Set 2 (Comms and Security) Flashcards
(44 cards)
Define HTTP
hypertext transfer protocol
Define Segment (transport layer)
This is a unit of data (packet) associated with the transport layer protocols
Define FTP
File transfer protocol
Define SMTP
Simple mail transfer protocol
Define push protocol
Protocol used when sending emails, in which the client opens the connection to the server and keeps the connection active all the time, then uploads new email to the server
Define binary file
a file that doesn’t contain text only. The file is machine-readable but non human-readable
Define MIME
Multi purpose internet mail extension. A protocol that allows email attachments containing media files as well as text to be sent
Define pull protocol
used when receiving emails, in which the client periodically connects to a server, checks for and downloads new emails from a server and then closes the connection
Define Host to Host
a protocol used by TCP when communicating between two devices
Define host
A computer or device that can communicate with other computers or devices on a network
Define BitTorrent
Protocol used in peer-to-peer networks when sharing files between peers
Define Peer
A client who is part of a peer-to-peer network/file sharing community
Define metadata
a set of data that describes and gives information about other data
Define pieces
Splitting up of a file when using peer-to-peer file sharing
Define tracker
A central server that stores details of all other computers on the swarm
Define Seed
a peer that has downloaded a file (or pieces of a file) and has then made it available to other peers in the swarm
Define Swarm
Connected peers (clients) that share a torrent/tracker
Define leech
A peer with negative feedback from swarm
Define lurker
user/client that downloads files but does not supply any new content to the community
What are the 4 stages of the TCP/IP protocol
4) Application layer
3) Transport Layer
2) Internet (network) Layer
1) Link Network
(Sending going from 4 –> 1)
The TCP/IP protocol suite has four layers. The application layer provides user services. What are some protocols
- HTTP(S) : For sending and receiving web pages / hypertext documents
- FTP : For sending and receiving files over network
- SMTP : For sending/uploading email/push protocols
- POP : For receiving/downloading emails/pull protocols
Describe the purpose of asymmetric key cryptography
- To provide better security by using two different keys / a public key and a private key
- One of the keys is used to encrypt the message and the matching key is used to decrypt the message
What are the benefits of quantum cryptography
- Provides security based on laws of physics rather than mathematical algorithms so more secure
- To protect the security of the data transmitted over fibre optic cables
- Virtually unhackable
- The performance of quantum cryptography is continuously improved, making it suitable for most valuable government/industrial secrets.
- Longer keys can be used
What are the drawbacks of quantum cryptography
- Lacks many vital features such as digital signature, certified mail, etc.
- High cost of purchasing / maintaining equipment required.
- Currently only works over relatively short distances.
- Error rates are relatively high as technology is still being developed.
- Polarisation of light can change during transmission.
- Allows criminals and terrorists to hide their communications.