Telecommunications and Networks
What does network management ensure?
ensures that the network works as intended and provides value to its user
controls
mechanisms that reduce or eliminate threats to network security.
fault management
preventing, detecting, and correcting faults in the network circuits, hardware, and software
decryption
process of restoring to readable form
business continuity planning
refers primarily to ensuring availability, with some aspects of data integrity.
network operations center
responsible for monitoring and fixing problems
availability
the percentage of time the network is available to users
brute force attack
trying every possible key
network management
understanding network technologies, ability to work with end users and management, and understanding key elements of driving network costs
security hole
A bug that permits unauthorized access.
permanent virtual circuit
Connections between the different locations in the packet network. They are defined for frequent and consistent use by the network.
ring architecture
Connects all computers in a closed loop with each computer linked to the next. Messages flow in both directions around the ring.
star architecture
Connects all computers to one central computer that routes messages to the appropriate computer. Easy to manage because the central computer receives and routes all messages in the network. Can also be faster than the ring.
true
Have companies combined voice and data communication functions?
* Improving device performance * Upgrading the circuits between the locations * Changing the demand place on the network
How can the performance of WANs be improved?
24
How many 64Kbps channels does a T1 circuit have?
IP spoofing
Software that can change the source IP address on the packets they send
desktop management
Solution to configuration problems. It enables network managers to install software on client computers over the network without physically touching each client computer.
service level agreements
Specifies the exact type of performance and fault conditions that the organization will accept.
risk assessment
Strategies for analyzing and prioritizing the security risks to information systems and networks.
CRTC
The _________________ is a Canadian government agency that regulates voice and data communication.
true
The most common authentication protocol used today is Kerberos.
computer forensics
The use of computer analysis techniques to gather evidence for criminal and/or civil trials.
line splitter
Used to separate the traditional voice telephone transmission from the data transmissions.
Inter-exchange Carrier(IXC) (ex: AT&T)
What are common carriers that provide long distance services called?
managed devices
devices that perform their functions: routing and switching and also record data on the messages they process
What is point-of-presence?
(POP): the place at which the ISP provides services to it customers.
No, data also
Can T-carrier circuits only be used to transmit voice?
Triple DES
A newer standard that is harder to break because it uses DES three times, usually with 3 different keys to produce encrypted text. which produces a stronger level of security.
certificate authority
A trusted organization that can vouch for the authenticity of the person or the organization using authentication.
denial-of-service attack
An attacker attempts to disrupt the network by flooding it with messages so that the network cannot process messages from normal users
mission critical application
An information system that is critical to the survival of the organization. An application that cannot be permitted to fail.
threat
Any potential occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization
threat scenario
Describes how an asset can be compromised by one specific threat.
latency
Devices are rated for their speed in converting input packets to output packets
benefits of packet switched services
Different locations have different connection speeds into the common carrier cloud. The PAD compensates for differences in transmission speed between sender and receiver
encryption
Disguising information by the use of mathematical rules known as algorithms.
public utilities commission
Each state or Canadian province has its own ___________ to regulate communications within its borders
application-level firewall
Examines the contents of the application-level packet and searches for known attacks
packet-level firewall
Examines the source and destination address of every network packet that passes through it
No, because it does not perform error control.
Is frame relay a reliable packet service?
configuration management
Managing the network's hardware and software configurations, documenting it, and ensuring it is updated as the configuration changes.
What is MTBF?
Mean Time Between Failure (number of hours or days continuous operation before a component fails
What is MTTF?
Mean Time To Fix
preventive controls
Mitigate or stop a person from acting or an event from occurring.
disadvantages of the star architecture
Most susceptible to traffic problems because the central computer must process all messages on the network.
common carriers
Private companies such as AT&T, Sprint, Bell Canada, BellSouth that provide communication services to the public.
virtual private network
Provides the equivalent of a private packet-switched network over the public internet.
corrective controls
Remedy of an unwanted event or an intrusion
Trojan horse
Remote access to management consoles that enable users to access a computer and manage it from afar.
1. develop standard hardware and software configurations for client computers and servers 2. automate as much of the network management function as possible by deploying a solid set of network management tools 3. reduce the cost of installing new hardware and software by working with vendors 4. centralize help desks 5. move to thin-client or cloud-based architectures
What are important steps in reducing network costs?
1. Algorithm 2. Key
What are the 2 parts of symmetric encryption?
1. internet 2. LANs inside the organization 3. dial-up access from a modem
What are the 3 basic network access points into organizational networks?
Ring, Star, and Mesh
What are the basic architectures for dedicated circuit networks?
- training end users not to divulge passwords - using a smart card in conjunction with a password to gain access to a computer system - using biometric devices to gain access to a computer system - using a security software package that logs out users if that user is 'idle' for a certain amount of time
What are the methods for deterring intrusion?
- casual intruders - experts in security - professional hackers - organization employees
What are the types of intruders who attempt to gain intrusion to computer networks?
Back Orifice, MoSucker, Optix Pro
What are three types of Trojans?
1. require a network impact statement for all new application software developed or purchased by the organization 2. use data compression techniques for all data in the network.
What are ways to reduced network demand?
PAD (Packet Assembly Disassembly) device
What device allows a user to connect into a packet switched service?
confidentiality and integrity of data
What does intrusion primarily refer to?
Committed Information Rate (the data rate the PVC guarantees to transmit. If the network accepts the connection, it guarantees to provide that level of service)
What is CIR?
Data Encryption Standard: a symmetric encryption technique
What is DES?
Demilitarized Zone: it contains the organization's servers but doesn't provide complete security for them.
What is DMZ?
(DSL): Digital Subscriber Line it's a family of point-to-point technologies designed to provide high speed data transmissions over traditional telephone line.
What is DSL?
high-speed dedicated circuit services
What is SONET made up of?
Secure Sockets Layer: encryption protocol
What is SSL?
CSU (Channel Service Unit) DSU (Data Service Unit)
What is a CSU/DSU?
low cost and flexibility
What is a primary advantage of a VPN compared to a private WAN connection?
A patch
What is a software solution to correct a security hole referred to as?
Federal Communications Commission ( U.S)
What is the FCC?
1.544 Mbps
What is the data rate for a T-1 circuit in North America?
Proactive
What is the key principle in preventing disruption, destruction, and disaster?
Detects power failures and permits the devices attached to it to operate as long as its battery lasts.
What is the purpose of an un-interruptable power supply?
1. Public keys 2. Private keys
What keys does asymmetric encryption use?
AT&T, Sprint
What types of tier 1 companies sit at the top of the Internet structure?
Internet2
Which Internet effort was started by 34 universities?
both
Which circuit(s), full or half duplex, can a WAN with a ring topology use?
prestige value of using a particular common carrier
Which of the following is not a key issue to be considered when selecting a WAN service?
personal social engineering
Which of the following is not a method for deterring intrusion?
knowledge of frame relay
Which of the following is not considered a key management task for running a network?
DSU
Which of the following is not one of the large local exchange carriers operating in North America today?
Broadband technologies
Which technologies provide higher-speed communications than traditional modems?
fiber optic
Which type of media is least susceptible to eavesdropping?
infrared
Which type of twisted pair wires are the first choice for eavesdropping?
IXPs (internet exchange points):AT&T, Verizon, Sprint, Qwest, Level 3, Global Crossing
Who do tier 1 companies exchange data with?
Wi-Fi
WiMax easily connects into what types of networks?
digital signatures
a combination of a message digest and other information used to assure non-repudiation.
sniffer program
a program that records all LAN messages received for later (unauthorized) analysis
firewall
a router or special-purpose device that examines packets flowing into and out of a network and restricts access to the organization's network.
local loop
cable from a home or office to the telephone company end office is capable of providing higher data transmission rates.
network monitoring
collecting operational statistics from the network devices-often done by one person aided by a few simple tools
disk mirroring
data on a disk is copied onto another
crackers
hackers who cause damage
T-carrier services
leasing a dedicated circuit from one building in one city to another building in the same or different city