ITEC 1001 - Chapter 5 - Networking, information systems, and security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A Trojan horse

(or Trojan) is a program that disguises (Ngụy trang) itself as an interesting, useful, or desirable (Mong muốn) program in order to gain access to your system.

benefit of using networks

-let multiple users access shared data, programs, and hardware devices almost instantly -open up new ways to share data and applications that were not practical or possible in the past -Communication is another key benefit

data warehouse

All of this information is generally stored or archived in a central repository (kho)

Striping (Dải)

Also known as RAID 0 that gives the user rapid access by spreading data across several disks

Mirrored (Được nhân đôi) system

Also known as RAID 1, this type writes data onto two or more disks simultaneously (Đồng thời). This creates a complete copy of all the information on multiple drives, thereby preventing data loss if one drive fails.

countermeasure (Đối phó)

Any step you take to ward off (tránh khỏi) a threat

automated teller machine (ATM)

Consider the process of withdrawing cash at a machine

DSS example

Decision support systems can help the shirt manufacturer collect and analyze buying trends

mission-critical (nhiệm vụ quan trọng)

Even small amounts of computer downtime (Thời gian chết) at a major stock exchange or in an air defense system could have dire (tàn khốc) consequences

an office automation system

For gathering, storing, and making available the kinds of information needed in an office environment, many organizations set up a type of information system

rogue (giả mạo) hotspot

Hackers will set up their own wireless access points at popular areas such as airports. When users turn on their mobile devices or laptops to look for a free hotspot, they may inadvertently (Vô tình) connect to the hacker's hotspot.

protocols

Machines that communicate over a network must follow certain rules to ensure that the packets are sent, received, and interpreted properly, and that data integrity (toàn vẹn dữ liệu), or accuracy, is guaranteed

Striping with parity (Ghi theo sọc với chẵn lẻ)

Most commonly implemented (Thực hiện) as RAID 5, this strategy spreads data across several disks

data validation (Xác nhận)

One method for checking and improving the reliability (độ tin cậy) of data. This is the process of safeguarding against erroneous (Sai lầm) or duplicate data by checking what is entered and, in some cases, placing restrictions (Hạn chế) on how the data is entered.

spyware

One type of malware that has rapidly grown in use, which is designed to report activity on your computer to another party.

uninterruptible (Không gián đoạn) power supply (UPS)

Problems with both power fluctuations (Biến động) and power failure can be minimized by adding another kind of hardware

shielded twisted-pair (STP) (Được che chắn cặp xoắn)

Some cables that contain a metal sheath (Vỏ bọc) that surrounds all the wires in order to reduce interference (Can thiệp)

the network interface (Giao diện) card (NIC)

The device at each node that performs translation and transmission

authentication (Chứng thực)

The first important principles (nguyên lý) to deter (Ngăn cản) hackers and block the unauthorized access to information.

transaction (Giao dịch) processing system (TPS)

The information system that handles the processing and tracking of transactions

network media

The means used to link parts of a computer network

Wi-Fi

The most popular standard for wireless networking is called 802.11

authorization

The second important principles to deter (Ngăn cản) hackers and block the unauthorized access to information.

Payload

The second part of a packet contains the actual data being transmitted between the two nodes

identity theft (hành vi trộm cắp danh tính trộm)

The worst type of data theft for an individual

Header

This first part of a packet contains information needed by the network

Anti-malware

This software helps protect your computer from various types of malware.

scareware (or ransom-ware)

This type of scam (lừa đảo) because its goal is to scare the user into doing exactly what the thief wants.

Firewall

This utility examines (Tiện ích kiểm tra) and blocks Internet traffic in order to protect your private network.

wireless access point (WAP)

To create a wireless LAN

MIS example

a branch manager, may need to see only a monthly summary of this information shown in comparison to previous months, with a running total or average

mesh topology

a cable runs from every computer to every other computer

star topology

all nodes are connected to a hub (a type of linking device, described in the next section) and communicate through it

a distributed (cuộc tấn công) denial-of-service (DDoS) attack

allows hackers to shut down or block access to websites and other network resources by overwhelming (Áp đảo) them with requests.

network

allows users to communicate and share information between computers and various devices

An active system

collects the data but also makes recommendations as to the best decision.

Redundant (Dự phòng)

computers have multiple hardware systems performing the same task at the same time.

node (nút)

connection point

ring topology

connects the network's nodes in a circular chain, with each node connected to the next.

Coaxial (Đồng trục) cable

consists of a single copper (đồng) wire that is surrounded by insulation (vật liệu cách nhiệt) and a wire mesh (lưới thép) shield

A fiber-optic cable

consists of a thin strand (Sợi dây) of glass that transmits pulsating beams (Dầm nhịp) of light rather than electric current.

cybercrimes (Tội phạm trên mạng)

from creating viruses to disrupting computer networks

virtual private network (VPN)

in which each packet from the sending computer is encapsulated (Đóng gói) within another packet before being sent over the Internet

Phishing (Lừa đảo)

involves luring (Thu hút) individuals into entering personal information into a website controlled by the hacker.

A router

is a complex device that stores the routing information for networks.

information system (IS)

is a complex system for acquiring (Mua lại), storing, organizing, using, and sharing data and information.

A local area network (LAN)

is a data communication system consisting of multiple devices that are relatively near each other and are physically connected using cables or wireless media

bridge

is a device that connects two LANs or two segments (Phân đoạn) of the same LAN.

Social engineering

is a form of hacking that focuses on deceiving individuals (Lừa dối cá nhân) into giving away the information that the thief needs.

a gateway

is a node on a network that serves as an entrance to another network.

A management information system (MIS)

is a set of software tools that enables managers to gather, organize, and evaluate information.

Ethernet

is a standard for local area networks

redundant array (mảng dư thừa) of independent disks (RAID)

is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.

An expert system

is a type of information system that performs analytical tasks traditionally done by a human.

A virus

is a type of malware that is attached to a host file and has the ability to replicate (Sao chép), or copy, itself.

A worm

is a type of malware that self-replicates (Tự tái tạo) and spreads through computers and networks.

A vulnerability (Tính dễ tổn thương)

is a weakness that has not been protected against threats, thereby making it open to harm.

a surge protector (tăng Bảo vệ) (or surge suppressor - Máy triệt áp )

is an inexpensive product that guards connected equipment against large power spikes or surges (Dâng cao) that may infrequently (Không thường xuyên) occur.

A threat

is anything that can cause harm as varied as a burglar (Trộm), a computer virus, an earthquake, or a simple user error.

terminator (Người chấm dứt)

is attached at the cable's start and end points to stop network signals so they do not bounce back down the cable

The electricity supplied (to computer hardware)

is critical (chỉ trích) to its operation

Pretexting (trò giả vờ)

is gaining someone's trust by pretending you are someone else.

A switch

is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it.

Interoperability (Khả năng tương tác tương)

is the ability of each organization's information system to work with the other, sharing both data and services.

Scalability (Khả năng mở rộng)

is the capacity to provide increasing amounts of computing power, storage, and/or software

A wide area network (WAN)

is the connection of two or more central computers or LANs, generally across a wide geographical area

A repeater (Bộ lặp)

is used to prevent attenuation (Sự suy giảm) when packets are traveling long distances.

unshielded twisted-pair (UTP)

most types of twisted-pair cables do not have this shielding (Che chắn)

topology

network is the logical layout of the cables and devices that connect the nodes of the network.

Twisted-pair (xoắn đôi) cable

normally consists (Bao gồm) of four pairs of wires that are twisted around each other

A hub

provides multiple ports for connecting nodes.

malware

refers to several types of malicious (độc hại) computer programs that are created to harm computer systems and their users.

A passive system

simply collects and displays data in the format requested

strong password

that is difficult to guess or crack by thieves.

hacker

to an individual who uses a computer and/or network to commit a variety of crimes

wireless adapter

to connect to a WAP

Encryption (Mã hóa)

to scramble (Tranh giành) your data or communication, making it unreadable by anyone who doesn't have the proper key.

Wireless networks

use radio signals that travel through the air to transmit data. These signals operate on either the 2.4 GHz or 5 GHz bands.

An intranet

uses the same software and service structure as the Internet, but it contains only the company's private information

risk assessment (đánh giá rủi ro)

where you identify and examine possible threats, is critical (chỉ trích) to being able to safeguard a system.

Hacktivism (tin tặc)

which has a social or political agenda behind it, has become a popular reason to hack in recent years

A decision support system (DSS)

which is a special application that collects and reports certain types of data, can help managers make better decisions.

cyberterrorism (khủng bố mạng)

which is an attack that seeks to create large-scale chaos ( Sự hỗn độn quy mô lớn) and damage to a country's infrastructure (Cơ sở hạ tầng)

bandwidth (Băng thông)

which is the amount of data that can be transmitted over a given amount of time.

data mining (khai thác dữ liệu)

which is the discovery of new patterns (Mẫu) or relationships between data

attenuation (Sự suy giảm)

which is the loss of intensity ( Cường độ) and clarity of the data signal being transmitted.


Ensembles d'études connexes

AWS Academy Cloud Architecting [2606] - Module 4 Knowledge Check

View Set

Chapter 10 Pricing: Understanding and Capturing Customer Value

View Set

Polynomial Functions and Equations- Unit Test Review

View Set