network 2 ( vocab)

Cards (18)

  • Media Access Control Address (MAC)  = This is the physical address of any device -- such as the NIC in a computer -- on the network. This is made up of two equal parts, is 6 bytes long. The first 3 bytes identify the company that made the NIC. The second 3 bytes are the serial number of the NIC itself.
  • Network = This is a group of computers connected together in a way that allows information to be exchanged between the computers.
  • Network Interface Card (NIC) = Every computer (and most other devices) is connected to a network through this. In most desktop computers, this is an Ethernet card (normally 10 or 100 Mbps) that is plugged into a slot on the computer's motherboard.
  • Root DNS Servers = The authoritative name servers that serve the DNS root zone are a network of hundreds of servers in many countries around the world. They are configured in the DNS root zone as 13 named authorities, as follows.
  • Topology = This is the way that each node is physically connected to the network (more on this in the next section).
  • Symmetric Key Encryption = Symmetric encryption is a form of computerized cryptography using a singular encryption key to both encrypt and decrypt the message.  Anyone with this key can access the message.
  • Asymmetric Key Encryption (Public/Private key encryption) = An encryption technique that uses a paired public and private key (or asymmetric key) algorithm for secure data communication. A message sender uses a recipient's public key to encrypt a message. The recipient must use their private key to decrypt the message.
  • Diffie-Hellman Key Exchange = Diffie-Hellman is a way of generating a shared secret between two people in such a way that the secret can't be seen by observing the communication. That's an important distinction: You're not sharing information during the key exchange; you're creating a key together.
  • RSA Algorithm = Generates Public/Private Key pair to be used for encrypting/decrypting messages
  • Secure Sockets Layer (SSL) = Deprecated predecessor to TLS
  • Transport Layer Security (TLS) = Transport Layer Security (TLS) is a protocol that provides privacy and data integrity between two communicating applications. It's the most widely deployed security protocol used today, and is used for Web browsers and other applications that require data to be securely exchanged over a network, such as file transfers,   VPN connectionsinstant messaging and voice over IP.
  • Monoalphabetic Cipher = Whole code is based on one letter standing in for another in the alphabet
  • Digital Certificates = A digital certificate authenticates the Web credentials of the sender and lets the recipient of an encrypted message know that the data is from a trusted source. A digital certificate is issued by a certification authority (CA).
  • Certificate Authority (CA) = A certificate authority (CA) is a trusted entity that issues security certificates and public keys that are used for secure communication in a public network. The CA is responsible for confirming the identity and credentials of the entity for which they generate a certificate.  The CA is the authority that is consulted when a computer wishes to confirm the validity of a provided digital certificate.
  • Encryption = It is the process of locking up information using cryptography. Information that has been locked this way is encrypted.
  • Decryption = The process of unlocking the encrypted information using cryptographic techniques.
  • Key = A secret like a password used to encrypt and decrypt information. There are a few different types of keys used in cryptography.
  • Steganography = It is actually the science of hiding information from people who would snoop on you. The difference between steganography and encryption is that the would-be snoopers may not be able to tell there’s any hidden information in the first place.