IT: ch 5: networking/security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

wireless access point (WAP)

All nodes connect to the device in order to communicate wirelessly

a data warehouse

All of this information is generally stored or archived in a central repository known as a __;This enormous digital warehouse contains data gathered from multiple databases.

countermeasure

Any step you take to ward off a threat

packets

Data moves though networks in structures (__) which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device two parts: certificate and key

identity theft.

Hackers will essentially assume your identity and begin to open new bank accounts under your name

rogue hotspot.

Hackers will set up their own wireless access points at popular areas such as airports. When users turn on their mobile devices or laptops to look for a free hotspot, they may inadvertently connect to the hacker's hotspot

botnets

Massive networks of zombies

data validation.

One method for checking and improving the reliability of data is called _;

extranet

Organizations can also create an _ to share some of its intranet resources with people outside the organization

network interface card (NIC),

The device at each node that performs translation and transmission (most printers and computers already have these)

transaction processing system (TPS).

The information system that handles the processing and tracking of transactions is

network media.

The means used to link parts of a computer network

Wi-Fi/ 802.11

The most popular standard for wireless networking

node

The network uses the media to carry data from one __, or connection point, to another

Payload

The second part of a packet contains the actual data being transmitted between the two nodes.

BUS TOPOLOGY

arranges the network nodes in a series, linking one node to the next via a single cable

router

complex device that stores the routing information for networks

RING TOPOLOGY

connects the network's nodes in a circular chain, with each node connected to the next

bridge

connects two LANs or two segments of the same LAN

Twisted-pair cable

consists of four pairs of wires that are twisted around each other

shielded twisted-pair (STP)

contain a metal sheath that surrounds all the wires in order to reduce interference

uninterruptible power supply (UPS)

contains both a surge protector and rechargeable battery, allowing it to handle any type of power issue for your computer.

TCP/IP

currently the most popular protocol and the driving force behind the Internet.

802.11ac

fastest specifications for Wi-Fi

Social engineering

form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

Pretexting

gaining someone's trust by pretending you are someone else

Phishing

luring individuals into entering personal information into a website controlled by the hacker

zombies

malware to open communication ports on the computers of thousands of users, making them available for control by the hacker. Computers infected and compromised in this way are known as

unshielded twisted-pair (UTP)

most types of twisted-pair cables do not have this shielding

Redundant

multiple hardware systems performing the same task at the same time

mission-critical

must run without failure or with nearly instant recovery from failure.

topology

network is the logical layout of the cables and devices that connect the nodes of the network

wireless adapter

piece of hardware plugged into a laptop to gain wifi

?

pretends to be the FBI or someone to gain info

a storage system that links any number of disk drives (a disk array) so that they act as a single disk

redundant array of independent disks (RAID)

protocols

ruled that must be followed by computers to communicate over a network

malware

several types of malicious computer programs that are created to harm computer systems and their users; most common threat to data and security

switch

similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it.

Striping with parity RAID 5

spreads data across several disks. However, it adds the safety of redundancy because the system stores parity information (a type of error-correcting code) that can be used to reconstruct data if a disk drive fails.

. Interoperability

the ability of each organization's information system to work with the other, sharing both data and services.

bandwidth

the amount of data that can be transmitted over a given amount of time

. Scalability

the capacity to provide increasing amounts of computing power, storage, and/or software

wide area network (WAN)

the connection of two or more central computers or LANs, generally across a wide geographical area.

data mining

the discovery of new patterns or relationships between data

attenuation

the loss of intensity and clarity of the data signal being transmitted

fault-tolerant

they are able to continue their operation even when problems are present.

virus

type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

authentication

where an individual must confirm his or her identity

risk assessment,

where you identify and examine possible threats, is critical to being able to safeguard a system

spyware

which is designed to report activity on your computer to another party

Mirrored system RAID 1,

writes data onto two or more disks simultaneously. This creates a complete copy of all the information on multiple drives, thereby preventing data loss if one drive fails.

Encryption

Many types of software and devices use encryption to scramble your data or communication, making it unreadable by anyone who doesn't have the proper key.

Header

This first part of a packet contains information needed by the network. It will have the address of the node that sent the packet (the source) and the address of the node that will receive the packet (the destination). The network reads each packet's header to determine where to send the packet and, in some cases, the best way to get it to its destination. The header also contains control data that helps the receiving node reassemble a message's packets in the right order

Anti-malware.

This software helps protect your computer from various types of malware.

office automation system.

This system uses computers and/or networks to perform various operations, such as word processing, accounting, document management, or communications

Firewall.

This utility examines and blocks Internet traffic in order to protect your private network. Firewalls are present in most operating systems and many types of routers

MESH TOPOLOGY

a cable runs from every computer to every other computer

router

a complex device that stores the routing information for networks. It looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination. __also provide increased security for the LAN they link.

information system (IS)

a complex system for acquiring, storing, organizing, using, and sharing data and information

tape library

a large storage unit for magnetic tape drives

gateway

a node on a network that serves as an entrance to another network

Trojan horse

a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

management information system (MIS)

a set of software tools that enables managers to gather, organize, and evaluate information

Coaxial cable

a single copper wire that is surrounded by insulation and a wire mesh shield

decision support system (DSS)

a special application that collects and reports certain types of data, can help managers make better decisions

expert system

a type of information system that performs analytical tasks traditionally done by a human

STAR TOPOLOGY

all nodes are connected to a hub (a type of linking device, described in the next section) and communicate through it.

distributed denial-of-service (DDoS)

allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

cyberterrorism

an attack that seeks to create large-scale chaos and damage to a country's infrastructure

hacker

an individual who uses a computer and/or network to commit a variety of crimes

surge protector

an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur

fiber-optic cable

consists of a thin strand of glass that transmits pulsating beams of light rather than electric current

local area network (LAN)

data communication system consisting of multiple devices that are relatively near each other and are physically connected using cables or wireless media

virtual private network (VPN).

employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet

authorization

gives individuals a certain level of access based on who they are

Striping RAID 0

gives the user rapid access by spreading data across several disks. used to boost data access performance and does not provide redundancy. If one of the disks in a striped array fails, the data is lost, because it's not being duplicated on any of the other disks.

Hacktivism

has a social or political agenda behind it, has become a popular reason to hack in recent years.

scareware

its goal is to scare the user into doing exactly what the thief wants.

hub

provides multiple ports for connecting nodes

Ethernet

standard for local area networks. It provides a variety of specifications for the equipment and protocols used in a network

worm

type of malware that self-replicates and spreads through computers and networks. Unlike a virus, a __is a fully contained program that is not attached to a host file.

Wireless networks

use radio signals that travel through the air to transmit data

repeater

used to prevent attenuation when packets are traveling long distances

intranet

uses the same software and service structure as the Internet, but it contains only the company's private information

vulnerability

weakness that has not been protected against threats, thereby making it open to harm.


संबंधित स्टडी सेट्स

PRACTICE QUIZ: CH.5 - Public Policing and Private Security

View Set

Chapter 10: Beginning and Ending the Speech

View Set

今天几月几号?What's The Date Today? (PinYin)

View Set

OSHA 30 - Quiz - 7 Material Storage

View Set

Ch 5 Newton's Third Law of Motion

View Set

Chekhov Final Exam on Plays (REMEMBER CHARACTERS' NAMES!!!)

View Set

Outstanding (Incredible) Final Geography Quizlet 5

View Set

RN Leadership Online Practice 2023B

View Set