CISCO - Chapter 1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Identity Theft

An attack to steal the login credentials of a user in order to access private data.

Zero-day attacks also called zero-hour attacks

An attack that occurs on the first day that a vulnerability becomes known.

Common Formalized Feature of Every Wiki

1. Any web browser can be used to view or edit pages or create new content. 2. Edit and auto links are available to edit a page and automatically link pages. Text formatting is similar to creating an email. 3. Access control can be set by the topic creator, which defines who is permitted to edit content. 4. A wiki is a grouping of web pages with different collaboration groups.

New Trends

1. Bring Your Own Device (BYOD) 2. Online collaboration 3. Video communications 4. Cloud computing

Connection Options

1. Cable 2. DSL 3. Cellular 4. Satellite 5. Dial-up Telephone

Three Primary Requirements for Net Security Information Security

1. Confidentiality - Data confidentiality means that only the intended authorized recipients can access and read data. 2. Integrity - Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination. 3. Availability - Data availability means that having the assurance of timely and reliable access to data services for authorized users.

Network Media

1. Copper 2. Fiber-optic 3. Wireless

End Devices

1. Desktop Computer 2. Laptop 3. Ip Phone 4. Wireless Tablet 5. Printer 6. TelePresence Endpoint

2 Types of Network Security Concerns

1. Network Infrastructure 2. Information Security

Securing a Network Involves...

1. Protocols 2. Technologies 3. Devices 4. Tools 5. Techniques to secure data 6. Mitigate Threats

Four Primary Types of Clouds

1. Public Clouds 2. Private Clouds 3. Hybrid Clouds 4. Custom Clouds

Functions Performed by Intermediary network devices

1. Regenerate & retransmit data signals 2. Maintain information about what pathway exists through the network and internetwork 3. Notify other devices of errors & communication failures. 4. Direct data along alternate pathways when there is a link failure 5. Classify & direct messages according to priorities 6. Permit or deny the flow of data, based on security settings.

Intermediary Network Devices

1. Wireless Router 2. LAN Switch 3. Router 4. Multi-layer Switch 5. Firewall Appliance

Four Basic Characteristics of Network Architectures

1.Fault Tolerance 2. Scalability 3. Quality of Service (QoS) 4. Security

Google Drive Data Available (Before Having to Pay)

15 GB

Data interception and theft

An attack to capture private information from an organization's network.

Hybrid Clouds

A hybrid clouds is made up of two or more clouds (example: part custom, part public), where each part remains a distinctive object, but both are connected using a single architecture. Individuals on a hybrid cloud would be able to have degrees of access to various services based on user access rights.

Storage Area Network (SAN)

A network infrastructure designed to support file servers and provide data storage, retrieval, and replication.

Wide Area Network (WAN)

A network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a telecommunications service provider.

Local Area Network (LAN)

A network infrastructure that provides access to users and end devices in a small geographical area, which is typically an enterprise, home, or small business network owned and managed by an individual or IT department.

Metropolitan Are Network (MAN)

A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (e.g., a city). MANs are typically operated by a single entity such as a large organization.

Fault Tolerant Network

A network that limits the impact of a failure, so that the fewest number of devices are affected.

Scalability

A scalable network can expand quickly to support new users and applications without impacting performance of the service being delivered to existing users.

Wiki (Networking)

A wiki is a web-based collaboration tool that permits almost anyone to post information, files, or graphics to a common site or other users to immediately read and modify. A wiki provides access to a home page that has a search tool to assist you in locating the articles that interest you.

Peer-to-Peer Advantages & Disadvantages

Advantages 1. Easy to set up 2. Less complexity 3. Lower cost since network devices & dedicated servers may not be required. 4. Can be used for simple tasks such as transferring files and sharing printers Disadvantages 1. Not centralized administration 2. Not as secure 3. Not scalable 4. All devices may act as both clients and servers with can slow their performance.

Hacker attacks

An attack by a knowledgeable person to user devices or network resources.

Dial-up Telephone Connection

An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.

Extranet

An organization may use an extranet to provide secure and safe access to individuals who work for a different organization, but require access to the organization's data. Examples 1. A company that is providing access to outside suppliers & contractors. 2. A hospital that is providing a booking system to doctor's so they can make appointments for their patients. 3. A local office of education that is providing budget and personnel information to the schools in its district.

Video Communication

Another trend in networking that is critical to the communication and collaboration effort is video.

Wireless Broadband Service

Another wireless solution for the home and small businesses is wireless broadband. This uses the same cellular technology used to access the Internet with a smart phone or tablet.

Denial of Service Attacks

Attacks designed to slow or crash applications and processes on a network device.

Business DSL Connection

Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.

Cellular Connection

Cellular Intranet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.

Private Clouds

Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as the government. A private cloud can be set up using the organization's private network, though this can be expensive to build and maintain. A private cloud can also be managed by an outside organization with strict access security.

Public Clouds

Cloud-based applications and services offered in a public cloud are made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage. The public cloud uses the Internet provide services.

DSL (Digital Subscriber Line) Connection

Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office & home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.

Ethernet WAN Connection

Ethernet WANs extend LAN access technology into the WAN. Ethernet is a LAN technology you will learn about later. The benefits of Ethernet are now being extended into the WAN.

Redundancy

Having multiple paths to a destination is known as redundancy.

Logical Topology Diagrams

Identify devices ports, and addressing scheme.

Physical Topology Diagrams

Identify the physical location of intermediary devices and cable installation.

Secure Network Infrastructure

Includes the physical securing of devices that provide network connectivity, and preventing unauthorized access to the management software that resides on them.

Online Collaboration

Individuals want to connect to the network, not only for access to data applications, but also to collaborate with one another.

Intranet

Intranet is a term often used to refer to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorizations

Wiki

It means fast in Hawaiian

Local Area Networks

LANs are a network infrastructure that spans a small geographic area. 1. LANs interconnect end devices in a limited area such as a home, school, office building, or campus. 2. A LAN is usually administered by a single organization or individual. The administrative control that governs the security and access control policies are enforced on the network level. 3. LANs provide high speed bandwidth to internal end devices and intermediary devices.

Dedicated Leased Line Connection

Leased lines are actually reserved circuits with the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.

Viruses, worms, and Trojan horses

Malicious software and arbitrary code running on a user device.

Quality of Service

New applications available to users over interworks, such as voice and live video transmissions, create higher expectations for the quality of the delivered services.

Packet-Switched Network

Packet switching splits traffic into packets that are routed over a shared network. A single message, such as an email or video stream, is broken into multiple message blocks, called packets. Each packet has the necessary addressing information of the source and destination of the message. The routers within the network switch the packets based on the condition of the network at that moment.

Powerline Networking

Powerline networking is an emerging trend for home networking that uses existing electrical wiring to connect devices. The concept of "no new wires" means the ability to connect a device to the network wherever there is an electric outlet.

Information security

Refers to protecting the information contained within the packets being transmitted over the network and the information stored on network attached devices.

Network Architecture

Refers to technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.

Wireless LAN (WLAN)

Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.

Spyware and adware

Software installed on a user device that secretly collects information about the user.

Satellite Connection

The availability of satellite Internet access is a real benefit in those areas that would otherwise have no internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.

Bring Your Own Device (BYOD)

The concept of any device, to any content, in any manner is a major global trend that requires significant changes to the way devices are used.

Custom: Government, Healthcare, Media

The most common vector for data loss includes instant messaging software and social media sites. For instance, intercepted email or IM messages could be captured and reveal confidential information.

Access control lists (ACL)

These are used to further filter access and traffic forwarding.

Intrusion prevention systems (IPS)

These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.

Antivirus & antispyware

These are used to protect end devices from becoming infected with malicious software.

Dedicated firewall systems

These are used to provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

Virtual private networks (VPN)

These are used to provide secure access to remote workers.

Firewall filtering

This is used to block unauthorized access to the network. This may include a host-based firewall system that is implemented to prevent unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.

Circuit-Switched Networks

Traditionally used for voice communications. A circuit-switches network is one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.

Cable Connection

Typically offered by cable television service providers, the Intranet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.

Wide Area Networks

WANS are a network infrastructure that spans a wide geographic area. WANs are typically managed by service providers (SP) or Internet Service Providers (ISP). 1. WANs interconnect LANs over wide geographic areas such as between cities, states, provinces, countries, or continents. 2. WANs are usually administered by multiple service providers. 3. WANs typically provide slower speed links between LANs.

Wireless Internet Service Provider (WISP)

Wireless Internet Service Provider (WISP) is an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANS). WISPs are more commonly found in rural environments where DSL or cable services are not available.


Kaugnay na mga set ng pag-aaral

SMSH-PROJECTS-HALF LIFE CALCULATIONS-10/12/23

View Set

NUR 236 PrepU Chapter 36: Pain Management in Children

View Set

MicroEcon TESTS (1,2,3) - Final 22

View Set

Java Programming - Chapter 7: Arrays

View Set

Biology - Quiz 2: Properties of Compounds

View Set

Final Exam: World History Study Guide Part 1

View Set

Ch 28: The Normal Newborn: Needs and Care

View Set

Adding and Subtracting Polynomials 80%

View Set