Exam 2 IST 220
Viruses
A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus. NEEDS A HOST
Worms
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. STANDALONE SOFTWARE
Trojan Horse
A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. Trojan horses are common but dangerous programs that hide within other seemingly harmless programs. They work the same way the ancient Trojan horse did: Once they're installed, the program will infect other files throughout your system and potentially wreak havoc on your computer.
Patches
A patch is a set of changes to a computer program or its supporting data designed to update, fix, or improve it. This includes fixing security vulnerabilities and other bugs, with such patches usually being called bug fixes or bug fixes, and improving the usability or performance.
Inverse Square Loss
A plot of the drop of sound intensity according to the inverse square law emphasizes the rapid loss associated with the inverse square law. In an auditorium, such a rapid loss is unacceptable.
Dish Antenna
A satellite dish is a dish-shaped type of parabolic antenna designed to receive or transmit information by radio waves to or from a communication satellite. The term most commonly means a dish used by consumers to receive direct-broadcast satellite television from a direct broadcast satellite in geostationary orbit.
Password Complexity
A strong password consists of at least six characters (and the more characters, the stronger the password) that are a combination of letters, numbers and symbols (@, #, $, %, etc.) if allowed. Passwords are typically case-sensitive, so a strong password contains letters in both uppercase and lowercase.
Ethernet Switches
A switch is used in a wired network to connect to other devices using Ethernet cables. The switch allows each connected device to talk to the others. Wireless-only networks do not use switches because devices such as wireless routers and adapters communicate directly with one another.
Antivirus Programs
Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name. Viruses, worms, and the like often perform malicious acts, such as deleting files, accessing personal data, or using your computer to attack other computers. To help keep your computer healthy, install F-PROT Antivirus. You must also ensure both the program and the virus signature files are up to date.
Authorization
Authorization is the function of specifying access rights/privileges to resources, which is related to information security and computer security in general and to access control in particular. More formally, "to authorize" is to define an access policy. Who can have access?
BeamForming
Beamforming is a process that allows you to focus your WiFi signal. Put simply, when your router is sending out a WiFi signal, the signal gets wider and wider as it leaves the router decreasing losing strength in exchange for coverage
Ethernet
Ethernet is a family of computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.
802.11
IEEE 802.11 is part of the IEEE 802 set of LAN protocols, and specifies the set of media access control and physical layer protocols for implementing wireless local area network Wi-Fi computer communication in various frequencies
Link Aggregation
In computer networking, the term link aggregation applies to various methods of combining multiple network connections in parallel in order to increase throughput beyond what a single connection could sustain, and to provide redundancy in case one of the links should fail.
spread spectrum
In telecommunication and radio communication, spread-spectrum techniques are methods by which a signal generated with a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth.
Data Link Basics
It makes sure the appropriate physical protocol is assigned to the data. The data link layer is the second layer in the OSI Model. The three main functions of the data link layer are to deal with transmission errors, regulate the flow of data, and provide a well-defined interface to the network layer.
Malware
Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware does the damage after it is implanted or introduced in some way into a target's computer and can take the form of executable code, scripts, active content, and other software.
Possible actions by malware
Malware, a term used to describe malicious software, is designed to damage or disable computers. Malware includes viruses, spyware, adware, and various other types of harmful software. ... Malware impacts your computer in the following ways: Disrupts operations. "Malware" is short for "malicious software" - computer programs designed to infiltrate and damage computers without the users consent. "Malware" is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
Omnidirectional antennas
Omnidirectional antennas oriented vertically are widely used for nondirectional antennas on the surface of the Earth because they radiate equally in all horizontal directions, while the power radiated drops off with elevation angle so little radio energy is aimed into the sky or down toward the earth and wasted.
Media Access- CSMA/CA
Operates in the datalink layer;Carrier-sense multiple access with collision avoidance (CSMA/CA) in computer networking, is a network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to be "idle".[1][2] When they do transmit, nodes transmit their packet data in its entirety. It is particularly important for wireless networks, where the collision detection of the alternative CSMA/CD is not possible due to wireless transmitters desensing their receivers during packet transmission.
Phishing
Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication. (Sent to large amount of ppl)
RF Propagation
Radio propagation is the behavior of radio waves as they travel, or are propagated, from one point to another, or into various parts of the atmosphere.
Organization of Ethernet Switches
Switches in an Ethernet LAN are organized in a Hierarchy, in which each switch has only one parent switch above it.
Absorptive Loss
That part of the transmission loss caused by the dissipation or conversion of electrical, electromagnetic, or acoustic energy into other forms of energy as a result of its interaction with a material medium.
licensed vs. unlicensed bands
The Difference Between Licensed and Unlicensed Spectrum for Fixed Wireless. ... Within the radio spectrum there are several radio frequency bands. Some bands, known as unlicensed links or unlicensed spectrum, are unrestricted and available for any and all wireless communications providers to use.
Spear-Phishing
The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information. (personalized to victims!!)
Copper (UTP)
Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted together for the purposes of improving electromagnetic compatibility.
Vulnerabilities
Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack. A vulnerability may also refer to any type of weakness in a computer system itself, in a set of procedures, or in anything that leaves information security exposed to a threat.
Firewalls and Stateful Packet Inspection
a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet. Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall. Stateful inspection has largely replaced an older technology, static packet filtering.
Optic Fiber Network Cables
a network cable that contains strands of glass fibers inside an insulated casing. They're designed for long distance, high-performance data networking and telecommunications. Compared to wired cables, fiber optic cables provide higher bandwidth and can transmit data over longer distances. (FASTER ETHERNET CABLE) glass; quick
Dead Zones
higher the frequency the worst those problems get. Cont. effects get worse with higher frequencies/energies (more to loose along the way).
Multipath Fading
in wireless telecommunications, multipath is the propagation phenomenon that results in radio signals reaching the receiving antenna by two or more paths.
EMI
is the disruption of operation of an electronic device when it is in the vicinity of an electromagnetic field (EM field) in the radio frequency (RF) spectrum that is caused by another electronic device. The internal circuits of personal computers generate EM fields in the RF range.
MIMO
multiple-input and multiple-output; is a method for multiplying the capacity of a radio link using multiple transmission and receiving antennas to exploit multipath propagation.[1] MIMO has become an essential element of wireless communication standards
Authentication
the process or action of proving or showing something to be true, genuine, or valid. the process or action of verifying the identity of a user or process. verifying that access!