Domain 4.1: Communication and Network Security Flashcards
Understand key network and communication security terms, protocols, and architectures.
Define:
Geocast
Sending messages or data to a specific geographic location, used for targeted information delivery in networks.
The process of sending a message or data to a specific geographic location or group of locations. It is commonly used in networking to send targeted information to a specific group of devices within a specific geographic area. Examples include sending weather alerts to devices within a specific zip code or sending traffic updates to devices within a specific city.
For more information, visit this Wikipedia page.
Define:
Geolocation
The process of determining a device’s physical location using data signals.
Geolocation involves identifying the physical position of a device or user by analyzing signals from GPS, IP addresses, Wi-Fi, or cellular networks. This technology is widely used in navigation, targeted advertising, and security measures. In cybersecurity, geolocation helps authenticate user locations, detect suspicious login attempts, and tailor services based on geographic context, thereby enhancing both functionality and safety.
For more information, visit this Wikipedia page.
Define:
Global Area Network
A wide-spanning network that connects multiple sites across the globe for communication.
A Global Area Network (GAN) links geographically dispersed locations through interconnected communication infrastructures. It enables seamless data exchange and supports international operations by integrating various regional networks. GANs demand robust security measures and high-performance connectivity to manage latency and traffic, serving as the backbone for multinational corporations, global collaboration, and widespread digital communication.
For more information, view this lecture on Networking basics and definitions.
Define:
H.323
An ITU-T standard for audio and video communication over IP networks, used for video conferencing and VoIP communications.
H.323 is an ITU-T standard for audio and video communication over IP networks such as the Internet or corporate LANs. It provides a framework for multimedia conferencing and includes specifications for call signaling, media transport, and control. H.323 is used by various software and hardware to enable video conferencing and VoIP communications. Note that while Skype, Cisco WebEx, and Zoom may use similar protocols, they do not all specifically use H.323.
For more information, visit this Wikipedia page.
Define:
Half-Duplex Mode
A communication mode where data transmission occurs one way at a time, conserving bandwidth but slowing data transfer.
A communication mode where data can be transmitted and received over a single channel, but not simultaneously. It is used in networking and telecommunications to conserve bandwidth and reduce interference but at the cost of slower data transfer speeds. Examples include using half-duplex mode for older modems or for low-bandwidth connections.
For more information, view this lecture on Networking basics and definitions. Or visit this Wikipedia page.
Define:
Handling of Assets
Processes for managing and safeguarding organizational resources, crucial for preventing unauthorized access or misuse.
The processes and practices associated with managing and protecting an organization’s valuable resources, or ‘assets.’ These assets can include data, hardware, software, and intellectual property. From a security perspective, proper asset handling is vital to prevent unauthorized access, misuse, alteration, or destruction. It typically involves tasks such as asset identification, classification based on sensitivity and criticality, and implementation of appropriate controls (like encryption for data and physical security measures for hardware).
Define:
Handshake
A protocol for establishing a connection between systems, ensuring readiness for communication, like the TCP three-way handshake.
In the context of networking, a handshake is a protocol or process used to establish a connection between two systems. A common example is the TCP three-way handshake, which involves a synchronization (SYN) message sent by the client to the server, an acknowledgment of the synchronization (SYN-ACK) sent by the server back to the client, and a final acknowledgment (ACK) sent by the client to the server. This sequence of messages confirms that both parties are ready to communicate and establishes a reliable connection.
For more information, view this lecture on The OSI model- Part 2. Or visit this Wikipedia page.
Define:
Header Manipulation
Altering HTTP header attributes to bypass security, conduct spoofing, or enhance privacy.
Header manipulation refers to the intentional alteration of HTTP header attributes by either a sender or an intermediary, such as a proxy, often to bypass security measures, conduct spoofing attacks, or enhance privacy. It can be used legitimately to control cache or to adjust request-response headers for compatibility, but it can also be utilized maliciously to disguise the true source of traffic or to manipulate web application behaviors.
Define:
Heuristic Filter
A program detecting threats based on observed patterns, effective against unknown or varying threats.
A program that identifies threats or unwanted content based on general rules and observations rather than specific threat signatures. Unlike traditional filters that rely on a database of known threats, heuristic filters evaluate content based on patterns, behaviors, or certain attributes, making them effective at identifying previously unknown threats or variants of existing threats. These are commonly used in antivirus programs, spam filters, and intrusion detection systems to provide an additional layer of protection.
Define:
Hexadecimal
A base-16 number system used in computing for data representation, like color values and memory addresses.
A numerical system that uses 16 symbols (0-9 and A-F) to represent numbers. It is commonly used in computer programming to represent values in memory or to specify color values in web design. Examples include using hexadecimal to specify the RGB color value for a specific shade of blue (#0000FF) or using hexadecimal to represent the memory address of a specific data value in a computer program.
For more information, view this lecture on The OSI model- Part 1.. Or visit this Wikipedia page.
Define:
Host-To-Host Transport Layer
The OSI model layer ensuring reliable communication between network hosts.
The layer of the OSI model is responsible for providing reliable end-to-end communication between hosts on a network. This concept is used in the design and implementation of networked systems to enable communication between different devices and systems. Examples of the use of the host-to-host transport layer include the transmission of data over the Internet and the exchange of messages between applications on a local network.
For more information, view this lecture on Secure Communications - Part 1.
Define:
Hub
A basic network device connecting multiple computers, broadcasting data to all devices.
A network device that connects multiple computers or other network segments. In a hub-based network, the hub receives data packets and broadcasts them to all connected devices, regardless of the intended recipient. Hubs operate on the Physical Layer of the OSI model and have been largely replaced by smarter, more secure switches.
For more information, view this lecture on The OSI model- Part 1.. Or view this lecture on Layer 1 to 3 networking devices.. Or visit this Wikipedia page.
Define:
Hyperlink
A navigational reference in a hypertext document that allows users to jump to another document or section of the same document.
A reference or connection in a hypertext document to another document or another part of the same document. It is usually activated by clicking on a highlighted word or image within the document. Hyperlinks are the primary method of navigation between pages and resources on the web, and their correct and secure implementation is crucial to overall web security.
For more information, visit this Wikipedia page.
Define:
Hypertext Markup Language
(HTML)
A language used to create and format web pages, defining the structure and layout of web content.
A markup language used to structure and format content on the web. It is commonly used to create web pages and specify the layout, text, images, and other elements on the page. Examples of HTML use include using tags to create headings, paragraphs, lists, and tables on a web page, as well as linking to other web pages and incorporating multimedia.
For more information, view this lecture on Web architecture and attacks.. Or visit this Wikipedia page.
Define:
Hypertext Transfer Protocol
(HTTP)
The foundational protocol for transmitting web pages over the internet, with no inherent encryption for data.
Hypertext Transfer Protocol (HTTP) is the protocol used for transmitting web pages and other content on the World Wide Web. As a client-server protocol, a web client, such as a browser, requests a page from a server, and the server responds with the content. However, HTTP does not inherently encrypt data, which can expose information to interception or eavesdropping.
For more information, view this lecture on The OSI model- Part 2.. Or view this lecture on IP addresses, MAC addresses, and port numbers- Part 1.. Or visit this Wikipedia page.
Define:
Hypertext Transfer Protocol Secured
(HTTPS)
An encrypted version of HTTP that secures web communication using TLS or SSL.
A secure version of HTTP. It uses Transport Layer Security (TLS) or its predecessor, Secure Sockets Layer (SSL), to encrypt communications between the user’s browser and the web server. This helps protect sensitive data in transit from being intercepted or manipulated and verifies the authenticity of websites, hence playing a crucial role in safeguarding online transactions and sensitive information.
For more information, view this lecture on The OSI model- Part 2.. Or view this lecture on IP addresses, MAC addresses, and port numbers- Part 1.. Or visit this Wikipedia page.
Define:
IEEE
(Institute of Electrical and Electronics Engineers)
A professional organization with a focus on advancing technology and setting industry standards.
A professional organization composed of engineers, scientists, and students. Its purpose is to advance technology for the benefit of humanity. It sets standards for various fields, including electronics, telecommunications, and computing. The organization’s work impacts network protocols, communication standards, hardware interfaces, and numerous other technological facets.
For more information, visit this Wikipedia page.
Define:
IEEE 802.11
A set of standards for wireless networking, forming the basis of Wi-Fi technology for local area network communication.
A set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication. Developed by the IEEE, it is the foundation of wireless networking products, commonly known as Wi-Fi, that have revolutionized the way we connect to the Internet and to each other.
For more information, view this lecture on WiFi - Part 2. Or visit this Wikipedia page.
Define:
IEEE 802.11i
An amendment improving security within wireless networks, known as WPA2, incorporating AES encryption and secure authentication.
Also known as WPA2 (Wi-Fi Protected Access 2), IEEE 802.11i is an amendment to the original IEEE 802.11 standard, providing enhanced security in wireless networks. It includes provisions for robust encryption via Advanced Encryption Standard (AES), secure authentication methods, and key management protocols, ensuring the protection of sensitive information in a wireless environment.
For more information, view this lecture on WiFi - Part 1. Or visit this Wikipedia page.
Define:
IEEE 802.15.4
A standard governing low-rate wireless personal area networks, vital for enabling IoT devices and sensor networks.
IEEE 802.15.4 is a technical standard governing low-rate wireless personal area networks (LR-WPANs). It specifies the physical layer and media access control for LR-WPANs, focusing on simple, low-cost communication with low power consumption. The standard underpins technologies such as Zigbee and Thread, facilitating their application in IoT devices like smart home systems and sensor networks.
For more information, view this lecture on Bluetooth.. Or visit this Wikipedia page.
Define:
IEEE 802.1x
A protocol providing authentication to devices on a network, used to secure both wired and wireless network access.
A port-based network access control protocol that provides an authentication mechanism to devices wishing to attach to a network. It is utilized in environments where a higher level of security is required, including preventing unauthorized access to network services and resources. The protocol works by enforcing a client-server model, where a client is authenticated by a server before being granted access to network resources.
For more information, view this lecture on Network authentication protocols.. Or visit this Wikipedia page.
Define:
IEEE 802.3
A family of standards defining wired network technologies, including the widely-used Ethernet for local area networks.
Commonly known as Ethernet, IEEE 802.3 is a family of standards defining the physical layer and data link layer’s media access control (MAC) of wired networks. The standard forms the basis for the most widely deployed local area network (LAN) technology, Ethernet, allowing for devices to communicate within the same network and supporting a broad range of applications, including office networks, data centers, and telecommunication services.
For more information, visit this Wikipedia page.
Define:
In-Band
Utilizing the same channel for data and control signals, relevant in both network security and system operations.
A communication channel or method that uses the same path or channel for both data and control signals. In the context of information security, in-band refers to a communication method that uses the same network or system for both data and control signals. For example, a network administrator may use in-band communication to remotely access and control a network device.
Or visit this Wikipedia page.
Define:
Infiniband
A high-throughput, low-latency networking technology used predominantly in data centers and high-performance computing environments.
InfiniBand is a high-throughput, low-latency networking technology predominantly used in supercomputing and enterprise data center environments. It provides superior data transfer rates and communication efficiency over traditional Ethernet networks and is designed to carry multiple traffic types (data, storage, management) over a single connection.
Or visit this Wikipedia page.