CH. 10 - NETWORKING
Risks associated w/ connected network
- Adware: displays unwanted ads on your computer - Spyware: tracks and transmits personal info from your computer or device without your knowledge - Virus: damages data on your device or changes system settings - Worm: spreads throughout a computer and/or network without requiring user interaction - Trojan: disguises itself or hides itself in a legitimate file, then causes damage to programs and data when opened - Ransomware: locks you out of programs and data on your computer until you pay a ransom to regain access - Rootkit: gains administrator-level (root-level) access to a computer or network without the system or users detecting its presence
Additional network types
- Wired network: sends signals and data through cables, travel through floors + walls to connect to other network devices; more secure and transmit data faster than wireless - Wireless network: sends signals through airwaves usually not requiring cables, tend to be more convenient and easier to set up but less secure, make it possible to connect devices in locations where physical wiring isn't possible or difficult - Intranet: private network for use by authorized individuals, used by organizations to communicate internally, allows users to use a web browser to access data posted on webpages, preferable when data transferred shouldn't reach the internet - Extranet: allow outsiders (customers, venders, supploers) to access an organization's intranet - Virtual private network (VPN): private, secure path across a public network that allows authorized user's secure access to a company or other network, lets individuals access an organiaztion's network by using encryption and other tech to secure data transmitted along the path
Geographic reach
- local area network (LAN): connects computers + devices in a limited area (home, school, small office complex) - wide area network (WAN): network that connects devices in a large demographic region (multinational company, national retail chain, Internet) - metropolitan area network (MAN): type of wide area network operated by a city or country - personal area network (PAN): connects personal digital devices w/in a range of approximately 30 feet (smartwatch connecting to cell phone), usually through bluetooth - body area network (BAN): form of personal area network that consists of small, lightweight biosensors implanted in the body; monitor individual's health or activity, reporting results to a medical professional
Social engineering
attempt to exploit human weaknesses by building relationships with victims for the purpose of stealing confidential info
Network Interface Card (NIC)
circuit board that connects a computer to a wired or wireless network, often internal to the device
Modem
communications device that connects a communications channel such as the Internet to a sending or receiving device (computer); connects to the internet through ISP
network architecture
determines the logical design of all devices on a network; 2 types
Zombie
device infected with malware that an attacker uses to control the device remotely
Router
device that connects two or more networks and directs (routes), the flow info along the networks; connect computer to the Internet so multiple users can share a connection
Hub
device that provides a central point for cables in a network + transfers all data to all devices
Network attached storage (NAS)
devices to store data through network attached storage, with one or more hard drives that connect directly to a network and provide a centralized location for storing programs and data on large and small networks
Strong password
long combination of letters, numbers, and/or symbols that unlocks access to protected electronic data, more secure than a shorter password regardless of complexity, should be changed frequently
Malware
malicious software installing itself without permission to damage or steal data on your device
cable modem
may be part of a set-top cable box or separate devuce
network topology
method by which computers and devices are physically arranged on a network; include multiple networks - bus network: all devices on a central cable (bus) that carries all the data; if it fails all devices on the network can no longer communicate - ring network: data travels from one device to another in sequential fashion; if one device fails communication could cease to function; no longer common - star network: each device is connected to a central device (server or switch); if central device fails, other devices can't communicate, if connected device fails, others can still communicate; multiple can connect to form a tree topology (schools + businesses use it) - mesh network: all devices interconnect, when one device fails the rest can continue to function through an alternate route
Peer-to-Peer network (P2P)
network architecture that typically connects a small number of computers (often fewer than 10); computers communicate directly with each other and can share resources
Evil twin
normal-looking but fraudulent Wi-Fi network that allows hackers to capture personal info users transmit using it
Client/server network
one or more computers act as a server and the other computers on the network request resources from the server; controlled by a network admin - server: computer on the network that controls access to hardware, software, and other resources; can provide centralized storage location that other computers on the network can access - client: computer or mobile device on the network that relies on the server for its resources; some clients have more permissions than others
Cloud computing
part of Internet P2P, Internet-based delivery of computing services (data storage, apps) ADVANTAGES - files stored/accessed from any device w/ internet connection - files stored on remote servers + remain intact if anything happens to your device - files don't take up space bc they are stored in the cloud - easily share files w/ others and control who has access to each file - configure your device to automatically back up certain files DISADVANTAGES - potential for unwanted individuals accessing your files if you don't carefully manage who can access them - inability to access your files if you lose Internet connection
Encryption
process of converting data so that it is unrecognizable when it is transmitted on a network or stored on a storage device, except to users who enter the correct password
Authentication
process of identifying a user to the network; normally a username and password or biometric devices to scan characteristics
Firewall
protective barrier between a computer or network and others on the Internet that inspects data being transmitted to or from a network to prevent unsolicited data exchanges - Hardware firewalls: physical devices used on larger corporate networks that block unauthorized traffic and intruders from accessing the network - Software firewalls: "local firewalls" installed on your computer or device and block unauthorized communication to or from the network. often built into the computer's operating system
Wireless network key
series of numbers and/or letters sometimes also referred to as a network security key, to encrypt data sent between devices
Bluetooth
short-range wireless technology, often used to facilitate communication at a range of 30 ft/9 m or less
Switch
similar to a hub but used more frequently today, provides central point for cables in a network; transfers data only to the intended recipient
Network
system of 2 or more devices linked by wires, cables, + telecommunications systems; requires a combination of hardware & software system's features to operate
Internet Service Provider (ISP)
telecommunications company that sells Internet access; most offer a broadband connectivity capable of transmitting large amounts of data at high speeds
Internet Peer-to-Peer (internet P2P) network
type of P2P network where users share files with each other over the internet, with files directly transferring from one user's computer to another without first being stored on a server - illegal to share files protected by copyright
Denial of Service (DoS) attack
type of attack, normally on a server, meant to overload the server with network traffic so it cannot provide necessary services
Phishing
type of email scam that tries to trick you into revealing personal or financial info; disguise themselves as email messages from legitimate sources, but may encourage you to click a link within the email or open an attached file
DSL modem
uses existing standard copper telephone wiring to send and receive digital data
distributed denial of service (DDoS) attack
when an attacker uses multiple computers to attack a server or other network resource