Network Security W10

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

What is the purpose of a network?

To allow the exchange of information between hosts using applications governed by protocols.

2
New cards

How is data transmitted in a network?

Through packets using various access media, links, packet switches, and protocols like HTTP, FTP, SMTP, TCP, and IP.

3
New cards

What is a network architecture?

A set of layers and protocols that define how data is transmitted over a network.

4
New cards

What is a protocol in networking?

A set of rules or agreements between layers that govern data communication.

5
New cards

What are the components of the layered network model?

Layers, services, interfaces, entities, and protocols.

6
New cards

What is a helpful mnemonic for the TCP/IP model?

"Armadillos Take In New Ants" → Application, Transport, Internet, Network Access.

7
New cards

Where is security implemented in the OSI model?

  • Physical: Secure cables/fiber

  • Data Link: Point-to-point encryption

  • Network: IPsec, firewalls

  • Transport: Encrypted connections

  • Intermediate: Secure Socket Layer (SSL)

8
New cards

What is cryptography?

A security tool that uses encryption to limit message access to intended recipients.

9
New cards

What are the components of encryption?

A set of keys, messages, and ciphertext.

10
New cards

What is a major drawback of symmetric encryption?

The need to securely share the key, which compromises security if intercepted.

11
New cards

What is public key cryptography?

Encryption using a public key and decryption using a private key.

12
New cards

Why is public key encryption more secure than symmetric?

Only the receiver has the private key to decrypt the message.

13
New cards

What is a substitution cipher?

A cipher that replaces one letter with another.

14
New cards

What is a transposition cipher?

A cipher that rearranges the order of characters without changing them.

15
New cards

What is a product cipher?

A cipher combining multiple steps of substitution and transposition.

16
New cards

What is DES?

Data Encryption Standard; processes 64-bit blocks in 19 iterations using transpositions and combinations.

17
New cards

What is AES?

Advanced Encryption Standard; uses 128-bit encryption keys for stronger security.

18
New cards

What is cipher block chaining?

An encryption method where each encrypted block is fed into the next encryption step.

19
New cards

What is symmetric key cryptography?

Encryption and decryption using the same shared key.