A | B |
I. P. Address | identify hosts |
Binary number | 1, and 0's base 2 |
Boolean | 1=true or 0=false |
Kilobytes | 1024 bytes |
Bit | one digit 1 or 0 |
Byte | 8 digits made of 1s and 0s |
Megabytes | 1,048,576 bytes |
Gigabytes | 1,073,741,824 bytes |
the Internet Assigned Numbers Authority(IANA) | Assigns IP Addresses |
Netblocks | large number of IP addresses assigned to an ISP |
ISP | Provides Internet service to many customers |
Routing table | data base of known networks |
Convergence | reconstruction of the networks routes to avoid a downed router |
DHCP | assigns IP addresses to hosts on a network |
Gateway | allows communication between hosts on different networks |
Classiful IP addressing | Net blocks assigned by size |
Subnet mask | splits large networks into smaller networks using binary blocking of part of the address |
Classless interdomain routing (CIDR) | ISP increased the number of IP addresses by subnet masking |
supernetting | increasing size of network through subnet mask |
subnetting | breaking network into smaller networks using subnet mask |
Spyware | spy on a users web browsing habits, monitor e-mail communications and keystrokes. |
Trojan Horses | once opened by users open backdoor programs |
Worms | scan internet addresses to look for systems vulnerabilities to infect |
Malware | rouge applications, malicious software |
Direct hacking | attempt to penetrate a computer system from the Internet |
payload | program or file delivered to a vulnerable system by a worm or virus |
ICS | hides existence of computer systems by sharing a connection with the Internet |
NAT | Translates local network addresses to hide existance from Internet attackers |
Packet filtering | inspecting packet headers to determine if they are allowed to enter the network |
Stateful Packet filtering | packets leaving the network are logged and only packets that are expected are allowed on the network |
exceptions | rules that allow some inbound traffic to enter |
Allowed traffic | packet allowed past the firewall |
logging | history of acceptance and rejection events |
Firewall | blocks external connections from system ports |
ICMP | maintenance protocol that reports errors and allows connectivity-ping, tracert, etc. |
WMI(Windows Management Instrumentation | provides hook for 3rd party firewall vendors |
IDS (Intrusion Detection system) | Pfirewall.log file stored in %SYSTEMROOT%logs attempts to connect to web server |
403 error | can indicate someone is attempting to crack a password |
404 error | may indicate worm attempting to locate vulnerable web server apps |
DNS | database that maps domain names to IP addresses |