Chapter 8: Overview of Network Security and Network Threats
Regional Internet Registry (RIR)
Five different registrars for LANA that assign IP addresses
denial-of-service (DoS) attack
Hacks against the availability of data.
netstat
A TCP/IP utility that shows the status of each active connection.
Secure Copy Protocol (SCP)
Based on SSH to allow the secure copying of files from the local host to the remote host.
Flood Guard
Can drop packets or apply filters in place on switches or routers is a DOS attack is detected.
Internet Control Message Protocol (ICMP)
Component of TCP/IP protocol responsible for transmitting messages across networks.
local host
Device on which you are working
Secure Shell (SSH)
Encrypted Interface that uses port 22 for transactions.
Cyclical Redundancy Check (CRC)
Error checking of the frame
Subnet Mask
In IPv4 addressing, a 32-bit number that, when combined with a device's IP address, indicates what kind of subnet the device belongs to.
Protocol
Industry-accepted standardized format that allows communication between devices.
Smurf Attack
Involves overwhelming the victims computer with ICMP requests.
SYN Flood
Involves the hacker exploiting a vulnerability in the three-way handshake by not closing the handshake.
socket
Ip address and port together
site-local address
Ipv6 address similar to a private Ip in Ipv4
link-local address
Ipv6 address that can be used only on the link or broadcast domain.
Internet Corporation for Assigned Names and Numbers (ICANN)
Maintains the responsibility for managing and Coordinating the maintenance of the database that store this information.
distributed denial-of-service (DDoS) attack
Many hosts are contributing in attacking the victim.
Network Address Translation (NAT)
Network Service that converts an internal private number to a number for a public network, such as the Internet.
Media Access Control (MAC) address
Physical address embedded into the hardware of network cards.
Telnet
Port 23
global unicast address
Public Ipv6 address, can be routed and sent out on the Internet.
Ping Sweep
Scans a Subnet using ICMP requests to map out Valid IP addresses.
Three-way Handshake
Sending hosts and receiving client complete a three-step process to verify the successful transmission of data.
WHOIS
System that provides the owner of a domain and a contact person for the domain by Querying the ICANN databases.
Internet Assigned Numbers Authority (IANA)
The organization responsible for assigning public IP addresses.
packet sniffer
Tool that intercepts raw data traveling on the network media.
Initial Sequence Number (ISN)
Used as Part of the transmission process to manage packets within a transmission session.
Time to Live (TTL)
Value controls how long the packet will search for a destination address before it is detected.
File Transfer Protocol (FTP)/ SSL (FTPS)
has SSH functionality with an added second channel for secure transmissions.
Octet
one of the four 8-bit sections in a TCCP/ IP Ipv4 addresses.
De facto standards
one that is generally accepted over time and adopted for use, but not required two versions: Ipv4 and IPv6 .
proprietary
owned by someone and cannot be used without permission.
Secure File Transfer Protocol (SFTP)
uses a Single Channel to transmit and receive data
Classless Internet Domain Resolution (CIDR)
way to represent IP addresses in compressed form.