IP fragmentation process
Hybrid cloud
combination of public cloud storage and private cloud storage
Infrastructure as a Service (IaaS)
provider of core computing, storage and network hardware and software that is the foundation organizations can build and then deploy applications
Internet Control Message Protocol (ICMP)
IP network protocol standardized by Internet Engineering Task Force (IETF) through RFC 792 to determine if a particular service or host is available
Man-in-the-Middle
attack where adversaries position themselves in between the user and system so they can intercept and alter data traveling between them
Internet Protocol (IPv4)
standard protocol for transmission of data from source to destinations in packet switched communications networks and interconnected systems of such networks
Microsegmentation
Part of zero-trust strategy that breaks LANs into very small, highly localized zones using firewalls or similar technologies
Oversized Packet Attack
purposely sending a network packet that is larger than expected or larger than can be handled by the receiving system, causing the receiving system to fail unexpectedly
Packet
Representation of data at Layer 3 of the Open Systems Interconnection (OSI) model
Payload
primary action of a malicious code attack
Payment Card Industry Data Security Standard (PCI DSS)
information security standard that applies to merchants and service providers who process credit or debit transactions
Platform as a Service (PaaS)
web application development middleware environment that allows applications to be built in the cloud before they’re deployed as SaaS assets
Private cloud
cloud computing platform implemented within corporate firewall under control of the IT department
Protocols
set of rules to implement and control some type of association between systems
Public cloud
cloud infrastructure provisioned for open use by general public
Simple Mail Transport Protocol
standard communication protocol for sending and receiving emails between senders and receivers