Студопедия.Орг Главная | Случайная страница | Контакты | Мы поможем в написании вашей работы!  
 

Introduction. We have received numerous requests to provide a summary glossary for our publications and other relevant sources



We have received numerous requests to provide a summary glossary for our publications and other relevant sources, and to make the glossary available to practitioners. As a result of these requests, this glossary of common security terms has been extracted from NIST Federal Information Processing Standards (FIPS), the Special Publication (SP) 800 series, NIST Interagency Reports (NISTIRs), and from the Committee for National Security Systems Instruction 4009 (CNSSI-4009). The glossary includes most of the terms in the NIST publications. It also contains nearly all of the terms and definitions from CNSSI-4009. The glossary provides a central resource of terms and definitions most commonly used in NIST information security publications and in CNSS information assurance publications. For a given term, we do not include all definitions in NIST documents – especially not from the older NIST publications. Since draft documents are not stable, we do not refer to terms/definitions in them.

It is our intention to keep the glossary current by providing updates online. New definitions will be added to the glossary as required, and updated versions will be posted on the Computer Security Resource Center (CSRC) Web site at http://csrc.nist.gov/.

Access – Ability to make use of any information system (IS) resource. SOURCE: SP 800-32 Ability and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions. SOURCE: CNSSI-4009
Access Control – The process of granting or denying specific requests to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., federal buildings, military establishments, border crossing entrances). SOURCE: FIPS 201; CNSSI-4009
Active Attack – An attack that alters a system or data.
Active Security Testing – Security testing that involves direct interaction with a target, such as sending packets to a target.
Activities – An assessment object that includes specific protection-related pursuits or actions supporting an information system that involve people (e.g., conducting system backup operations, monitoring network traffic).
Advanced Encryption Standard – (AES) The Advanced Encryption Standard specifies a U.S. government-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. This standard specifies the Rijndael algorithm, a symmetric block cipher that can process data blocks of 128 bit A U.S. government-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information.
Agent – A program used in distributed denial of service (DDoS) attacks that send malicious traffic to hosts based on the instructions of a handler. Also known as a bot. SOURCE: SP 800-61 A program acting on behalf of a person or organization. SOURCE: SP 800-95
Alert – Notification that a specific attack has been directed at an organization’s information systems. SOURCE: CNSSI-4009
Anomaly-Based Detection – The process of comparing definitions of what activity is considered normal against observed events to identify significant deviations. SOURCE: SP 800-94
Anti-jam – Countermeasures ensuring that transmitted information can be received despite deliberate jamming attempts. SOURCE: CNSSI-4009
Anti-spoof – Countermeasures taken to prevent the unauthorized use of legitimate Identification & Authentication (I&A) data, however it was obtained, to mimic a subject different from the attacker.
Application – A software program hosted by an information system.
Asset – A major application, general support system, high impact program, physical plant, mission critical system, personnel, equipment, or a logically related group of systems. SOURCE: CNSSI-4009
Asymmetric Cryptography – See Public Key Cryptography. SOURCE: CNSSI-4009
Asymmetric Keys – Two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification. SOURCE: FIPS 201
Attack – An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
Audit – Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures.
Audit Data – Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
Audit Log – A chronological record of system activities. Includes records of system accesses and operations performed in a given period.
Authenticate – To confirm the identity of an entity when that identity is presented. To verify the identity of a user, user device, or other entity.
Authentication – Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Authentication – The process of establishing confidence of authenticity. SOURCE: FIPS 201
Authentication – Encompasses identity verification, message origin authentication, and message content authentication. SOURCE: FIPS 190
Authentication – A process that establishes the origin of information or determines an entity’s identity. SOURCE: SP 800-21 The process of verifying the identity or other attributes claimed by or assumed of an entity (user, process, or device), or to verify the source and integrity of data.
Authority – Person(s) or established bodies with rights and responsibilities to exert control in an administrative sphere. SOURCE: CNSSI-4009
Authorization – Access privileges granted to a user, program, or process or the act of granting those privileges.
Autonomous System (AS) – One or more routers under a single administration operating the same routing policy. SOURCE: SP 800-54
Availability – Ensuring timely and reliable access to and use of information.
Back Door – Typically unauthorized hidden software or hardware mechanism used to circumvent security controls. SOURCE: CNSSI-4009
Backdoor – An undocumented way of gaining access to a computer system.
Backup – A copy of files and programs made to facilitate recovery, if necessary.
Biometric – A physical or behavioral characteristic of a human being.
Biometric – A measurable physical characteristic or personal behavioral trait used to recognize the identity, or verify the claimed identity, of an applicant. Facial images, fingerprints, and iris scan samples are all examples of biometrics.
Block Cipher – A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm, the length of the input block is the same as the length of the output block.
Boundary – Physical or logical perimeter of a system.
Boundary Protection – Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communication, through the use of boundary protection devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).
Brute Force Password Attack – A method of accessing an obstructed device through attempting multiple combinations of numeric and/or alphanumeric passwords.
Certificate – A digital representation of information which at least 1) identifies the certification authority issuing it, 2) names or identifies its subscriber, 3) contains the subscriber's public key, 4) identifies its operational period, and 5) is digitally signed by the certification authority issuing it. SOURCE: SP 800-32
Certificate Management – Process whereby certificates (as defined above) are generated, stored, protected, transferred, loaded, used, and destroyed.
Certificate Revocation List (CRL) – A list of revoked public key certificates created and digitally signed by a Certification Authority.
Certification Authority A trusted entity that issues and revokes public key certificates.
Cipher – Series of transformations that converts plaintext to ciphertext using the Cipher Key. SOURCE: FIPS 197 Any cryptographic system in which arbitrary symbols or groups of symbols, represent units of plain text, or in which units of plain text are rearranged, or both.
Cipher Suite – Negotiated algorithm identifiers. Cipher suites are identified in human-readable form using a pneumonic code.
Ciphertext – Data output from the Cipher or input to the Inverse Cipher. SOURCE: FIPS 197 Data in its enciphered form.
Clear Text – Information that is not encrypted.
Clearing – Removal of data from an information system, its storage devices, and other peripheral devices with storage capacity, in such a way that the data may not be reconstructed using common system capabilities (i.e., through the keyboard);
Cloud Computing – A model for enabling on-demand network access to a shared pool of configurable IT capabilities/ resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. It allows users to access technology-based services from the network cloud without knowledge of, expertise with, or control over the technology infrastructure that supports them. This cloud model is composed of five essential characteristics (on-demand self-service, ubiquitous network access, location independent resource pooling, rapid elasticity, and measured service); three service delivery models (Cloud Software as a Service [SaaS], Cloud Platform as a Service [PaaS], and Cloud Infrastructure as a Service [IaaS]); and four models for enterprise access (Private cloud, Community cloud, Public cloud, and Hybrid cloud).
Code – System of communication in which arbitrary groups of letters, numbers, or symbols represent units of plain text of varying length.
Compromise – Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred. SOURCE: SP 800-32
Computer Security (COMPUSEC) – Measures and controls that ensure confidentiality, integrity, and availability of information system assets including hardware, software, firmware, and information being processed, stored, and communicated.
Confidentiality – The property that sensitive information is not disclosed to unauthorized individuals, entities, or processes. SOURCE: FIPS 140-2
Countermeasures – Actions, devices, procedures, techniques, or other measures that reduce the vulnerability of an information system. Synonymous with security controls and safeguards.
Cryptography – The discipline that embodies principles, means, and methods for providing information security, including confidentiality, data integrity, non-repudiation, and authenticity. Art or science concerning the principles, means, and methods for rendering plain information unintelligible and for restoring encrypted information to intelligible form.
Cryptology – The science that deals with hidden, disguised, or encrypted communications. It includes communications security and communications. The mathematical science that deals with cryptanalysis and cryptography. intelligence. SOURCE: SP 800-60
Data – A subset of information in an electronic format that allows it to be retrieved or transmitted.
Data Encryption Standard (DES) – Cryptographic algorithm designed for the protection of unclassified data and published by the National Institute of Standards and Technology (NIST) in Federal Information Processing Standard (FIPS) Publication 46. (FIPS 46-3 withdrawn 19 May 2005) See Triple DES.
Decode – Convert encoded text to plain text by means of a code.
Decryption – The process of transforming ciphertext into plaintext. SOURCE: SP 800-67
Decryption – The process of changing ciphertext into plaintext using a cryptographic algorithm and key. SOURCE: SP 800-21
Decryption – Conversion of ciphertext to plaintext through the use of a cryptographic algorithm.
Denial of Service (DoS) – An attack that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources. SOURCE: SP 800-61 The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.)
Digital Signature – An asymmetric key operation where the private key is used to digitally sign an electronic document and the public key is used to verify the signature. Digital signatures provide authentication and integrity protection. SOURCE: SP 800-63
Digital Signature – The result of a cryptographic transformation of data which, when properly implemented, provides the services of: 1. origin authentication, 2. data integrity, and 3. signer non-repudiation. SOURCE: FIPS 140-2
Disaster Recovery Plan (DRP) – A written plan for recovering one or more information systems at an alternate facility in response to a major hardware or software failure or destruction of facilities. SOURCE: SP 800-34 Management policy and procedures used to guide an enterprise response to a major loss of enterprise capability or damage to its facilities. The DRP is the second plan needed by the enterprise risk managers and is used when the enterprise must recover (at its original facilities) from a loss of capability over a period of hours or days.
Encryption – Conversion of plaintext to ciphertext through the use of a cryptographic algorithm. SOURCE: FIPS 185
Entity – Either a subject (an active element that operates on information or the system state) or an object (a passive element that contains or receives information).
Entity – An active element in an open system. SOURCE: FIPS 188
Event – Any observable occurrence in a network or system. SOURCE: SP 800-61 Any observable occurrence in a system and/or network. Events sometimes provide indication that an incident is occurring.
False Acceptance Rate (FAR) – The probability that a biometric system will incorrectly identify an individual or will fail to reject an impostor. The rate given normally assumes passive impostor attempts. The measure of the likelihood that the biometric security system will incorrectly accept an access attempt by an unauthorized user. A system’s false acceptance rate typically is stated as the ratio of the number of false acceptances divided by the number of identification attempts.
False Rejection Rate (FRR) – The probability that a biometric system will fail to identify an applicant, or verify the legitimate claimed identity of an applicant. The measure of the likelihood that the biometric security system will incorrectly reject an access attempt by an authorized user. A system’s false rejection rate typically is stated as the ratio of the number of false rejections divided by the number of identification attempts.
Firewall – A hardware/software capability that limits access between networks and/or systems in accordance with a specific security policy.
Flooding – An attack that attempts to cause a failure in a system by providing more input than the system can process properly.
Gateway – Interface providing compatibility between networks by converting transmission speeds, protocols, codes, or security measures.
Hardware – The physical components of an information system. See software and firmware.
Hash Function – A function that maps a bit string of arbitrary length to a fixed length bit string. Approved hash functions satisfy the following properties: 1) One-Way. It is computationally infeasible to find any input that maps to any prespecified output. 2) Collision Resistant. It is computationally infeasible to find any two distinct inputs that map to the same output.
Hashing – The process of using a mathematical algorithm against data to produce a numeric value that is representative of that data.
Identification – The process of verifying the identity of a user, process, or device, usually as a prerequisite for granting access to resources in an IT system. SOURCE: SP 800-47
Identification – The process of discovering the true identity (i.e., origin, initial history) of a person or item from the entire collection of similar persons or items. SOURCE: FIPS 201
Incident – A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices. SOURCE: SP 800-61
Information – An instance of an information type. SOURCE: FIPS 200; FIPS 199; SP 800-60 Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual. SOURCE: CNSSI-4009
Information Security – The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.
Information Security – Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide— 1) integrity, which means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity; 2) confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and 3) availability, which means ensuring timely and reliable access to and use of information. SOURCE: SP 800-66; 44 U.S.C., Sec 3541
Integrity – Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. SOURCE: SP 800-53; SP 800-53A; SP 800-18; SP 800-27; SP 800-37; SP 800-60; FIPS 200; FIPS 199; 44 U.S.C., Sec. 3542
Integrity – The property that sensitive data has not been modified or deleted in an unauthorized and undetected manner. SOURCE: FIPS 140-2 The property whereby an entity has not been modified in an unauthorized manner. SOURCE: CNSSI-4009
Intrusion – Unauthorized act of bypassing the security mechanisms of a system.
Intrusion Detection Systems (IDS) – Hardware or software product that gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organizations) and misuse (attacks from within the organizations.) SOURCE: CNSSI-4009
IP Security (IPsec) – Suite of protocols for securing Internet Protocol (IP) communications at the network layer, layer 3 of the OSI model by authenticating and/or encrypting each IP packet in a data stream. IPsec also includes protocols for cryptographic key establishment.
Key – A value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification.
Key Management – The activities involving the handling of cryptographic keys and other related security parameters (e.g., IVs and passwords) during the entire life cycle of the keys, including their generation, storage, establishment, entry and output, and zeroization.
Malicious Code – Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code. SOURCE: SP 800-53; CNSSI-4009 A virus, worm, Trojan horse, or other code-based malicious entity that successfully infects a host.
Network – Information system(s) implemented with a collection of interconnected components. Such components may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices.
Passive Attack – An attack against an authentication protocol where the attacker intercepts data traveling along the network between the claimant and verifier, but does not alter the data (i.e., eavesdropping). SOURCE: SP 800-63 An attack that does not alter systems or data.
Plaintext – Data input to the Cipher
Plaintext – Intelligible data that has meaning and can be understood without the application of decryption.
Private Key – The secret part of an asymmetric key pair that is typically used to digitally sign or decrypt data.
Protocol – Set of rules and formats, semantic and syntactic, permitting information systems to exchange information.
Proxy Server – A server that services the requests of its clients by forwarding those requests to other servers. SOURCE: CNSSI-4009
Public Key – The public part of an asymmetric key pair that is typically used to verify signatures or encrypt data.
Risk – The level of impact on organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals resulting from the operation of an information system given the potential impact of a threat and the likelihood of that threat occurring. SOURCE: FIPS 200
Risk Analysis – The process of identifying the risks to system security and determining the likelihood of occurrence, the resulting impact, and the additional safeguards that mitigate this impact. Part of risk management and synonymous with risk assessment. SOURCE: SP 800-27 Examination of information to identify the risk to an information system. See risk assessment. SOURCE: CNSSI-4009
Risk Management – The process of managing risks to organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals resulting from the operation of an information system, and includes: 1) the conduct of a risk assessment; 2) the implementation of a risk mitigation strategy; and 3) employment of techniques and procedures for the continuous monitoring of the security state of the information system. SOURCE: FIPS 200
Safeguards – Protective measures prescribed to meet the security requirements (i.e., confidentiality, integrity, and availability) specified for an information system. Safeguards may include security features, management constraints, personnel security, and security of physical structures, areas, and devices. Synonymous with security controls and countermeasures.
Scanning – Sending packets or requests to another system to gain information to be used in a subsequent attack.
Secret Key – A cryptographic key that must be protected from unauthorized disclosure to protect data encrypted with the key. The use of the term “secret” in this context does not imply a classification level; rather, the term implies the need to protect the key from disclosure or substitution. SOURCE: FIPS 201
Secret Key – A cryptographic key that is uniquely associated with one or more entities. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure or substitution.
Security – A condition that results from the establishment and maintenance of protective measures that enable an enterprise to perform its mission or critical functions despite risks posed by threats to its use of information systems. Protective measures may involve a combination of deterrence, avoidance, prevention, detection, recovery, and correction that should form part of the enterprise’s risk management approach.
Software – Computer programs and associated data that may be dynamically written or modified during execution.
Symmetric Key – A single cryptographic key that is used with a secret (symmetric) key algorithm.
System Interconnection – The direct connection of two or more IT systems for the purpose of sharing data and other information resources.
Telecommunications – Preparation, transmission, communication, or related processing of information (writing, images, sounds, or other data) by electrical, electromagnetic, electromechanical, electro-optical, or electronic means. SOURCE: CNSSI-4009
Threat – Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. SOURCE: SP 800-53 The potential source of an adverse event. SOURCE: SP 800-61
Token – Something that the claimant possesses and controls (typically a key or password) used to authenticate the claimant’s identity. SOURCE: SP 800-63 Something that the claimant possesses and controls (such as a key or password) that is used to authenticate a claim. See also cryptographic token.
Trap Door – 1. A means of reading cryptographically protected information by the use of private knowledge of weaknesses in the cryptographic algorithm used to protect the data. 2. In cryptography, one-to-one function that is easy to compute in one direction, yet believed to be difficult to invert without special information.
Tunneling – Technology enabling one network to send its data via another network’s connections. Tunneling works by encapsulating a network protocol within packets carried by the second network.
Validation – The process of demonstrating that the system under consideration meets in all respects the specification of that system.
Verification – Confirmation, through the provision of objective evidence, that specified requirements have been fulfilled (e.g., an entity’s requirements have been correctly defined, or an entity’s attributes have been correctly presented; or a procedure or function performs as intended and leads to the expected outcome).
Victim – A machine that is attacked. SOURCE: SP 800-61
Virtual Private Network (VPN) – A virtual network, built on top of existing physical networks, that provides a secure communications tunnel for data and other information transmitted between networks. SOURCE: SP 800-46 Protected information system link utilizing tunneling, security controls (see Information Assurance), and endpoint address translation giving the impression of a dedicated line
Virus – A self-replicating program that runs and spreads by modifying other programs or files. SOURCE: SP 800-61 A computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use email programs to spread itself to other computers, or even erase everything on a hard disk.
Vulnerability – Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. A weakness in a system, application, or network that is subject to exploitation or misuse.

1. access доступ

2. accept[able] принять, [приемлемый]

3. advise уведомить, советовать

4. adverse неблагоприятный

5. arbitrary произвольный

6. assessment оценка

7. asset актив

8. assignment назначение

9. assigned назначенный

10. assurance гарантия

11. associating связыванный

12. attach приложить

13. authentication аутентификация, установление подлинности

14. balance уравновешивать

15. based основанный

16. bind связывать

17. broadcast широковещание

18. carry нести, проводить

19. carrier носитель,

20. checksum контрольная сумма

21. cipher шифр

22. claim утверждать, требование

23. choose выбирать

24. confirm подтвердить

25. compatibility переносимость, совместимость

26. compare сравнивать

27. confidence доверие, конфиденциальное сообщение

28. consecutive следующий друг за другом

29. convergence сближение

30. content содержание

31. contention утверждение

32. competition соревнование, конкурс

33. countermeasure контрмера, противодействие

34. defined определенный

35. determination определение

36. determined определяется

37. deny отрицать

38. denial отказ

39. derive происходить, выводить

40. describe описывать

41. distribute распределять

42. determine определять

43. denial of service отказ от обслуживания

44. disruption разрушение

45. duration продолжительность

46. entity субъект, сущность, юр. лицо

47. expands расширяется

48. evaluation оценка

49. facility средство

50. False Rejection Rate коэффициент ошибочного отказа в доступе

51. flaw недостаток, слабое место

52. employ нанять, нанимать

53. employers работодатели, предприниматели

54. employees сотрудники, служащие

55. enforce навязывать

56. enhancement улучшение

57. ensure обеспечивать, гарантировать

58. either любой

59. execution выполнение

60. audio frequencies звуковые частоты

61. gateway шлюз

62. granting предоставление

63. handle ручка, управлять

64. hardware аппаратные средства

65. half duplex полудуплексный

66. hostile враждебный

67. implementation реализация

68. investigative следственный

69. interconnected взаимосвязанные

70. infeasible неосуществимый

71. issued выпущенный

72. incorporation включение

73. intermediary посредник

74. interference вмешательство

75. involve вовлечь, включать

76. intent намереваться, намерение

77. labeling маркировка

78. maintenance of security обеспечение безопасности

79. mandatory принудительный, обязательный

80. malicious злонамеренный

81. measure мера, измерять

82. node узел, устройство, подключенное к сети

83. notification уведомление

84. obtain получать

85. occur происходить

86. reserved зарезервированный

87. permutation перестановка (бит, символов)

88. penetration проникновение

89. perceive воспринимать

90. packet switching коммутация пакетов

91. perform выполнять, исполнять

92. portions части

93. property свойство, собственность

94. public key открытый ключ

95. pursue преследовать

96. pursuant преследующий, в соответствии

97. predecessor предшественник

98. permit разрешать

99. purpose цель, намерение, намереваться

100. relate относиться

101. related относящийся, связанный с

102. require требуется

103. required требуемый

104. equests запросы

105. Represent представить

106. restrict аннулирование

107. revoke аннулировать

108. routing маршрутизация

109. sequence последовательность

110. safeguard гарантия

111. scope сфера

112. suspend приостановить

113. session layer сеансовый уровень

114. threat угроза безопасности

115. transmit передавать

116. trap door ловушка

117. rust доверять, доверие

118. survive выжить, выживать

119. survivability живучесть

120. varying изменение, различный

121. verification проверка

122. verify проверить

123. violation нарушение

124. vulnerability уязвимость

125. unauthorized несанкционированный

Контрольные вопросы часть 1

1. Понятие сигнала. Аналоговый и дискретный сигналы.

2. Информационный параметр звукового сигнала

3. Скорость распространения электрических сигналов

4. Понятие электросвязи

5. Коммутация каналов, сообщений, пакетов

6. Сеть связи.

7. Понятия первичной и вторичной сети

8. Требования к линиям связи

9. Классификация проводных систем связи по типу среды передачи

10. Витая пара, ее разновидности, UTP, STP.

11. Принцип распространения оптического излучения вдоль оптического волокна.

12. Виды оптоволоконных кабелей.

13. Строение атмосферы земли.

14. Вид, тип и диапазон радиоволн. Вид и диапазон частот. ОНЧ, НЧ, СЧ, ВЧ, ОВЧ, УВЧ, СВЧ, КВЧ, ГВЧ.

15. Диапазоны частот спутниковой связи.

16. Радиопередающие устройства. Состав.

17. Радиоприемные устройства. Состав.

18. Радиорелейные системы передач. Диапазоны частот.

19. Тропосферные радиорелейные системы передач.

20. Спутниковые системы связи. 3 разновидности ИСЗ.

21. Параметры геостационарной орбиты.

22. Низковысотная орбита. Параметры.

23. Особенности передачи сигналов для ССС.

24. Уровень передачи сигнала, дБм, дБн.

25. Понятие многоканальной системы связи.

26. Общий принцип модуляции. 3 вида модуляции.

27. Пример амплитудной модуляции аналогового сигнала.

28. Пример амплитудной модуляции битовой последовательности 1011100

29. Пример фазовой модуляции битовой последовательности 1011100.

30. Пример частотной модуляции битовой последовательности 1011100.

31. Виды модуляции BPSK, QPSK, 8-PSK, 16-QAM

32. Дискретизация аналогового сигнала

33. Квантование сигнала

34. Теорема Котельникова

35. Импульсно-кодовая модуляция, ИКМ-сигнал.

36. Двоичные коды, примеры.

37. Цифровая обработка аналоговых сигналов.

38. Параметрическое компандирование речевых сигналов. Вокодерные системы

39. Понятие мультиплексирования

40. FDM

41. TDM

42. WDM

43. Особенности построения цифровых систем передачи.

44. PDH. Скорость и коэффициент мультиплексирования для различных уровней иерархии европейской PDH.

45. SDH. STM-1, STM-4, STM-16, STM-64.

46. Функционирование системы передачи SDH.

47. Понятие виртуального контейнера SDH.

48. Преимущества SDH.

49. Перспективы SDH. Оптические транспортные сети OTN.

50. NGN SDH.

51. Понятие спектрального уплотнения в ВОСП.

52. WDM, CWDM, DWDM, HDVDM.

Контрольные вопросы часть 2

1. Понятие компьютерная сеть

2. Классификация компьютерных сетей





Дата публикования: 2015-04-09; Прочитано: 259 | Нарушение авторского права страницы | Мы поможем в написании вашей работы!



studopedia.org - Студопедия.Орг - 2014-2024 год. Студопедия не является автором материалов, которые размещены. Но предоставляет возможность бесплатного использования (0.069 с)...