Chapter 5 ITECH
countermeasure
Any step you take to ward off a threat
packets
Data moves though networks in structures, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
identity theft
In many cases, hackers are looking for personal data that will allow them to assume the identity of another individual - a crime
data mining
Large databases that support information systems can provide an ideal environment, which is the discovery of new patterns or relationships between data.
wireless adapter
Most desktop computers require an internal or external to connect to a WAP.
intranet
Some organizations offer an internal version of the Internet, which contains only the company's private information
cybercrimes
Such crimes, from creating viruses to disrupting computer networks
network interface card (NIC)
The device at each node that performs translation and transmission
transaction processing system (TPS).
The information system that handles the processing and tracking of transactions
network media
The means used to link parts of a computer network
node
The network uses the media to carry data from one or connection point, to another.
wireless access point (WAP)
To create a wireless LAN, is needed. All nodes connect to the device.
Zombies
are infected computers that are under the external control of a hacker.
Protocols
are rules of communication that ensure packets are sent, received, and interpreted properly, and that data integrity, or accuracy, is guaranteed
distributed denial-of-service (DDoS)
attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
botnets
can be used by the hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
extranet
can be used to share some of a company's intranet resources with people outside the organization.
Fault-tolerant
computers are able to continue their operation even when problems are present.
Redundant
computers have multiple hardware systems performing the same task at the same time to protect against the failure of one system.
Coaxial cable
consists of a single copper wire that is surrounded by insulation and a wire mesh shield, all inside a plastic sheath.
fiber-optic cable
consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
Authorization
gives individuals a certain level of access based on who they are.
Phishing
involves luring individuals into entering personal information into a website controlled by the hacker.
router
is a complex device that stores the routing information for networks. Determines the best route for packets.
information system (IS)
is a complex system for acquiring, storing, organizing, using, and sharing data and information
local area network (LAN)
is a data communication system consisting of multiple devices that are relatively near each other and are physically connected using cables or wireless media.
bridge
is a device that connects two LANs or two segments of the same LAN
Social engineering
is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.
gateway
is a node on a network that serves as an entrance to another network.
Trojan horse
is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
management information system (MIS)
is a set of software tools that enables managers to gather, organize, and evaluate information.
decision support system (DSS)
is a special application that collects and reports certain types of data, can help managers make better decisions.
redundant array of independent disks (RAID)
is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.
expert system
is a type of information system that performs analytical tasks traditionally done by a human.
worm
is a type of malware that self-replicates and spreads through computers and networks
vulnerability
is a weakness that has not been protected against threats.
data warehouse
is an enormous digital warehouse that contains data gathered from multiple databases.
surge protector
is an inexpensive product that guards connected equipment against large power spikes or surges.
Spyware
is designed to report activity on your computer to another party.
Pretexting
is gaining someone's trust by pretending you are someone else.
switch
is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it.
Interoperability
is the ability of each organization's information system to work with the other, sharing both data and services.
Bandwidth
is the amount of data that can be transmitted over a given amount of time.
Scalability
is the capacity to provide increasing amounts of computing power, storage, and/or software.
wide area network (WAN)
is the connection of two or more central computers or LANs, generally across a wide geographical area.
Attenuation
is the loss of intensity and clarity of the data signal being transmitted. It is often affected by distance.
Ethernet
is the most widely-used standard for local area networks.
Data validation
is the process of safeguarding against erroneous or duplicate data by checking what is entered and placing restrictions on how the data is entered.
repeater
is used to prevent attenuation when packets are traveling long distances.
Twisted-pair cable
normally consists of four pairs of wires that are twisted around each other. All wires are collectively bound together in a layer of plastic that you would refer to as the network cable.
hub
provides multiple ports for connecting nodes.
Malware
refers to several types of malicious computer programs that are created to harm computer systems and their users.
Authentication
refers to the requirement that an individual confirm his or her identity.
virtual private network (VPN)
so that all of your activity will first pass through a VPN server before traveling to the Internet. This is often required by employers if you are connecting to workplace computers from home.
mission-critical
they must run without failure or with nearly instant recovery from failure
Wireless networks
use radio signals that travel through the air to transmit data.
office automation system
uses computers and/or networks to perform various office-related operations, such as word processing, accounting, document management, or communications.
risk assessment
where you identify and examine possible threats, is critical to being able to safeguard a system.
uninterruptible power supply (UPS)
which contains a battery, can keep a system on in the event of a power failure.
Hacktivism
which has a social or political agenda behind it, has become a popular reason to hack in recent years.
tape library
which is a large storage unit for magnetic tape drives, to create backups and archives of data.
rogue hotspot
which is a wireless access point that users accidentally connect to.
cyberterrorism
which is an attack that seeks to create large-scale chaos and damage to a country's infrastructure
scareware
which tricks users into following a thief's orders, malware usually tries to remain hidden from users so that it can do its damage for as long as possible.