Chapter 5
bridge
a device that connects two LANs or two segments of the same LAN
cypercrimes
creating viruses to disrupting computer networks
wireless networks
use radio signals that travel through the air to transmit data
repreater
used to prevent attenuation when packets are traveling long distances
office automation system
uses computers and/or networks to preform various office-related operations, such as word processing, accounting, document management or communication
risk assessment
where you identify and examine possible threats
Wi-Fi
802.11
router
a complex device that stores the routing information for networks; determines the best route for packets
information system (IS)
a complex system for acquiring, storing, organizing, using, and sharing data and information
gateway
a node on a network that serves as an entrance to another network
Trojan Horse
a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system
management information system (MIS)
a set of software tools that enables managers to gather, organize and evaluate information
Decision Support System (DDS)
a special application that collects and reports certain types of data
redundant array of independent disks (RAID)
a storage system that links any number of disk drives (a disk array) so that they act as a single disk
expert system
a type of information system that performs analytical tasks traditionally done by a human
virus
a type of malware that's attached to a hose file and has the ability to replicate, or copy, itself
worm
a typoe of malware that self-replicates and spreads through computers and networks
vulnerability
a weakness that has not been protected against threats
fault-tolerant computers
able to continue their operation even when problems are present
network
allows users to communicate and share info. b/w computers and various devices
cyberterrorism
an attack that seeks to create large-scale chaos and damage a country's infrastructure
data warehouse
an enormous digital warehouse that contains data gathered from multiple databases
surge protector (or surge processor)
an inexpensive product that guards connected equipment against large power spikes or surges
countermeasure
any step you take to ward off a threat
threat
anything that can cause harm
extranet
can be used to share some of a company's intranet resources with people outside the organization
passive DDS
collects and displays data in the format requested
active DDS
collects data but also makes recommendations as to the best decison
node
connection point; the network used the media to carry data from one to another
coaxial cable
consists of a single copper wire that's surrounded by insulation and a wire mesh shield, all inside a plastic sheath
fiber-optic cable
consists of a thin strand of glass that transmits pulsating beams of light rather than electric current
twisted-pair cable
consists of four pairs of wires that are twisted around each other; all wires are collectively bound together in a layer of plastic that you would refer to as the network cable
uninterruptible power supply (UPS)
contains a battery; can keep a system on in the even of a power failure
local area network (LAN)
data communication system consisting of multiple devices that are relatively near each other and are physically connected using cables or wireless media
packets
data moves through networks in structures known as this, which are pieces of a message broken down into small unites by the sending device and reassembled by the receiving device
spyware
designed to report activity on your computer to another party
hacktivism
has a social or political agenda behind it
redundant computers
have multiple hardware systems performing the same task at the same time to protect against the failure of one system
transaction processing system (TPS)
info. system that handles the processing and tracking of transactions
wireless adaptar
most desktop computers require an internal or external one of these to connect to a WAp
ethernet
most widely-used standard for local area networks -fastest can reach 100 Mbps
wireless access point (WAP)
needed to create a wireless LAN; all nodes connect to the device
intranet
organizations that offer an internal version of the internet, which contains only the company's private information
power fluctuations
power levels that rise and fall can produces unpredictable behavior in or cause damage to sensitive computer components
hub
provides multiple ports for connecting nodes
hacker
refers to an individual who uses a computer and/or network to commit a variety of crimes
malware
refers to several types of malicious computer programs that are created to harm computer systems and their users
protocols
rules of communication that ensure packets are sent, received and interpreted properly 1. header- contains info. needed by network 2. payload - contains the actual data being transmitted
switch
similar to a hub, but it's aware of the exact address or identity of all the nodes attached to it
mission-critical
some info. systems are called this b/c they must run without failure or with nearly instant recovery failture
bandwidth
speed; the amount of data that can be transmitted over a given amount of time (measured in megabits/sec or gigabits/sec)
interoperability
the ability of each organization's information system to work with the other, sharing both data and services
scalability
the capacity to provide increasing amounts of computing power, storage and/or software
power failure
the complete loss of power can result in the loss of unsaved work or the interruption of an important business function
wide area network (WAN)
the connection of two or more central computers or LANs, generally across a wide geographical area
network interface card (NIC)
the device at each node that preforms translation an transmissions
data mining
the discovery of new patterns of relationships b/w data
topology
the logical layout of the cables and devices that connect the nodes of the network
attenuation
the loss of intensity and clarity of the data signal being transmitted; affected by distance
network media
the means used to link parts of a computer network
data validation
the process of safeguarding against erroneous or duplicate data by checking what is entered and placing restrictions on how the data is entered
scareware (or ransomware)
tricks users into following a theif's orders, malware usually tries to remain hidden from users so that they can do its damage for as long as possible