1/32
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Internetworking
Interconnected networks
The Internet
Network of networks
Advanced Research Project Agency (ARPANET) (1969)
The nuclear war myth that the internet was invented for nuclear war
TCP/IP
The two most important protocols in the protocol suite
IPv4 Addresses
Four fields separated by periods, each field ranging from 0–255
TCP
Controls the transmission of data
IP
Provides the address of the device for TCP to read and transmit it
Tim Berners-Lee
Invented the first browser (WorldWideWeb browser)
Mosaic (Marc Andreessen)
Created after the first browser
Browser
Allows users to navigate the web and access search engines and other resources
Hypertext Markup Language (HTML)
Standard markup language used to create and structure content on the World Wide Web
Hypertext Transfer Protocol (HTTP)
A protocol browsers implement to transfer messages from servers to computers
Uniform Resource Locator (URL)
Unique location
Domain Name Server (DNS)
Universal address translator so users don’t have to remember IP addresses
Search Engine
A large database
Cloud Workload Optimized
Get what you pay for/need
Cloud Computing
Computing services over networks
ASP to XaaS
ASP is a cloud computing service
Web Services and Service-Oriented Architecture (SOA)
Software objects that build scalable applications
Internet of Things (IoT)
Various devices beyond traditional computers connected to the internet
Cookies
Unexecutable text files deposited by servers to track users and maintain state
Spyware
Gathers user data through email, settings, and clickstreams and sends it to third parties with or without authorization
Phishing
Fraudulent messages designed to trick users into revealing sensitive information
Ransomware
Hijacks data or files for payment
Zero-Day Vulnerability
Newly discovered software weakness exploited before it is fixed
Multi-Factor Authentication
Uses knowledge (password, PIN), inherence (biometrics), and possession (fob, code, QR) factors
Public Key Infrastructure (PKI)
System for issuing public/private key pairs and digital certificates
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access
Symmetric vs Asymmetric Encryption
Symmetric uses the same key
Private vs Public Key
Public key is shared
Digital Signature
Data represented as bits and bytes encrypted with a private key
Blockchain
Distributed database that stores records in a way that is difficult to tamper with
Social Engineering
Manipulating users into revealing personal information by asking relevant questions