Domain 4 Flashcards
(86 cards)
Acknowledgment (ACK)
An acknowledgment of a signal being received.
Address Resolution Protocol (ARP)
Used at the Media Access Control (MAC) layer to provide for direct communication between two devices within the same LAN segment.
Advanced Persistent Threat (APT)
An adversary with sophisticated levels of expertise and significant resources who is able to use multiple different attack vectors (e.g., cyber, physical and deception) to achieve its objectives. Its objectives are typically to establish and extend footholds within the IT infrastructure of organizations in order to continually exfiltrate information and/or to undermine or impede critical aspects of a mission, program or organization, or place itself in a position to do so in the future. Moreover, the APT pursues its objectives repeatedly over an extended period of time, adapting to a defender’s efforts to resist it, and with determination to maintain the level of interaction needed to execute its objectives.
Application Programming Interface (API)
Mobile code mechanisms that provide ways for applications to share data, methods or functions over a network. Usually implemented either in XML or JavaScript Object Notation (JSON). A reference to a software access point or library function with a well- defined syntax and well-defined functionality.
Bandwidth
The amount of information transmitted over a period of time. A process consisting of learning or education could necessitate higher bandwidth than a quick status update, which would require a lower bandwidth.
Bit
Most essential representation of data (zero or one) at layer 1 of the OSI 7-Layer Model.
Bluetooth (Wireless Personal Area Network IEEE 802.15)
Bluetooth wireless technology is an open standard for short-range RF communication used primarily to establish wireless personal area networks (WPANs). It has been integrated into many types of business and consumer devices.
Bound Network(s)
Network in which devices are connected at layer 1 by means of physical cables, wires or fiber. Often referred to as wired networks, Ethernet networks or by wiring or cable standard used, (e.g., fiber network, Cat 5 or Cat 6 network). See also Unbound (wireless) Network(s).
Boundary Routers
Primarily advertise routes that external hosts can use to reach internal ones.
Bridges
A device that creates a single aggregate network from separate network segments. Using the OSI model, this device aggregates networks at layer 2.
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
A method of flow control in a network. To prevent more than one station from accessing the network simultaneously, the sending station announces its intent to send, and other stations wait until the sending station announces its completion.
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
A method of flow control in a network. If more than one station accesses the network simultaneously, the other stations detect the event and subsequently attempt retransmission.
Cellular Network
A radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station.
Circuit-Switched Network
A network that establishes a dedicated circuit between endpoints.
Code-Division Multiple Access (CDMA)
Every call’s data is encoded with a unique key, then the calls are all transmitted at once.
Concentrators
Multiplex connected devices into one signal to be transmitted on a network.
Content Distribution Network (CDN)
A large, distributed system of servers deployed in multiple data centers, which moves content to achieve QoS and availability requirements.
Control Plane
Control of network functionality and programmability is directly made to devices at this layer. OpenFlow was the original framework/protocol specified to interface with devices through southbound interfaces.
Converged Protocols
A protocol that combines (or converges) standard protocols (such as TCP/IP) with proprietary or other non-standard protocols. These can sometimes provide greatly enhanced functionality and security to meet the needs of specific situations or industries. Adopting them can also complicate enterprise-wide security engineering efforts by requiring additional specialist knowledge and skills to manage and secure.
Domain Name Service (DNS)
This acronym can be applied to three interrelated elements: a service, a physical server and a network protocol.
Driver (Device Driver)
Software layer that provides an interface for accessing the functions of hardware devices. Typically used by the OS.
Dynamic Host Configuration Protocol (DHCP)
An industry standard protocol used to dynamically assign IP addresses to network devices.
Dynamic or Private Ports
Ports 49152-65535. Whenever a service is requested that is associated with well- known or registered ports, those services will respond with a dynamic port.
East-West Data Flow (or Traffic)
Network data traffic that flows laterally across a set of internal systems, networks or subnetworks within an IT architecture. These can be flows within a data center or between geographically disperse locations. Contrast with north-south data flows, in which northbound data is leaving the Within SDNs, east-west data flow is within a data plane, control plane or application plane. North-south data flows, in SDN terms, is data flowing up and down the stack of data/ control/application planes. organization and southbound is entering it.