Chapter 5
Local Area Network (LAN)
Data communication system consisting of multiple devices that are near each other and physically connected using cables or wireless media.
Packets
Data moves through network in structures. Pieces of a message broken down into small units by sending device and reassembled by receiving data.
Spyware
Designed to report activity on your computer to another party.
Network interface card(NIC)
Device at each nod that performs translation and transmission.
Bridge
Device that connects two LANS or segments of the same LAN
Bridge
Device used to connect two LANS or two segments
Data minimg
Discovery of new patterns or relationships between data.
Threat
A thing that can cause harm
Interoperability
Ability of each organization's information system to work with the other, sharing both data and services.
Inference engine
Accepts information about the problem being analyzed and uses the knowledge base to select the most appropriate response or follow up question.
Virtual private network(VPN)
Activity will pass through this first before entering the internet.
Network
Allows users to communicate and share information between computers and various devices.
Hacker
An individual who uses a computer and or network to commit crimes
Countermeasure
Any step you take to ward off a threat
Distributed denial of service
Attack that allows hackers to shut down or block access to the websites and other network resource by overwhelming them with requests.
Cyberterrorism
Attack that seeks large-scale chaos and damage to a countries infrastructure .
Scalability
Capacity to provide increasing amounts of computing power, storage, and/or software.
Passive DDS
Collects and displays data in a format request
Active DDS
Collects data and makes recommendations
Router
Complex device that stores the routing information for networks. Determines the best route for packets.
Information system (IS)
Complex system for acquiring,storing, organizing , using and sharing data and information
Fault-tolerant
Computers able to continue their operation even when problems are present.
Redundant
Computers have multiple hardware systems performing the same task at the same time to protect against the failure of one system
Wide Area Network (WAD)
Connection of two or more central computers or LANs, generally across a wide geographical area
Fiber-optic cable
Consist of a thin strand of glass that transmits pulsating beams of light rather than electric current.
Twisted pair cable
Consist of four pairs of wires twisted around each other. All wires are bound together in a layer of plastic that is referred to as network cable
Payload
Contains actual data being transmitted .
Header
Contains information needed by the network, such as address of the destination code.
Data warehouse
Enormous digital warehouse that contains data gathered from multiple databases.
Social engineering
Form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.
Cybercrimes
From Creating viruses to disrupting computer networks.
Pretexting
Gaining someone's trust by pretending you're someone else.
Authorization
Gives individuals a certain level of access based on who they are.
Identity theft
Hackers that look for personal data that will allow them to assume the identity of another individual.
Surge protector/suppressor
Inexpensive product that guards connected equipment against large power spikes or surges
Zombies
Infected computers that are under the external control of a hacker.
Knowledge base
Information gathered by human experts is entered into a highly detailed database
Mission critical
Information systems that run without failure or with nearly instant recovery from failure.
Intranet
Internal version of the Internet. Contains only the company's private information.
Tape library
Large storage unit for magnetic tape drives, to create backup and archives of data.
Topology
Logical layout of the cables and devices that connect the nodes of a network (bus, star, ring, mesh)
Phishing
Luring individuals into entering personal information into a website controlled by the hacker.
Wireless adapter
Most desktop computers require and internal or external ______ to connect to a WAP
Wi-fi
Most powerful standard for wireless networking called 802.11 _____
Ethernet
Most widely used standard for local area networks.
Botnets
Networks of zombies used by the hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
Gateway
Node on a network that serves as an entrance to another network.
Power fluctuations
Power levels that rise and fall can produce unpredictable behavior in, or cause damage to, sensitive computer components .
Data validation
Processing of safeguarding against erroneous or duplicate data by checking what is entered and placing restrictions on how data is entered.
Trojan horse
Program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
Hub
Provides multiple ports for connecting nodes.
Authentication
Refers to the requirement that an individual confirm his or her identity.
Protocols
Rules of communication that ensure packets are sent, received, and interpreted properly, and that data integrity, or accuracy , is guaranteed.
Management information system (MIS)
Set of software tools that enables managers to gather, organize, and evaluate information.
Malware
Several types of malicious computer programs that are created to harm computer systems and their users
Switch
Similar to hub. Aware of the exact address or identity of all the nodes attached to it.
Coaxial cable
Single copper wire surrounded by insulation and a wire mesh shield, all inside a plastic sheath.
Decision support system(DDS)
Special application that collects and reports certain types of data. Help make better decisions.
Bandwidth
Speed. The amount of data that can be transmitted over a given amount of time. Measures in megabits per second (Mbps) or gigabits per second(gbps)
Redundant array of independent disks(RAID)
Storage system that links any number of disk drives so that they act as a single disk. Helps guard against data loss if a single disk breaks.
Power failure
The complete loss of power can result in the lost of unsaved work or the interruption of an important business function
Transaction processing system (TPS)
The information system that handles the processing and tracking of transactions
Attenuation
The loss of intensity and clarity of the data signal being transmitted. Affected by distance.
Node
The network uses the media to carry data from one connection point to another
A wireless access point(WAP)
To create a wireless LAN. all nodes connect to the device.
Network Media
To link parts of a computer network.
Scareware
Tricks users into following a thief's orders.
Expert system
Type of information system
Expert system
Type of information system that performs analytical tasks done by humans.
Virus
Type of malware that is attached to a host file and has the ability to replicate or copy itself
Worm
Type of malware that self replicates and spreads through computers and networks
Office automation system
Use computers and/or networks to perform various office-related operations, such as word processing, accounting , document management or communications.
Wireless networks
Use radio signals that travel through air to transmit data.
Repeater
Used to prevent attenuation when packets are traveling long distances.
Extranet
Used to share some of a company's intranet resources with people outside the organization.
Vulnerability
Weakness that has not been protected against threats.
Risk assessment
Where you identify and examine possible threat.
Uninterruptible power supply (UPS)
Which contains battery, can keep a system on in the event of a power failure.
Rogue hotspot
Wireless access point users accidentally connect to.