Terminology Flashcards
(19 cards)
Write short notes on Firewall
A firewall is a specialized device (usually a router or PC with special software) that selectively filters or blocks traffic between networks. It acts as a barrier between a private network and external networks like the Internet. Firewalls can be configured to accept or deny traffic based on IP addresses, port numbers, or protocols. They are essential for protecting sensitive systems from unauthorized access and are one of the first lines of defense in network security.
Write short notes on Proxy servers
A proxy server is a network host that runs software acting as an intermediary between an internal network and the Internet.
Write short notes on Crackers
A cracker is an individual with malicious intent that users thier understanding fo operating systems and utilities to intentionaly damage, destroy or gain unauthorized access to systemsa dn data. They do this my expoiting weeak points in a system to plant harmful code, dteal data or disaable a system
Write short notes on Hackers
A hacker is someone who studies the internal workings of operating systems and networks to better understand them. Hackers do not always act with malicious intent and may even be hired to test a network’s security as part of a professional audit. In networking, ethical hackers help organizations discover vulnerabilities before malicious actors (crackers) can exploit them.
Write short notes on IPSEC
IPSec (Internet Protocol Security) is a suite of protocols used to encrypt and authenticate IP packets, ensuring confidentiality, integrity, and authenticity of communications.
Write short notes on SSL
SSL (Secure Sockets Layer) is a protocol used to encrypt data during transmission across the Internet, ensuring that sensitive information remains private and secure. SSL works by establishing an encrypted link between a client and a server. Though newer versions like TLS are now more common, SSL laid the foundation for secure web communication, especially for activities like online banking or shopping.
Write short notes on Security audit, providing an Example.
A security audit is a thorough examination of every aspect of a network to identify how it might be compromised. It includes assessing user permissions, hardware settings, physical security, and software configurations. Organizations should conduct security audits regularly and after any major network changes.
For example: Reviewing firewall configurations to ensure they block unauthorized traffic
Write short notes on Remote control
Remote control refers to accessing and using a host computer over a network from a distant location. Tools like pcAnywhere or ControlIT make this possible.
Write short notes on Remote access control
Remote access control involves securing access to a private network by remote users. It includes authentication systems like login IDs and passwords, and may use RADIUS for centralized management.
Write short notes on VPN
A VPN (Virtual Private Network) is a secure communication channel over a public network like the Internet. It uses encryption and tunneling protocols to connect remote users or branch offices to a central private network securely.
Write short notes on RADIUS
RADIUS (Remote Authentication Dial-In User Service) is a protocol that provides centralized authentication for users who connect remotely. It validates user IDs and passwords and logs session data such as time and source.
Write short notes on Root
Root refers to the most privileged user account on a system, especially in UNIX-based networks.
Write short notes on Authentication
Authentication is the process of verifying a user’s identity before granting access to network resources.
Write short notes on IP spoofing
IP spoofing is a technique where an attacker sends IP packets with a forged source address to disguise their identity.
Write short notes on Sniffing (in networking)
Sniffing is the act of capturing and analyzing network traffic using tools called sniffers.
Write short notes on Snooping
Snooping is unauthorized viewing or monitoring of network communications.
Write short notes on NOS
A Network Operating System (NOS) is software that manages network resources such as file sharing, printer access, and user accounts. Examples include Windows Server and UNIX/Linux.
Write short notes on Eavesdropping
Eavesdropping is secretly listening to network communications, often by tapping into data transmissions.
What is flashing?
Flashing is an attack where a user’s screen is flooded with junk or garbage characters during a chat session, forcing them to end the session.