Cybersecurity Definitions O 0 0

Posted ByVoror

Octet

An octet is a unit of digital information that consists of eight bits. Octets are generally displayed using a variety of representations, for example in the hexadecimal, decimal, or octal number systems. The binary value of all 8 bits set (or turned on) is 11111111, equal to the hexadecimal value ff, the decimal value 255, and the octal value 377. One octet can be used to represent decimal values ranging from 0 to 255.

One way encryption

One-way encryption or one-way hash function is designed in a manner that it is hard to reverse the process, that is, to find a string that hashes to a given value (hence the name one-way). A good hash function makes it hard to find two strings that would produce the same hash value.

One way function

A one-way function is any function that is easy to compute on every input, but hard to invert given the image of a random input.

Open shortest path first ospf

An open shortest path first (ospf) is a routing protocol for ip networks and uses a link-state routing algorithm. It falls into the group of interior routing protocols, operating within a single autonomous system (as). Ospf is the most commonly used interior gateway protocol (igp) in large enterprise networks.

Osi layers

The open system interconnection (osi) model defines a networking framework to implement protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy. The osi model takes the task of internetworking and divides that up into what is referred to as a vertical stack that consists of the following layers. 1. Physical (layer 1) – this layer conveys the bit stream, electrical impulse, light, or radio signal through the network at the electrical and mechanical level. Fast ethernet, rs232, and atm are protocols with physical layer components. 2. Data link (layer 2) – at this layer, data packets are encoded and decoded into bits. The data link layer is divided into two sub layers: the media access control (mac) layer and the logical link control (llc) layer. 3. Network (layer 3) – this layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. 4. Transport (layer 4) – this layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer. 5. Session (layer 5) – this layer establishes, manages and terminates connections between applications. 6. Presentation (layer 6) – this layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. 7. Application (layer 7) – this layer supports application and end-user processes. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and ftp are applications that exist entirely at the application level.

Osi

Osi stands for open system interconnection and is an iso standard for worldwide communications. Osi defines a networking framework for implementing protocols in seven layers. Osi defines seven layers of functions that take place at each end of a communication. Although osi is not always strictly adhered to in terms of keeping related functions together in a well-defined layer, many products involved in telecommunication attempt to describe themselves in relation to the osi model.

Overload

Overload is defined as the limitation of system operation by excessive burden on the performance capabilities of a system component.

** The time is base on America/Chicago timezone