Networking and Security Midterm PDF
Document Details
Tags
Related
Summary
This document provides a list of networking and security protocols. It covers various topics including communication protocols, management protocols, security protocols, web page protocols, file transfer protocols, email protocols, supporting protocols, network communication protocols, network management protocols, data transmission, and transmission methods. It also includes devices like NICs, hubs, switches, routers, and details about Wi-Fi modes.
Full Transcript
Networking and Security Midterm TCP - Transmission Control Protocol UDP - User Datagram Protocol HTTP - Hypertext Transfer Protocol DNS - Domain Name System SYN - Synchronize SYN-ACK - Synchronize-Acknowledge ACK - Acknowledge _________________________ SNMP - Simple Network Management Protocol ICM...
Networking and Security Midterm TCP - Transmission Control Protocol UDP - User Datagram Protocol HTTP - Hypertext Transfer Protocol DNS - Domain Name System SYN - Synchronize SYN-ACK - Synchronize-Acknowledge ACK - Acknowledge _________________________ SNMP - Simple Network Management Protocol ICMP - Internet Control Message Protocol HTTPS - Hypertext Transfer Protocol Secure FTP - File Transfer Protocol SFTP - Secure File Transfer Protocol __________________________ TFTP - Trivial File Transfer Protocol SMTP - Simple Mail Transfer Protocol IMAP - Internet Message Access Protocol IMAP - Interactive Mail Access Protocol POP - Post Office Protocol ___________________________ DHCP - Dynamic Host Configuration Protocol SSL - Secure Sockets Layer SSH - Secure Shell TLS - Transport Layer Security AES - Advanced Encryption Standard NICs - Network Interface Cards __________________________ MAC - Media Access Control CAM - Control Access Memory ARP - Address Resolution Protocol WAPs - Wireless Access Points WEP - Wired Equivalent Privacy WPA - Wi-Fi Protected Access WPS - Wi-Fi Protected Setup SSID - Service Set Identifier PSK - Pre-Shared Key APT - Advanced Persistent Threat DoS - Denial of Service DDoS - Distributed Denial of Service IDS - Intrusion Detection System IPS - Intrusion Prevention Systems HIDS - Host-Based IDS NIDS - Network-Based IDS SIEM - Security Information and Event Management PCI DSS - Payment Card Industry Data Security Standard Three categories of network protocols a. Communication Protocols - exchange of information b. Management Protocols - monitoring and managing activity c. Security Protocols - ensure that data is sent and received securely Communication Protocols TCP - allows 2 devices to form a connection and stream data UDP - does not establish connection before transmission. Less reliable to TCP HTTP - provides a method of communication between clients and website servers DNS - translates internet domain names into IP addresses TCP three-way handshake 1. SYN 2. SYN - ACK 3. ACK Management Protocols SMNP - used to monitor and manage devices. occurs at the application layer ICMP - used by devices to tell each other about data transmission errors. occurs at the internet layer Security Protocols HTTPS - a secure method of communication between clients and website servers. Application layer SFTP - used to transfer files from one device to another over a network Web Page Protocols HTTP - developed by Tim Berners-Lee (1989) HTTPS - it uses SSL File Transfer Protocols FTP - one of the oldest protocols TFTP - alternative for FTP Email Protocols SMTP - originally was configured as “open relays” Ray Tomlinson - invented the email IMAP - used to retrieve email. POP - is also used to retrieve email. Supporting Protocols DHCP - supplies IP addresses to clients. DNS - used to match a domain name to an IP address. SNMP - a protocol for managing networks Network Communication Protocols - focus on establishing and maintaining a connection between devices Network Management Protocols - Ensures the smooth operation and sustainability of a network SNMP ICMP ______________________________________________________________________ Data Transmission and Media Access Methods Data transmission - exchange of data between devices through a network. Instantaneous Data Transfer - Communications like online chat or video conferencing need to be transmitted right away Digital Data Transmission - uses voltage differences to stand for the 1s and 0s in data. Transmission Methods Unicast Transmission (One-to-One) - transmits data from a single source to a single destination. Broadcast Transmission (One-to-All) - transmits the data from a source to all the other nodes on a network. Multicast Transmission (One-to-Many) - transmits the data to more than one device but not all of them. NICs - connect devices to the network. - Network adapter or network card - serves as an interface between a computer and the network. Duplex - serves as an interface between a computer and the network. - Half duplex - NIC both send and receive but can’t do both at the same time. - Full duplex - can both send and receive at the same time. MAC - 48 bits long - have six sets of two-digit hexadecimal numbers. - first three sets identify the manufacturer, and the last three sets identify that particular NIC Hubs - Early networks used devices called hubs - Hubs are also known as repeaters - Modern networks don’t use hubs, they use switches. Switches - receive incoming data and send it to other nodes. - When first turned on, switches act like hubs by sending data to all nodes, known as "flooding" the data. Packet Sniffers - allow administrators to capture network traffic. Routers - connects two or more different networks and passes information between them. WLAN - a self-contained network connecting two or more computers wirelessly. - cover small areas like buildings, floors, or rooms. Association - Wireless clients "associate" with wireless networks rather than "connect." - Clients need the Service Set Identifier (SSID), which acts like a network password, to associate with the network. Protection - Networks where users only need the SSID to associate are considered "open" networks. Wi-Fi Modes Infrastructure mode - uses a centralized device (WAP) to manage data between nodes. Ad hoc mode - communicate directly without a central device. WPS - Users can connect by pressing a button on the WAP and the NIC without entering an SSID or encryption key. - WPS uses a short, four-digit PIN for connection. Three Basic Wireless Security - Limit wireless coverage - Disable SSID Broadcast - Enable Mac filtering Wi-Fi Antennas Omni-Directional Antennas - send signals in all directions. Directional Antennas - specific direction Extending Wireless Network Multiple WAPs - require users to manually connect as they move between them Wireless Extenders - act as wireless repeaters, more affordable than multiple WAPs Wireless Mesh Networks - ideal for seamless coverage over a larger area.