CIS 3580 - Chapter 1 Study Guide
What are common solutions to security threats?
- Antivirus and Anti-spyware - Firewall filtering - Dedicated firewall systems - Access control lists (ACL) - Intrusion prevention systems (IPS) - Virtual private networks (VPN)
What are the networking components?
- Client, Servers - Peer to Peer - End Devices - Intermediary Devices - Network Media
Networking Component, what it does, Advantages/Disadvantages: Client, Servers
- Clients are computers that send requests to the servers to retrieve information - Servers are computers that provide information to end devices
Clients
- Computers, such as users' personal computers, that use any of the services provided by servers. - A network device that accesses a service on another computer remotely threw a network*
Network Device representations and topologies: End Devices
- Desktop Computer - Laptop - Printer - IP Phone - Wireless Tablet - TelePresence Endpoint
Internet vs. Extranet vs. Intranet
- Internet: The internet is a worldwide collection of interconnected LANs and WANs - Extranet: An organization might use an extranet to provide secure access to their network for individuals who work for a different organization that need access to their data on their network. - Intranet: An intranet is a private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.
What is a LAN or WAN? How are they different? Characteristics?
- LAN - is a network infrastructure that spans a small geographical area. It interconnects end devices in a limited area, it is administered by a single organization or individual, and it provides high-speed bandwidth to internal devices. - WAN - is a network infrastructure that spans a wide geographical area. It interconnects LANs over wide geographical areas, typically is administered by one or more service providers, and is typically providing lower speed links between LANs.
Difference between logical and physical topologies and what each one represents
- Physical topology diagrams illustrate the physical location of intermediary devices and cable installation. - Logical topology diagrams illustrate devices, ports, and the addressing scheme of the network.
Quality of Service (QoS)
- Policies that control how much bandwidth a protocol, PC, user, VLAN, or IP address may use. - A control mechanism that can provide different priorities to different users or data flows or guarantee a certain level of performance to a data flow in accordance with requests from the application program.
What are the different types of networks:
- Small Home Networks - Small Office/Home Office (SOHO) - Medium to Large Networks - World Wide Networks
When are the different types of networks used?
- Small Home Networks: connect a few computers to each other and the Internet - Small Office/Home Office: enables computer within a home or remote office to connect to a corporate network - Medium to Large Networks: many locations with hundreds or thousands of interconnected computers - World Wide Networks: connects hundreds of millions of computers world-wide, such as the internet
What are common types of EXTERNAL security threats?
- Viruses, worms, and trojan horses - Spyware and adware - Zero-day Attacks - Threat actor attacks - Denial-of-service attacks - Data interception and theft - Identity theft
Network Device representations and topologies: Network Media
- Wireless Media - LAN Media - WAN Media
Network Device representations and topologies: Intermediary Devices
- Wireless Router - LAN Switch - Router - Multilayer Switch - Firewall Appliance
Which device performs the function of determining the path that messages should take through internetworks? A) A router B) A Firewall C) A Web Server D) A DSL Modem
A A router is a device that interconnects multiple networks and is responsible for forwarding messages between them
Network Representations: Network Interface Card (NIC)
A NIC physically connects an end device to a network
What are two functions of end devices on a network? (Choose two) A) They originate the data that flows through the network B) They direct data over alternate paths in the event of a link failure C) They filter the flow of data to enhance security D) They are the interface between humans and the communications network E) They provide the channel over which the network message travels
A and D Users interface with a network using an end device. An end device is either the source or destination of a message transmitted over the network
Internet Service Provider (ISP)
A company that helps create the internet by providing connectivity to enterprises and individuals, as well as interconnecting to other ISPs to create connectivity to all other ISPs
Wide Area Networks (WANs)
A network infrastructure that provides access to other networks over a wise geographic area, which is typically owned and managed by a larger corporation or a telecommunications service provider.
Converged Data Networks
A network that aggregates various forms for traffic, such as, voice, video, and data, on the same network infrastructure.
Scalable Network
A network that can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.
Fault Tolerant Network
A network that can recover from minor errors. A network that limits the number of devices affected by a failure
Network Representations: Physical Port
A port is a connector or an outlet on a networking device where a medium connects to an end device or another networking device
Extranet
A private network that uses Internet technologies to share business information with select corporate partners or key customers. Examples are: - A company that is providing access to outside supplies and contractors - A hospital that is providing a booking system to doctors so they can make appointments for their patients - A local education office that is providing budget and personnel information to the schools in its district
Network Representations: Interface
A specialized port on a networking device that connects to a network. Because routers connect networks, the ports on a router are referred to as network interfaces.
Internet
A worldwide collection of interconnected networks. Can also be viewed as a collection of interconnected LANs and WANs.
Small Office and Home office (SOHO) Networks
Allow people to work from home or a remote office. Many self-employed workers use these types of networks to advertise and sell products, order supplies, and communicate with customers
Common Types of Networks: SOHO Networks
Allows computers in a home office or a remote office to connect to a corporate network or access centralized, shared, resources
Cloud Computing
Allows us to store personal files - even back up an entire drive - on servers over the internet
Security Threats: Zero-day Attacks
Also called Zero-Hour attacks, these attacks occur on the first day that a vulnerability becomes known
Wireless Internet Service Provider (WISP)
An ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs).
Networking Component, what it does, Advantages/Disadvantages: End Devices
An end device is where a message originates from or where it is received. Data originates with an end device, flows through the network, and arrives at an end device. Some examples of end devices include Computers (work stations, laptops, file servers, web servers), Network printers, VoIP phones.
Dialup Telephone Connection
An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dialup modem connection is not sufficient for large data transfers, although it is useful for mobile access while traveling.
Networking Component, what it does, Advantages/Disadvantages: Intermediary Devices
An intermediary device interconnects end devices. Examples include switches, wireless access points, routers, and firewalls. Management of data as it flows through a network is also the role of an intermediary device, including: - Regenerate and retransmit data signals. - Maintain information about what pathways exist in the network. - Notify other devices of errors and communication failures.
Topology Diagram
Are mandatory documentation for anyone working with a network. Provides a visual map of how the network is connected. Two Types: - Physical - Logical
Business Internet Connections: Business DSL
Available in various formats. Provides high bandwidth, high availability, and an always-on connection to the internet. Runs over a telephone line.
What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users? A) Reliability B) Scalability C) Quality of Service D) Accessibility
B A scalable network expands quickly to support new users and applications
For which of the following would the use of a WISP be recommended? A) An internet café in a city B) A farm in a rural area without wired broadband access C) Any home with multiple wireless devices D) An apartment in a building with cable access to the internet
B A wireless internet service provider (WISP) is an ISP that connects subscribers to a designated access point or hotspot using wireless technologies similar to those in home wireless local-area networks (WLANs). WISPs are most commonly found in rural environments where DSL or cable services are not available
What type of network must a home user access in order to do online shopping? A) An intranet B) The Internet C) An Extranet D) A local area network
B The internet is the communications network for accessing ecommerce websites
Which two Internet connection options do not require that physical cables be run to the building? (Choose two.) A) DSL B) Cellular C) Satellite D) Dialup E) Dedicated leased line
B and C Cellular and satellite communications are wireless technologies that do not require physical cables
What are the two characteristics of a scalable network? (Choose Two) A) Easily overload with increased traffic B) Grows in size without impacting existing users C) Is not as reliable as a small network D) Suitable for modular devices that allow for expansion E) Offers limited number of applications
B and D A scalable network expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users. Scalability is typically required in networks with wireless and mobile devices, where the number of devices may increase at any time
What are the different types of internet connections?
Broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services.
What is an ISP? A) It is a standards body that develops cabling and wiring standards for networking B) It is a protocol that establishes how computers in a local network communicate C) It is an organization that enables individuals and businesses to connect to the internet D) It is a networking device that combines the functionality of several different networking devices in one
C Home users, remote workers, and small offices typically require a connection to an ISP (internet service provider) to access the internet
During a routine inspection, a technician discovered that software was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? A) DoS Attack B) Identity Theft C) Spyware D) Zero-Day Attack
C Spyware us a type if software that is installed on a User's device to collect information about the user
What is the Internet? A) It is a network based on Ethernet Technology B) It provides network access for mobile devices C) It provides connections through interconnected global networks D) It is a private network for an organization with LAN and WAN connections
C The internet is a worldwide collection of interconnected networks (internetworks, or internet for short)
An employee wants to access the network of an organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network? A) ACL B) IPS C) VPN D) BYOD
C A virtual private network (VPN) provides secure access to an organization's network for remote workers
Which term refers to a network that provides secure access to the corporate offices for suppliers, customers, and collaborators? A) Internet B) Intranet C) Extranet D) Extended Net
C An organization may use an extranet to provide safe access to individuals who work for a different organization but require access to the organization's data
A large corporation has modified its network to allow users to access network resources from their personal laptops and smartphones. Which Networking trend does this describe? A) Cloud Computing B) Online Collaboration C) Bring Your Own Device (BYOD) D) Video Conferencing
C BYOD gives end users the freedom to use personal devices to access information and communicate across a business or campus network
Networking Component, what it does, Advantages/Disadvantages: Network Media
Communication across a network is carried through a medium which allows a message to travel from source to destination. Media types include metal wires within cables (uses electrical impulses), glass or plastic fibers within cables (uses pulses of light), and wireless transmission (Uses modulation of specific frequencies of electromagnetic waves.)
Server
Computers with software that allows them to provide information, such as email or web pages, to other end devices on the network
Satellite connection
Connection that provides limited high speed connections through a dish pointed in the sky. The availability of satellite internet access is a benefit in areas that would otherwise have no internet connectivity at all. A satellite dish must have a clear line of sight to the satellite.
Cloud Types: Community
Created for exclusive use by specific entities or organizations. The difference between public and community clouds are the functional needs that have been customized for the community. For example: healthcare organizations must remain compliant with policies and laws (such as HIPAA) that require special authentication and confidentiality. Community clouds are used by multiplue organizations that have similar needs and concerns. It is similar to a public cloud environment but with set levels of security, privacy, and even regulatory compliance, as in a private cloud.
A college is building a new dormitory on its campus. Workers are digging the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber-optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories experience only a very short interruption of network services. What characteristic of the network is described here? A) Quality of Service B) Scalability C) Security D) Fault Tolerance E) Integrity
D A fault-tolerant network limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs
How does BYOD change the way in which businesses implement networks? A) BYOD requires organizations to purchase laptops rather then desktops B) BYOD users are responsible for their own network security, thus reducing the need for organizational security policies C) BYOD devices are more expensive than devices that are purchased by an organization D) BYOD provides flexibility in where and how users can access network resources
D BYOD gives end users the freedom to use personal devices to access information and communicate across a business or campus network. The trend has been to allow employees access to internal network services and information from personal devices
Availability
Data Availability assures users of timely and reliable access to data and services for authorized users.
Integrity
Data Integrity assures users that the information has not been altered in transmission, from origin to destination
Confidentiality
Data confidentially means that only the intended and authorized recipients can access and read data
Network Media: Metal Wires within Cables
Data is encoded into electrical Impulses
Network Media: Glass or Plastic Fibers within Cables (Fiber-Optic Cable)
Data is encoded into pulses of light
Network Media: Wireless transmission
Data is encoded via modulation of specific frequencies of Electromagnetic waves
End Device
Either the source or the destination of a message transmitted over the network
Four basic characteristics of network architecture and how they are used to meet customer expectations.
Fault tolerance, Scalability, Quality of Service (QoS), and Security.
Security Solutions: Access control lists (ACL)
Further filter access and traffic forwarding based on IP Addresses and applications
Business Internet Connections: Asymmetrical DSL (ADSL)
Generally, small office and home office users connect using asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
Bring Your Own Device (BYOD)
Gives end users the freedom to use personal tools to access information and communicate across a business or campus network
What are the four basic elements of a network?
Hardware, Software, Protocols, and the connection Medium
Security Solutions: Antivirus and Anti-spyware
Help to protect end devices from becoming infected with malicious software
Topology Diagrams: Logical
Illustrates devices, ports, and the addressing scheme of a network. You can see which end devices are connected to which intermediary Devices and what media are being used.
Topology Diagrams: Physical
Illustrates the physical locations of intermediary devices and cable installation. You can see that the rooms in which these are devices are located are labeled.
Security Threats: Threat actor attacks
In these attacks, malicious persons attack user devices or network resources
Cloud Types: Private
Intended for a specific organization or entity, such as a government. Can be set up using the organization's private network, although this can be expensive to build and maintain. Can also be managed by an outside organization with strict access security.
Business Internet Connections: Symmetric DSL (SDSL)
Is similar to the consumer version of DSL by provides uploads and downloads at the same high speeds
Networking Component, what it does, Advantages/Disadvantages: Peer to Peer
It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only recommended for very small networks. -Some advantages include, easy to set up, less complex, lower cost, and it's used for simple tasks: transferring files and sharing printers. -Some disadvantages include no centralized administration, not as secure, not as scalable, and slower performance.
Business Internet Connections: Dedicated leased lines
Leased lines are reserved circuits within a service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.
Cloud Types: Public
Made available to the general population. Services may be free or offered on a pay-per-use model, such as paying for online storage. Uses the internet to provide services
Cloud Types: Hybrid
Made up of two or more clouds (for example: part private and part public), where each part remains a distint objective but the two are connected using a single architecture. Individuals on a hybrid cloud would be able to have degreed of access to various services based on user access rights.
Intranet
Often used to refer to a private connection of LANs and WANs that belong to an organization. Designed to be accessible only by the organization's members, employees, or others with authorization
Security Solutions: Dedicated firewall systems
Provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity
Digital Subscriber Line (DSL)
Provides high bandwidth, high availability, and an always-on connection to the internet. Runs over a telephone line. Generally, small office and home office users connect using asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
Business Internet Connections: Satellite
Satellite service can provide a connection when a wired solution is not available
What are three elements of communication in technology
Sender, Receiver, and message
Common Types of Networks: Medium to Large Networks
Such those used by corporations or schools, can have many locations with hundreds or thousands of interconnected hosts
Topology
The arrangement of networking components or nodes. Examples include star, extended star, ring, and mesh.
Common Types of Networks: Worldwide Networks
The internet is a network of networks that connects hundreds of millions of computers worldwide
Security Threats: Denial-of-service attacks
These attacks slow or crash applications and processes on a network device
Security Threats: Viruses, worms, and trojan horses
These contain malicious software or code running on a user device
Security Solutions: Virtual private networks (VPN)
These networks provide secure access into an organization for remote workers
Security Solutions: Intrusion prevention systems (IPS)
These systems identify fast-spreading threats, such as zero-day or zero-hour attacks.
Security Threats: Spyware and adware
These types of software are installed on a user's device to secretly collect information about the user
Business Internet Connections: Metro Ethernet
This is sometimes known as Ethernet WAN. Can be used to extend LAN access technology into the WAN.
Security Threats: Data interception and theft
This type of attack involves capturing private information from an organization's network
Security Threats: Identity theft
This type of attack involves stealing the login credentials of a user in order to access private data
Wireless Broadband Service
This uses the same cellular technology used to access the Internet with a smart phone or tablet. An antenna is installed outside the house providing either wireless or wired connectivity for devices in the home.
Cellular Connection
Uses a cellphone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone or other device and the cell tower which is connected.
Home and Small office Internet Connections: Cable Connection
With this type of connection, typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. This connection type provides high-bandwidth, high availability, and an always-on connection to the internet.
Local Area Networks (LANs)
a Network infrastructure that provides access to users and end devices in a small geographical area. Typically used in a department within an enterprise, a home, or a small business network.
Security Solutions: Firewall filtering
blocks unauthorized access into and out of the network. May include a host-based firewall system that prevents unauthorized access to the end device or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network
Common Types of Networks: Small Home Networks
connect a few computers to each other and to the internet
Intermediary Devices
connect the individual end devices to the network and can connect multiple individual networks to form an internetwork
Powerline Networking
the connection of devices to the Internet through the use of existing electrical wiring to connect devices