Network Security Flashcards
CC Domain 4 (37 cards)
security appliance
general term used to describe a network device that performs some kind of security function
Endpoint
general term used to describe a computing device on a network (such as a laptop, desktop, mobile device, smartphone, tablet, or even a server).
Internet of Things (IoT)
general term that is loosely used to describe devices that historically did not connect to the Internet (or a network) that now have network connectivity.
Application (Layer 7)
consists of protocols used by computer applications to perform certain functions (such as a web browser using the HTTP protocol to access a website).
Presentation (Layer 6)
responsible for translating data from something the user expects to something the network expects (and vice versa) so that it may be transferred over a network.
Session (Layer 5)
responsible for setting up, controlling, and tearing down the connection between applications communicating between two different computers
Transport (Layer 4)
handles end-to-end transport services and the establishment of logical connections between two computers (e.g., a clientserver connection).
Network (Layer 3)
responsible for the routing and route selection for network packets based on logical IP addresses.
Data Link (Layer 2)
responsible for transmitting and delivery of frames throughout a LAN based on the unique physical MAC addresses of the devices on the network.
Physical (Layer 1)
with how bits (binary 1’s and 0’s) are transmitted and received
(TCP/IP) model
The Application Layer of the TCP/IP model
provides various services, processes, and protocols that run on a network and are used by user applications (such as a web browser).
Application, Presentation and Session osi model
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
protocols are often lumped together in conversation since the SSL protocol was the predecessor to TLS; however, they are different protocols
Host-to-Host Layer of the TCP/IP model
sometimes also called the Transport Layer since it loosely maps to the Transport Layer of the OSI model.
Internet Layer of the TCP/IP model
provides logical addressing and routing of IP network traffic. This layer is sometimes also referred to as the Network Layer because it loosely maps to the Network Layer (Layer 3) of the OSI model.
Network Access Layer of the TCP/IP model
loosely maps to the lower two layers (Layer 1 and Layer 2) of the OSI model (Physical and Data Link, respectively).
conducting Research
primary purpose of the first step in the process of planning a cyberattack is to conduct research about the planned target organization or victim
Identifying Targets
the cyberattacker pieces together the various bits of information collected in the previous phase.
Exploiting Targets
attacker takes advantage of vulnerabilities in systems or networks to gain unauthorized access.
iming and Race Conditions
also called a race condition attack, is an entire family of attacks in which the attacker takes advantage of the time between a sequence of events.
HTTP response splitting
another type of attack where an attacker sends a malicious script to a website.
Pretexting
uses a fake scenario to deceive someone
quid pro quo (QPQ)
exchange of information or goods, such as a purchase.