Summary: Internet Security

Study material generic cover image
  • This + 400k other summaries
  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
PLEASE KNOW!!! There are just 33 flashcards and notes available for this material. This summary might not be complete. Please search similar or other summaries.
Use this summary
Remember faster, study better. Scientifically proven.
Trustpilot Logo

Read the summary and the most important questions on Internet security

  • 1 Handout 1

    This is a preview. There are 23 more flashcards available for chapter 1
    Show more cards here

  • Data link layer

    Packets are transformed to error free-frames. Uses HW adresses to transmit frames amongst physically conected devices. Divided into two sublayers: Logical link control (LLC): manages connections between two peers, providing error and flow control.
    Media acces control (MAC): Transmits/receives frames. Logical topologies and HW adresses are defined here.
  • What are the two functions of the internetprotocol?

    Adressing: (IP of destination used until reached)
    Fragmentation: Subdivision of packets depending on their size (it's a connectionless protocol, non error free.
  • Routing information protocol (RIP)

    Uses distance vector algorithms to determine direction and distance to any link. Selects the path with the least hops.
  • What are the advantages and disadvantages of OSPF?

    Advantage: smaller and more frequent updates
    Disadvantage: Requires large amount of CPU and memory
  • Border gateway protocol (BGP)

    Replaces exterior gateway protocol for fully decentralized routing
  • Internet control message protocol (ICMP) (two main catogories)

    ICMP error messages and ICMP query messages
  • Important functions of ICMP protocol

    Announce network erros
    Announce network congestion
    Announce timeouts
    Assist troubleshooting
  • Example of an man in the middle attack? MITM

    ICMP redirect attack
  • What are the important protocols of the transport layer?

    UDP (user datagram protocol) connectionless unreliable protocol
    TCP (Transmission control protcol) connection-oriented reliable protocol ( providing integrity)

    Guaranteed communication session via TCP three way handshake
  • Architecture of presentation layer

    Services:
    Data conversion
    Character code translation
    Compression
    Encryption/decryption
    Sublayers:
    CASE (Common application service element)
    SASE (Specific application service element)
PLEASE KNOW!!! There are just 33 flashcards and notes available for this material. This summary might not be complete. Please search similar or other summaries.

To read further, please click:

Read the full summary
This summary +380.000 other summaries A unique study tool A rehearsal system for this summary Studycoaching with videos
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart