1/32
These flashcards cover key terms and definitions related to networking concepts, protocols, and security risks.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Network
A collection of interconnected devices that can communicate with each other to share resources and information.
Internet
A global network of networks connecting millions of private, public, academic, business, and government networks using standardized communication protocols.
Bandwidth
The maximum rate of data transfer across a network path, typically measured in bits per second (bps). It indicates the capacity of the network to transmit data.
Latency
The time it takes for data to travel from the source to the destination across a network, usually measured in milliseconds (ms).
Jitter
The variation in latency over time in a network, which can cause packets to arrive out of order.
Datastream
A continuous flow of data transmitted over a network, consisting of various types of data including audio, video, or text.
Vint Cerf and Bob Kahn
The two engineers credited with designing the Internet's protocols, specifically the Transmission Control Protocol (TCP) and the Internet Protocol (IP).
Redundancy
In networking, the inclusion of extra components or connections that are not strictly necessary for functionality, providing backup in case of failure.
Protocol
A set of rules and conventions for communication between network devices, defining how data is transmitted, received, and interpreted.
Internet Protocol (IP)
A protocol crucial for routing data packets across networks, providing addressing to ensure data is sent to the correct destination.
IPv4 Address
A standard IPv4 address is 32 bits long and can provide approximately 4.3 billion unique IP addresses.
IPv6
The new version of IP that will eventually replace IPv4, using 128 bits for addressing and capable of providing approximately 340 undecillion unique IP addresses.
Domain
A human-readable address used to identify a location on the Internet, typically associated with a specific IP address.
Domain Name System (DNS)
A system that translates human-readable domain names into IP addresses, enabling users to access websites using easy-to-remember names.
Hypertext Transfer Protocol (HTTP)
A protocol used for transmitting hypertext (web pages) over the Internet, defining how messages are formatted and transmitted.
GET request
An HTTP method used to request data from a specified resource, typically a web page or file from a server.
Packet
A formatted unit of data carried by a packet-switched network, containing both the data being transmitted and control information for routing.
Transmission Control Protocol (TCP)
A connection-oriented protocol that ensures reliable data transmission by establishing a connection, sequencing packets, and providing error-checking.
User Datagram Protocol (UDP)
A connectionless protocol that allows for faster data transmission without the overhead of establishing a connection or ensuring reliability.
Cookie
A small piece of data stored on a user's device by a web browser while browsing a website, used to remember user preferences and session information.
SSL (Secure Sockets Layer)
An older protocol providing secure communication over a computer network, ensuring data integrity and confidentiality.
TLS (Transport Layer Security)
The modern version of SSL providing improved security features.
Certificate Authorities (CAs)
Entities that issue digital certificates to verify the identity of websites and encrypt data transmitted between users and servers.
DDoS attack
A Distributed Denial of Service attack that overwhelms a target server or network with traffic from multiple sources.
Man-in-the-Middle (MitM) attack
An attack where an attacker intercepts and potentially alters communication between two parties without their knowledge.
DNS Tunneling
A technique used to encode data within DNS queries and responses, allowing attackers to bypass network security.
SQL Injection
A code injection technique exploiting vulnerabilities in an application's software by inserting malicious SQL queries.
Phishing attack
A cyber attack that tricks individuals into providing sensitive information by masquerading as a trustworthy entity.
Ransomware
Malicious software that encrypts a victim's files, rendering them inaccessible until a ransom is paid to the attacker.
Rootkit
Malicious software designed to gain unauthorized access to a computer or network while hiding its presence.
Keylogger
Surveillance software that records keystrokes made by a user, capturing sensitive information.
Virus
A malicious program that attaches to legitimate files and spreads when those files are shared.
Worm
Standalone malware that replicates itself to spread across networks without user intervention.