Chapter 8: Overview of Network Security and Network Threats

Ace your homework & exams now with Quizwiz!

Regional Internet Registry (RIR)

Five different registrars for LANA that assign IP addresses

denial-of-service (DoS) attack

Hacks against the availability of data.

netstat

A TCP/IP utility that shows the status of each active connection.

Secure Copy Protocol (SCP)

Based on SSH to allow the secure copying of files from the local host to the remote host.

Flood Guard

Can drop packets or apply filters in place on switches or routers is a DOS attack is detected.

Internet Control Message Protocol (ICMP)

Component of TCP/IP protocol responsible for transmitting messages across networks.

local host

Device on which you are working

Secure Shell (SSH)

Encrypted Interface that uses port 22 for transactions.

Cyclical Redundancy Check (CRC)

Error checking of the frame

Subnet Mask

In IPv4 addressing, a 32-bit number that, when combined with a device's IP address, indicates what kind of subnet the device belongs to.

Protocol

Industry-accepted standardized format that allows communication between devices.

Smurf Attack

Involves overwhelming the victims computer with ICMP requests.

SYN Flood

Involves the hacker exploiting a vulnerability in the three-way handshake by not closing the handshake.

socket

Ip address and port together

site-local address

Ipv6 address similar to a private Ip in Ipv4

link-local address

Ipv6 address that can be used only on the link or broadcast domain.

Internet Corporation for Assigned Names and Numbers (ICANN)

Maintains the responsibility for managing and Coordinating the maintenance of the database that store this information.

distributed denial-of-service (DDoS) attack

Many hosts are contributing in attacking the victim.

Network Address Translation (NAT)

Network Service that converts an internal private number to a number for a public network, such as the Internet.

Media Access Control (MAC) address

Physical address embedded into the hardware of network cards.

Telnet

Port 23

global unicast address

Public Ipv6 address, can be routed and sent out on the Internet.

Ping Sweep

Scans a Subnet using ICMP requests to map out Valid IP addresses.

Three-way Handshake

Sending hosts and receiving client complete a three-step process to verify the successful transmission of data.

WHOIS

System that provides the owner of a domain and a contact person for the domain by Querying the ICANN databases.

Internet Assigned Numbers Authority (IANA)

The organization responsible for assigning public IP addresses.

packet sniffer

Tool that intercepts raw data traveling on the network media.

Initial Sequence Number (ISN)

Used as Part of the transmission process to manage packets within a transmission session.

Time to Live (TTL)

Value controls how long the packet will search for a destination address before it is detected.

File Transfer Protocol (FTP)/ SSL (FTPS)

has SSH functionality with an added second channel for secure transmissions.

Octet

one of the four 8-bit sections in a TCCP/ IP Ipv4 addresses.

De facto standards

one that is generally accepted over time and adopted for use, but not required two versions: Ipv4 and IPv6 .

proprietary

owned by someone and cannot be used without permission.

Secure File Transfer Protocol (SFTP)

uses a Single Channel to transmit and receive data

Classless Internet Domain Resolution (CIDR)

way to represent IP addresses in compressed form.


Related study sets

Chapter 40: Oxygenation and Perfusion

View Set

Perspective on Wellness Final Test

View Set

public speaking study guide unit 2 exam

View Set

Mental Health Practice Questions EXAM 2

View Set

93: Relative clauses 2: clauses with and without 'who' / 'that' / 'which'

View Set