D315 Network & Security

0.0(0)
Studied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:13 AM on 1/13/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

31 Terms

1
New cards

IT Governance

The framework that ensures that IT investments support the organization's business goals and deliver value.

2
New cards

GDPR

The General Data Protection Regulation, a comprehensive data privacy law in the European Union that regulates how personal data is processed and protected.

3
New cards

FERPA

The Family Educational Rights and Privacy Act, a U.S. federal law that protects the privacy of student education records.

4
New cards

FISMA

The Federal Information Security Management Act, which mandates that U.S. federal agencies develop, document, and implement an information security system.

5
New cards

Personal Data Privacy in the EU

The main focus of GDPR, ensuring the protection of individuals' personal data and enhancing privacy rights.

6
New cards

PIPEDA

The Personal Information Protection and Electronic Documents Act, which governs how private sector organizations in Canada collect, use, and disclose personal information.

7
New cards

GLBA

The Gramm-Leach-Bliley Act, which requires U.S. financial institutions to protect consumers' personal financial information.

8
New cards

PCI DSS

The Payment Card Industry Data Security Standard, a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.

9
New cards

HIPAA

The Health Insurance Portability and Accountability Act, which establishes national standards for the protection of health information.

10
New cards

ifconfig

A command-line utility in Unix/Linux used to configure network interfaces, display network configuration, and manage IP addresses.

11
New cards

arp

The Address Resolution Protocol command that displays the mapping of IP addresses to MAC (Media Access Control) addresses within a local network.

12
New cards

netstat

A command-line tool that provides information about active network connections, routing tables, and network interface statistics.

13
New cards

nslookup

A command used to query DNS servers for information regarding domain names and IP addresses, primarily for troubleshooting.

14
New cards

scp

The Secure Copy Protocol, used for securely transferring files between hosts using SSH (Secure Shell) for encryption.

15
New cards

dig command

The command-line utility that queries DNS servers for detailed DNS information like resource records.

16
New cards

tcpdump

A network packet analyzer command-line tool that captures and displays packets being transmitted or received over a network.

17
New cards

whois

A command that provides information about the ownership of domains or IP addresses, including registration details.

18
New cards

FTP

The File Transfer Protocol, a standard network protocol used for transferring files without encryption by default.

19
New cards

finger

A command-line tool that displays information about users on a remote system, such as login status and user details.

20
New cards

SSH

The Secure Shell protocol, widely used for secure remote control of computers, enabling encrypted communication in a network.

21
New cards

TFTP

The Trivial File Transfer Protocol, a simple, unsecure file transfer protocol that uses UDP (User Datagram Protocol) for fast transfers.

22
New cards

cat

A command used in Unix/Linux to display the contents of files, concatenate multiple files, and create new files.

23
New cards

SFTP

The SSH File Transfer Protocol, a secure version of FTP that encrypts data transfers, ensuring both security and privacy.

24
New cards

nmap

A network scanning tool used to discover hosts and services on a computer network, helpful for security auditing and network inventory.

25
New cards

Protection of Credit Card Holder Data

The primary objective of PCI DSS to safeguard sensitive cardholder information and prevent data breaches.

26
New cards

Information Security for U.S. Federal Agencies

The primary focus of FISMA, aimed at securing federal information systems against unauthorized access and cyber threats.

27
New cards

route

A command used to view and manipulate the routing table of a local system, showing how data packets are directed through networks.

28
New cards

Telnet

A protocol that enables remote terminal connection to computers over a network, considered insecure since it transmits data unencrypted.

29
New cards

Active Network Connections

Network connections currently established on a system, viewable through the netstat command.

30
New cards

Look Up IP Addresses

The purpose of the nslookup command to retrieve IP addresses associated with given domain names.

31
New cards

File Transfer Protocol

The acronym FTP stands for File Transfer Protocol, a method for transferring files across a network.