INFORMATION SECURITY FUNDAMENTALS KEY TERMS (for CSN 150)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

NAT

Network Address Translation can be used to allow internal IP addresses access to the WAN

POP

Post Office Protocol is an application layer Internet protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.

TCP

Transmission Control Protocol is a network protocol designed to send and ensure end-to-end delivery of data packets over the Internet.

VPN

Virtual Private Network allows you to connect to a LAN for the Internet and access resources

WinSCP

WinSCP is a free program for Microsoft Windows, which will allow you to securely transfer files over an encrypted connection. The use of SCP is preferred over using FTP because the file will be transmitted over an encrypted channel.

netplwiz

a command in Windows that will allow you to set logon parameters

useradd

a command to add a user on a Linux/Unix system

PuTTY

a free SSH client for Windows. Although Microsoft Windows does come with a TELNET client, it lacks an SSH client. For this reason, a third party application like PuTTY needs to be utilized sin order for a Windows machine to connect to an SSH server

Wireshark

a free and open source protocol analyzer, which will allow a user to capture network traffic or to analyze a capture file

Wireshark

a free and open source protocol analyzer, which will allow a user to capture network traffic or to analyze a capture file.

TELNET

a protocol where the data is transmitted between two machines over in clear text. The use of TELNET, which uses port 23, should be avoided on networks because it is not secure.

telnet

allows remote administration of Linux and Windows systems through the command line

nmap

an open source and free scanner that allows you to determine open ports on a remote host

pfSense

an open source firewall that is widely used in the industry

ping

an operating system utility that allows you to test for TCP/IP connectivity between hosts

net use

built-in Windows command for mapping drives

copy

built-in internal command in Windows that allows you to copy files

dir

built-in internal command in Windows that allows you to view files and folders

Event Viewer

contains log files that contain information about activities on the computer

Beacon Frame

one of the management frames in a wireless LAN. It contains all the information about the network.

gpedit.msc

opens the Group Policy Management Console on a Microsoft Windows operating system

zenmap

zenmap a GUI port scanner that is a front end for the free and open source Nmap scanner

FTP

File Transfer Protocol is a clear text protocol used to transfer files between systems

firewall

A firewall can block traffic or redirect traffic to hosts on the internal network. pfSense is an open source firewall that uses a BSD-based firewall.

SSH

Secure shell uses port 22 and encrypts traffic, which typically provides a terminal interface

SSID

Service Set Identifier is a unique identifier attached to the header of packets sent over a wireless local area network (WLAN).


Set pelajaran terkait

Human Function Block 2 Lecture 9 (Cardiac Work and Metabolism)

View Set

ACC2000 Midterm (add account types!)

View Set

mental health exam final (33,31,30,29,28,24,23)

View Set

Adult Health Cardiac, Shock, Vascular System

View Set

Regulation-Part 1, Regulation-Part 3, Regulation-Part 4-Part II, Regulation-Part 4-Part I, Regulation-Part 5-Part I, Regulation-Part 5-Part II

View Set

Earth Science (Picture Version) Chapter 5,6,7

View Set

History of Nursing and Organizations Practice Questions

View Set

Marketing 20100 Fall Semester Final Study Guide 2016 (Chapters 9-11)

View Set