UTS
Ubiquitous Technical Surveillance
Physical Layer
Layer 1
Physical, Data Link, Network, Transport, Session, Presentation, Application
Where the user interacts with the computer
Application Layer
OSI
Open Systems Interconnect
Presentation Layer
Layer 6
What are the 5 pillars of UTS
Finance, Travel, Physical/Visual, Electronic and Internet
Three-Way Handshake
SYN, SYN/ACK, ACK
This protocol is considered reliable transmission
Transmission Control Protocol (TCP)
The OSI Model is broken into 7 _______
Layers
This layer uses MAC addresses
Data Link Layer (Layer 2)
Responsible for setting up, managing, and then tearing down sessions
Session Layer
CIS
Center for Internet Security
Network Layer
Layer 3
This layer uses IP addressing
Determines the best routing path for data travel
Network Layer
OSI Layers from top to bottom Layers 7 to 1
Application, Presentation, Session, Transport, Network, Data Link, Physical
In this form of flow control, data is sent in groups of segments that require only one acknowledgment.
Windowing
BIOS
Basic Input Output System
Maintains flow control through buffering or windowing
Transport Layer
Layer 4
Correct order for encapsulation
Data, Segment, Packet, Frame, Bits
Type of DoS attack which aims to make a server unavailable to legitimate traffic by consuming all available server resources
SYN Flood