SU 28 Key terms

kindlyminnowΔίκτυα και Επικοινωνίες

26 Οκτ 2013 (πριν από 3 χρόνια και 7 μήνες)

83 εμφανίσεις

SU 28

Key terms

PAN

Personal area networks

LAN

Local area networks

MAN

Metropolitan area networks

CAN

Campus area networks

WAN

Wide area networks

USB

Universal

Serial Bus

TCP/IP

Suite of network protocols

TCP

transmission control protocol

IP

Internet protocol

TCP ports

used to form virtual circuit between nodes

DHCP

Dynamic Host Configuration Protocol

ARP

Address Resolution Protocol

MAC address

Hardware electronic serial number

RARP

Reverse Address Resolution Protocol

ND

Protocol

Neighbor Discovery

Protocol

PPP

Point
-
to
-
Point Protocol

Hub

Central network device connecting nodes in a star
topology


Bridge

Network device connecting LAN segments


Router

Connect LANs at the Network layer of the OSI model

Switch

provide
s

bridging capacity

& icreases bandwidth

Gateway

Enables two networked systems or software to connect


IPsec

IP security ,
enables IP communications to be secured
through authentication certificates and by encrypting data


netstat

gather data about TCP/IP

communications

nslookup

A TCP/IP service for gathering information about host and
servers

Virus

unwanted program relayed by disk or a file

Worm

copies itself or sends itself to other computers

Trojan horse

a malicious program in disguise

buffer
attack

Buffer attack creates situation of buffer overflow

Buffer
tricked into holding information in excess of size

DoS attack

Denial of Service

Man
-
in
-
the
-
Middle Attacks

Occurs when the attacker is able to intercept or monitor
transmissions meant for a
different computer


Source Routing Attacks

Source routing: packet sender specifies precise p

Application
-
Layer Attacks

Can take control of an application or a computer through
issuing commands


Spoofing

Address of source packet is altered to disguise
attacker

Sniffer Attacks

when an attacker uses software to intercept and read
packet traffic

Port Scanning Attacks

Attackers may use ports to gain remote access


war
-
drives

Wireless Attacks

Spam

unsolicited bulk e
-
mail (UBE)

Spyware

Software that
reports user's activities to attacker