Term
|
Definition
Lightweight Directory Access Protocol: An application protocol that follows a tree, hierarchical data structure and is used to query and modify directory services and runs over TCP/ICP. It is also used by other services for authentication.
Port Used ○ SSL 636
What is a not a good use for LDAP? ○ Relational Data
|
|
|
Term
|
Definition
A distributed file system created by Sun that allows a user on a client computer to access files over a network as if it were connected directly to it. |
|
|
Term
Network File Systems - AFS |
|
Definition
Apple File Protocol Allows client workstations to access files from a remote file server. |
|
|
Term
Network File Systems - SMB |
|
Definition
Server Message Block Used to provide shared access to files, printers, serial ports and miscellaneous communications between nodes on a network. |
|
|
Term
Network File Systems - NAS vs SAN |
|
Definition
NAS = Network Attached Storage SAN = Storage Area Network ○ Differences ■ A NAS is a single storage device that operates on a data files. A SAN is a local network of multiple devices that operate on disk blocks. ■ A SAN uses fiber channel interconnects. A NAS uses Ethernet and TCP/IP connections. ○ Similarities ■ Both provide networked storage solutions |
|
|
Term
|
Definition
Simple Network Management Protocol: Used to manage devices on IP networks (i.e. Routers, Switches, Servers, Workstations, etc. |
|
|
Term
|
Definition
Management Information Base: Used to describe the structure of the management data of a device subsystem |
|
|
Term
|
Definition
Used to define a single object instance |
|
|
Term
|
Definition
Used to define multiple related object instances grouped in MIB tables |
|
|
Term
|
Definition
A network node that implements an SNMP interface and allows unidirectional or bidirectional access to specific information |
|
|
Term
|
Definition
Same as IP Address but can represent different network address types |
|
|
Term
|
Definition
32-bit number used to track information such as the number of octets sent and received on an interface and repeats back to 0 once it hits 232. |
|
|
Term
|
Definition
32-bit number that can increase or decrease at will but never exceed 232 |
|
|
Term
|
Definition
32-bit number that measures time in hundredths of a second |
|
|
Term
|
Definition
Allows any other ASN.1 encoding to be stuffed into an octet string |
|
|
Term
|
Definition
32-bit number that is used to specify enumerated types within the context of a single managed object. |
|
|
Term
|
Definition
Represents decimal values in the range of 0232 1 inclusive |
|
|
Term
SPAM - Business Impact Volume |
|
Definition
Consumption of computer and network resources |
|
|
Term
SPAM - Business Impact threats |
|
Definition
■ Financial theft ■ Identity theft ■ Data and intellectual property theft ■ Viruses/Malware ■ Pornography ■ Fraud ■ Deceptive marketing |
|
|
Term
SPAM Business Impact Cost |
|
Definition
|
|
Term
SPAM Business Impact Economics |
|
Definition
Email is cheap to send ● A small number of spammers can saturate a market ● The small number of gullible people provide necessary profits for spammers to continue spamming ● New spammers go into business every day |
|
|
Term
|
Definition
|
|
Term
|
Definition
Email disguised to look legitimate |
|
|
Term
SPAM: Where did the name SPAM come from? |
|
Definition
|
|
Term
|
Definition
○ A network protocol used to provide bidirectional interactive text-oriented communication. ○ Port 23 ○ Security Issues: ■ Does not encrypt traffic ○ Uses: ■ Debugging network services |
|
|
Term
|
Definition
○ A software utility on UNIX systems that allows users to login on another host via the network ○ Port 513 ○ Security Issues: ■ Does not encrypt traffic ■ Corrupt clients can forge information to gain access to remote client ■ Exposes NFS directories to untrusted machines ○ Uses: ■ To share account information between all Unix machines on network to trust all other machines. |
|
|
Term
|
Definition
Remote Shell ○ Allows shell commands to be executed as another user on a remote computer. ○ Port 514 ○ Security Issues: ■ Does not encrypt traffic ○ Uses: ■ To send remote commands to machines within a network. Has been replaced by SSH. |
|
|
Term
|
Definition
Remote Copy ○ Used to remotely copy one or more files from one computer to another. ○ Port 513 ○ Security Issues: ■ Does not encrypt traffic ○ Uses: ■ To send data to another machine within a network quickly as it doesn’t need to encrypt and decrypt the data. |
|
|
Term
|
Definition
Secure Copy ○ Used to securely transfer files between a local and remote host computer. ○ Port 22 ○ Security Issues: ■ ??? ○ Uses: ■ Securely allows the transfer files by encrypting all traffic. |
|
|
Term
|
Definition
Secure Shell ○ Used to send remote commands, login credentials and other secure network services between two networked computers all while being encrypted. ○ Port 22 ○ Security Issues: ■ Data streams could be hijacked and unauthorized data could be inserted in data stream due to insufficient data integrity protection from CRC32 ○ Uses: ■ Used to securely login and send sensitive encrypted commands two and from computers on a network |
|
|
Term
|
Definition
Secure File Transfer Protocol Provides file access, transfer and management functions over data stream. It assumes its current connection is already encrypted, but does not encrypt the data itself. |
|
|
Term
Remote Access: Public Key Cryptography |
|
Definition
A class of algorithms which requires two separate keys, one secret, one public. The public key is used to encrypt plain text or verify digital signatures and the private key is used to decrypt text or create digital signatures. |
|
|
Term
|
Definition
○ Port 25 (non-encrypted) ○ Port 587 (secure TLS) ○ Port 465 (secure SSL) |
|
|
Term
|
Definition
○ Port 110 (non-encrypted) ○ Port 995 (secure SSL) |
|
|
Term
|
Definition
○ Port 143 (non-encrypted) ○ Port 143 (secure TLS) ○ Port 993 (secure SSL) |
|
|
Term
Mail Services: Where is SMTP Used ? |
|
Definition
Used for all mail servers |
|
|
Term
Mail Services: Where is POP used ? |
|
Definition
Used by 3rd party mail service providers (GMAIL, Yahoo, Hotmail, etc.) |
|
|
Term
Mail Services: Where is IMAP used ? |
|
Definition
Used by private organizations |
|
|
Term
|
Definition
does not sync changes on the client with the server |
|
|
Term
|
Definition
doesn’t need to store content on the server as it gets pulled down to the client |
|
|
Term
Mail Services: IMAP con ? |
|
Definition
stores content on the server and it is synced with the client |
|
|
Term
Mail Services: IMAP pro ? |
|
Definition
syncs all changes on the client with the server |
|
|
Term
|
Definition
A desktop sharing system that allows one to remotely control another computer. |
|
|
Term
What ports is used for VNC ? |
|
Definition
○ 5900 (via a server) ○ 5800 (via a browser) |
|
|
Term
What type of security does VNC have ? |
|
Definition
The RFB protocol is not natively encrypted and requires additional methods to secure a connection (SSH, VPN, etc.) |
|
|
Term
|
Definition
● RFB Protocol ○ Allows for remote access to graphical user interfaces. |
|
|
Term
|
Definition
An extension of a private network across a public network that allows a computer to send/receive data across shared or public network as if directly connected to the private network. |
|
|
Term
|
Definition
Tells the enduser’s browser what network adapter to use first when accessing websites |
|
|
Term
|
Definition
Linking two locations as if they were on the same private network, encapsulating the data during the transfer and unpacking it on the receiving end all while being encrypted during transfer. |
|
|
Term
Web Servers: What does it do ? |
|
Definition
○ Accepts HTTP requests from clients ○ Provides HTTP responses to clients ○ Logs requests and responses |
|
|
Term
Web Servers: Types of Web Servers ? |
|
Definition
|
|
Term
|
Definition
■ Platforms Supported: Windows, Novell, Linux, Macintosh, zOS ■ Features ● SSL Secure Socket Layer Provides communication privacy ● TLS Transport Layer Security Protocol that ensures privacy between communicating applications and their users on the Internet ● Logging Visible via the browser, visitors |
|
|
Term
|
Definition
■ Platforms Supported: Windows ■ The world wide web publishing service serves out web pages ■ Services: ● AppHostSVC ○ Application Host Helper Service ■ Stores configuration history and application pool mappings ● FTPSVC/MSFTPSVC ○ FTP Publishing Services ■ Allows IIS to become FTP server ● W3SVC ○ World Wide Web Publishing Service ■ Provides web connectivity and administration of IIS ● WAS ○ Windows Process Activation Service ■ Provides process activation, resource and health management services for message activated applications ● WMSVC ○ Web Management Service ■ Web Management Service Enables remote |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Informational Status messages and headers (i.e. Continue, Switching Protocols, etc.) |
|
|
Term
|
Definition
Successful Status messages indicating that a client’s request was received, understood and accepted (i.e. Reset Content, Partial Content, Accepted, etc.) |
|
|
Term
|
Definition
Redirection Status code indicating that further action needs to be taken by the user in order to fulfill the client’s request (i.e. Moved Permanently, Use Proxy, etc.) |
|
|
Term
|
Definition
Client Error Status code indicating that an error on the client’s end has occurred (I.e. Forbidden, Not Found, Request Timeout etc.) |
|
|
Term
|
Definition
Server Error Status code indicating that an error on the server has occurred (i.e. Internal Server Error, Service Unavailable, Gateway Timeout, etc.) |
|
|
Term
|
Definition
200 OK The request has succeeded |
|
|
Term
|
Definition
Forbidden The server understood the request, but is refusing to fulfill it. Typically due to permissions on indexing |
|
|
Term
|
Definition
Not Found The server did not find anything matching the requestURI |
|
|
Term
What is HTML in relation to HTTP |
|
Definition
HTML is a document containing statements pointing to text, images or other types of documents which is viewed through HTTP within a browser |
|
|
Term
|
Definition
|
|
Term
|
Definition
Commonly used alternate webserver HTTP port as alternative to port 80 (i.e. secondary webserver, etc.) |
|
|
Term
|
Definition
|
|
Term
|
Definition
○ Preexisting data files ○ Contents loaded on request ○ Faster web delivery |
|
|
Term
|
Definition
○ Content generated by another program (script) ○ Creates/retrieves the requested information ○ Slower web delivery |
|
|
Term
|
Definition
○ URL = Uniform Resource Locator ○ The path component to a local file system resource or internal/external program name on the web server |
|
|
Term
HTML Stateless Connections: |
|
Definition
A communication protocol that treats every request as an independent transaction. It does not require the server to retain session information or status for the duration of multiple requests. |
|
|
Term
HTML Persistent Connections: |
|
Definition
Using a single TCP connection to send/receive multiple HTTP requests/responses as opposed to a new connection for every request. This allows for less resources to be consumed on the server. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
TCP/UDP SSH, and other secure protocols |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|