IT: ch 5: networking/security
wireless access point (WAP)
All nodes connect to the device in order to communicate wirelessly
a data warehouse
All of this information is generally stored or archived in a central repository known as a __;This enormous digital warehouse contains data gathered from multiple databases.
countermeasure
Any step you take to ward off a threat
packets
Data moves though networks in structures (__) which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device two parts: certificate and key
identity theft.
Hackers will essentially assume your identity and begin to open new bank accounts under your name
rogue hotspot.
Hackers will set up their own wireless access points at popular areas such as airports. When users turn on their mobile devices or laptops to look for a free hotspot, they may inadvertently connect to the hacker's hotspot
botnets
Massive networks of zombies
data validation.
One method for checking and improving the reliability of data is called _;
extranet
Organizations can also create an _ to share some of its intranet resources with people outside the organization
network interface card (NIC),
The device at each node that performs translation and transmission (most printers and computers already have these)
transaction processing system (TPS).
The information system that handles the processing and tracking of transactions is
network media.
The means used to link parts of a computer network
Wi-Fi/ 802.11
The most popular standard for wireless networking
node
The network uses the media to carry data from one __, or connection point, to another
Payload
The second part of a packet contains the actual data being transmitted between the two nodes.
BUS TOPOLOGY
arranges the network nodes in a series, linking one node to the next via a single cable
router
complex device that stores the routing information for networks
RING TOPOLOGY
connects the network's nodes in a circular chain, with each node connected to the next
bridge
connects two LANs or two segments of the same LAN
Twisted-pair cable
consists of four pairs of wires that are twisted around each other
shielded twisted-pair (STP)
contain a metal sheath that surrounds all the wires in order to reduce interference
uninterruptible power supply (UPS)
contains both a surge protector and rechargeable battery, allowing it to handle any type of power issue for your computer.
TCP/IP
currently the most popular protocol and the driving force behind the Internet.
802.11ac
fastest specifications for Wi-Fi
Social engineering
form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.
Pretexting
gaining someone's trust by pretending you are someone else
Phishing
luring individuals into entering personal information into a website controlled by the hacker
zombies
malware to open communication ports on the computers of thousands of users, making them available for control by the hacker. Computers infected and compromised in this way are known as
unshielded twisted-pair (UTP)
most types of twisted-pair cables do not have this shielding
Redundant
multiple hardware systems performing the same task at the same time
mission-critical
must run without failure or with nearly instant recovery from failure.
topology
network is the logical layout of the cables and devices that connect the nodes of the network
wireless adapter
piece of hardware plugged into a laptop to gain wifi
?
pretends to be the FBI or someone to gain info
a storage system that links any number of disk drives (a disk array) so that they act as a single disk
redundant array of independent disks (RAID)
protocols
ruled that must be followed by computers to communicate over a network
malware
several types of malicious computer programs that are created to harm computer systems and their users; most common threat to data and security
switch
similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it.
Striping with parity RAID 5
spreads data across several disks. However, it adds the safety of redundancy because the system stores parity information (a type of error-correcting code) that can be used to reconstruct data if a disk drive fails.
. Interoperability
the ability of each organization's information system to work with the other, sharing both data and services.
bandwidth
the amount of data that can be transmitted over a given amount of time
. Scalability
the capacity to provide increasing amounts of computing power, storage, and/or software
wide area network (WAN)
the connection of two or more central computers or LANs, generally across a wide geographical area.
data mining
the discovery of new patterns or relationships between data
attenuation
the loss of intensity and clarity of the data signal being transmitted
fault-tolerant
they are able to continue their operation even when problems are present.
virus
type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
authentication
where an individual must confirm his or her identity
risk assessment,
where you identify and examine possible threats, is critical to being able to safeguard a system
spyware
which is designed to report activity on your computer to another party
Mirrored system RAID 1,
writes data onto two or more disks simultaneously. This creates a complete copy of all the information on multiple drives, thereby preventing data loss if one drive fails.
Encryption
Many types of software and devices use encryption to scramble your data or communication, making it unreadable by anyone who doesn't have the proper key.
Header
This first part of a packet contains information needed by the network. It will have the address of the node that sent the packet (the source) and the address of the node that will receive the packet (the destination). The network reads each packet's header to determine where to send the packet and, in some cases, the best way to get it to its destination. The header also contains control data that helps the receiving node reassemble a message's packets in the right order
Anti-malware.
This software helps protect your computer from various types of malware.
office automation system.
This system uses computers and/or networks to perform various operations, such as word processing, accounting, document management, or communications
Firewall.
This utility examines and blocks Internet traffic in order to protect your private network. Firewalls are present in most operating systems and many types of routers
MESH TOPOLOGY
a cable runs from every computer to every other computer
router
a complex device that stores the routing information for networks. It looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination. __also provide increased security for the LAN they link.
information system (IS)
a complex system for acquiring, storing, organizing, using, and sharing data and information
tape library
a large storage unit for magnetic tape drives
gateway
a node on a network that serves as an entrance to another network
Trojan horse
a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
management information system (MIS)
a set of software tools that enables managers to gather, organize, and evaluate information
Coaxial cable
a single copper wire that is surrounded by insulation and a wire mesh shield
decision support system (DSS)
a special application that collects and reports certain types of data, can help managers make better decisions
expert system
a type of information system that performs analytical tasks traditionally done by a human
STAR TOPOLOGY
all nodes are connected to a hub (a type of linking device, described in the next section) and communicate through it.
distributed denial-of-service (DDoS)
allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
cyberterrorism
an attack that seeks to create large-scale chaos and damage to a country's infrastructure
hacker
an individual who uses a computer and/or network to commit a variety of crimes
surge protector
an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur
fiber-optic cable
consists of a thin strand of glass that transmits pulsating beams of light rather than electric current
local area network (LAN)
data communication system consisting of multiple devices that are relatively near each other and are physically connected using cables or wireless media
virtual private network (VPN).
employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet
authorization
gives individuals a certain level of access based on who they are
Striping RAID 0
gives the user rapid access by spreading data across several disks. used to boost data access performance and does not provide redundancy. If one of the disks in a striped array fails, the data is lost, because it's not being duplicated on any of the other disks.
Hacktivism
has a social or political agenda behind it, has become a popular reason to hack in recent years.
scareware
its goal is to scare the user into doing exactly what the thief wants.
hub
provides multiple ports for connecting nodes
Ethernet
standard for local area networks. It provides a variety of specifications for the equipment and protocols used in a network
worm
type of malware that self-replicates and spreads through computers and networks. Unlike a virus, a __is a fully contained program that is not attached to a host file.
Wireless networks
use radio signals that travel through the air to transmit data
repeater
used to prevent attenuation when packets are traveling long distances
intranet
uses the same software and service structure as the Internet, but it contains only the company's private information
vulnerability
weakness that has not been protected against threats, thereby making it open to harm.