click below
click below
Normal Size Small Size show me how
Exam Def-Terms #2
Exam Prep Def-Terms #2
| Term | Definition |
|---|---|
| DoS | A Denial of Service (DoS) attack disables a service by overwhelming it with requests. (Attacks based on the ICMP echo reply called a Smurf Attack) |
| DDoS | Distributed Denial of Service (DDoS) is similar to DoS but is initiated from multiple stations simultaneously. (Attacks based on the ICMP echo reply called a Smurf Attack) |
| White Hats | This term refers to ethical hackers who are experts in compromising computer security systems. White hats use their abilities for good (legal) purposes. (ETHICAL) |
| Gray Hats | These are indifferent hackers who fall somewhere between white hats and black hats. Sometimes Legal, Sometimes Illegal. (Usually, gray hat hackers DON'T CARE) |
| Black Hats | These are malicious hackers who violate computer security mostly for personal gain, such as money, power, politics, revenge, or even just for the sake of causing damage. (UNETHICAL)) |
| Defense in Depth (DiD) | DiD refers to a Multi-Layered Security Structure. Each layer provides different security measures.(Physical, Network, Host, Application & Data) |
| Internet | The internet (or the World Wide Web, AKA, the web) is a massive, distributed client server information system. Many kinds of applications run concurrently over the web, such as browsers, email, file transfer protocols, audio and video streaming, etc. |
| Endpoint Devices | Devices connected to a network, such as computers, servers, phones, and IoT devices. |
| Clients | Devices or software that use different services provided by servers. They establish communication with a server and request its services. Clients can also refer to software, such as browsers. The browser is a client that uses the services provided by HTTP servers. |
| Computers | MACHINES that can perform calculations, accomplish complicated operations, and execute programs based on a sequence of commands and inserted input. |
| Servers | Powerful computers designed to Serve Information to other Computers, such as web services, storage services, and email services. (Servers provide Services) |
| Networks | MULTIPLE COMPUTERS CONNECTED and COMMUNICATING together in a specific configuration. |
| Local Area Network (LAN) | A network composed of two or more computers communicating with each other to form a SMALL Network |
| Wide Area Network (WAN) | MULTIPLE LANs that spread over a LARGE geographical area. The internet can be considered a WAN. |
| Packets | DATA transmitted across a network. (PACKAGE SENT ACROSS THE INTERNET) |
| Switch (DATA LINK LAYER) | A network device designed to RECEIVE & FORWARD Packets based on their MAC addresses within a network. (CONNECTS DEVICES) |
| Router (NETWORK LAYER) | A Network Device designed to forward packets based on their IP Addresses between Networks. (CONNECTS PACKETS) |
| Protocols | Predefined sets of RULES describing how something should work or behave. They help maintain order among different technologies. |
| Client/Server Communication | The client-server model is a distributed application structure that manages tasks and workloads. (The CLIENTS SEND REQUESTS to the SERVER and the SERVER RESPONDS to the CLIENT REQUESTS) |
| CPU | This unit of the computer performs basic arithmetic, logic, controlling and input/output (I/O) operations specified by the instructions in the program. |