Understanding the OSI Model and Network Protocols

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/95

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

96 Terms

1
New cards

Physical Layer

1-electrical and physical components

2
New cards

Data Link Layer

2- provides connection with host on same network

3
New cards

Network Layer

3- Provides connection to the host on different networks

4
New cards

Transport Layer

4- provides transparent transfer of data- TCP & UDP

5
New cards

Session Layer

5- controls dialogue between two computers

6
New cards

Presentation Layer

6- Provides a context for communication between layers. Encryption and decryption, compression. EX: firewalls, gateways

7
New cards

Application Layer

7- Network Applications- mail, web, file transfer ex: PCs, phones

8
New cards

Bits

Data at Layer 1

9
New cards

Frame

Data at Layer 2

10
New cards

Packet

Data at Layer 3

11
New cards

Segment

Data at Layer 4

12
New cards

Upper Layer Data

Data at Layers 5-7

13
New cards

Hub

Layer 1- Physical layer- Broadcast data to all connected devices.

14
New cards

Switch

Layer 2, Data Link layer, Connect devices within a network and enable efficient data using MAC address

15
New cards

Router

Layer 3, network layer- Route to the best path for a network

16
New cards

Domain Name System (DNS)

Translates domain names into IP addresses so you can get on the internet. Also called white pages

17
New cards

Subnet Mask

32 bit number that distinguishes the network address and the host address within an IP address

18
New cards

Default Gateway

Network node that acts as a forwarding host between a user's network and other networks.

19
New cards

Private/Internal IP Class A

10.0.0.0-10.255.255.255

20
New cards

Private/Internal IP Class B

169.254.0.0-169.254.255.255

21
New cards

Private/Internal IP Class C

192.168.0.0-192.168.255.255

22
New cards

Firewall

Protects a computer network by monitoring and regulating incoming traffic and outgoing network traffic.

23
New cards

Ipconfig

Finds the IP address of the pc or whatever you are working on

24
New cards

Tracert

Provides a map of how data on the internet travels from its source to its destination

25
New cards

Nslookup

Domain name server lookup

26
New cards

Ping

Determines whether a particular host is reachable across the internet.

27
New cards

TCP

Transmission Control Protocol- Secure- exchange messages over the network

28
New cards

UDP

User Datagram Protocol- Unsecure- best effort connections and no flow controls, faster than TCP but not guaranteed

29
New cards

Localhost IPv4

127.0.0.1

30
New cards

Localhost IPv6

0000:0000:0001

31
New cards

IPv4 Advantages

Simplicity, widespread use, established infrastructure.

32
New cards

IPv4 Disadvantages

Address exhaustion, network complexity, security

33
New cards

IPv6 Advantages

Larger address space, simplified network config, improved security.

34
New cards

IPv6 Disadvantages

Adoption Changes, complexity in transition, learning curve

35
New cards

Decimal Subnet Mask

255.255.255

36
New cards

Binary Subnet Mask

11.111111111

37
New cards

Network ID

The amount of 255s in a subnet mask

38
New cards

Host ID

Everything after the network ID in an IP address

39
New cards

Class A Default Subnet Mask

255.0.0.0

40
New cards

Class B Default Subnet Mask

255.255.0.0

41
New cards

Class C Default Subnet Mask

255.255.255.0

42
New cards

Managed Switch

Allows more control over network, can switch on/off

43
New cards

Unmanaged Switch

Plug and play, can't manage it.

44
New cards

TCP Handshake

Three step process to establish connection. SYN> SYN-ACK > ACK

45
New cards

SYN

Synchronize- send packet to ensure connection

46
New cards

SYN-ACK

Synchronize-Acknowledgement- server receives SYN and responds with SYN-ACK to inform the receipt

47
New cards

ACK

Client receives SYN-ACK and sends ACK back to server to acknowledge this transfer

48
New cards

Common Port 25/252/465/587

SMTP simple mail transfer Protocol, TCP

49
New cards

Common Port 80/443

HTTP/ HTTPS- hypertext transfer protocol, TCP

50
New cards

Common Port 110/995

POP3- post office protocol, TCP

51
New cards

Common Port 143/993

IMAP-internet message access Protocol, TCP & UDP

52
New cards

Common Port 23

Telnet- TCP

53
New cards

Common Port 20,21

FTP- TCP

54
New cards

Common Port 53

DNS, TCP & UDP

55
New cards

Common Port 3389

Remote desktop protocol, RDP, TCP

56
New cards

Well-Known Ports

0-1023- assigned by Internet assigned Numbers Authority

57
New cards

Registered Ports

1024-49151- managed by IANA, design for specific applications that are not Well-known ports

58
New cards

Dynamic/Private Ports

49152-65535-not assigned by IANA, typically used for temp connections

59
New cards

Inbound Ports

Used for incoming connections from the outside

60
New cards

Outbound Ports

Used for outgoing connections

61
New cards

DHCP

Dynamic Host Configuration Protocol- automatically assigns IP addresses within a network

62
New cards

Bit

0 or 1

63
New cards

Byte

Normally 8 bits, can represent 256 values (0-255)

64
New cards

MAC Address

Physical address on the NIC, uniquely identified on a local network

65
New cards

Firewall Purpose

Security device that controls incoming & outgoing traffic in a network by rule based filtering

66
New cards

Host Based Firewalls

Installed on an individual host

67
New cards

Network Based Firewalls

Protect entire network

68
New cards

Virus

Malicious program that attaches itself to files or programs

69
New cards

Trojan Horse

Disguised as legit software, it is actually a virus

70
New cards

Spyware

Software that spies on a user's activity

71
New cards

Logic Bomb

Piece of code that is triggered by a specific action

72
New cards

Ransomware

Virus that attacks for money

73
New cards

Cyber Threats

Malware- malicious software

74
New cards

Denial of Service (DOS)

Overloading a network with traffic to shut it down

75
New cards

Security Breaches

Someone gains access to unauthorized places

76
New cards

Web Attacks Hijacking

Session control of a web app, allows them to install malware and see their data

77
New cards

DNS Poisoning

Corrupt the DNS Cache, users can be directed to fraudulent websites

78
New cards

Insider Threats

Security risks posed by workers of the company

79
New cards

SQL Injections

Code injection technique where attackers insert malicious code

80
New cards

Zero-Day

Attack unknown vulnerabilities that has no patch/fix

81
New cards

Man-In-The-Middle

Attack between a user and the internet

82
New cards

Risk Assessment

Process of analyzing risks

83
New cards

Network Address Translation (NAT)

Mapping IP addresses between public and private networks. Used to protect private networks from public networks

84
New cards

White Hats

Ethical hackers improving security

85
New cards

Black Hats

Malicious hackers

86
New cards

Gray Hats

Hackers operating in a morally ambiguous space

87
New cards

Sneakers

Ethical hackers testing systems

88
New cards

Ethical Hackers

Professionals hired to secure systems

89
New cards

Script Kiddies

Inexperienced hackers

90
New cards

Hacktivist

Use hacking to promote political views or social changes

91
New cards

Cybercriminals

Engage in stealing illegal info for money

92
New cards

Nation State

Government affiliated hackers who do cyber espionage

93
New cards

Cyberterrorists

Non-state actors using cyber attacks to instill political fear

94
New cards

Competitor Threat

Actions taken by rival competitors in the industry to steal the company's info/plans

95
New cards

Cyberwarfare

Nation-state that tries to achieve military strength by cyber attacks

96
New cards

Address Resolution Protocol (ARP)

Maps a device's IP address to its MAC Address