ITN v6 - Chapter 1 Terms
These are used to further filter access and network traffic
Access Control Lists (ACLs)
Used to protect end devices from becoming infected with malicious software.
Antivirus and Antispyware
End users having the freedom to use personal tools to access information and communicate across a business or campus network. Any device, with any ownership, used anywhere.
Bring Your Own Device (BYOD)
A circuit-switched network is one that establishes a dedicated circuit between the source and destination before the users may communicate.
Circuit-switched network
a network device that accesses a service on another computer remotely through a network
Client
Allows users to store personal files, even backup an entire hard disk drive on servers over the Internet. (Ex: Google Drive, Dropbox, etc.)
Cloud computing
The act of working with another or others on a joint project - using software like Cisco's WebEx (videoconferencing) or Google Docs
Collaboration
Networks capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
Converged networks
Built to meet the needs of a specific industry, such as healthcare or media. Can be public or private.
Custom clouds
Having the assurance of timely and reliable access to data services for authorized users.
Data Availability
Only the intended and authorized recipients can access and read data.
Data Confidentiality
Having the assurance that the information has not been altered in transmission, from origin to destination.
Data Integrity
A facility used to house computer systems and associated components.
Data center
An attack to capture private information from an organization's network
Data interception and theft
These are used to provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
Dedicated Firewall Systems
reserved circuits within the service provider's network that connect geographically separated offices for private voice or data networking
Dedicated Leased Line
Attacks designed to slow or crash applications and processes on a network device
Denial of Service (DoS) attacks
either the source or destination of a message transmitted over the network
End device
Provides secure and safe access to individuals who work for a different organization, but require access to the organization's data
Extranet
A network that limits the impact of failures by limiting the number of affected devices.
Fault tolerant network
Used to block unauthorized access to the network
Firewall filtering
An attack by a knowledgeable person to user devices or network resources
Hacker attacks
Made up of two or more clouds (Ex: part custom, part public), where each part remains a distinctive object, but both are connected using a single architecture.
Hybrid clouds
An attack to steal the login credentials of a user in order to access private data
Identity Theft
specialized ports on a network
Interface
connects end devices to the network and can connect multiple individual networks to form an internetwork
Intermediary device
A worldwide collection of interconnected networks (a network of networks)
Internet
a company that provides access to the internet for a monthly fee
Internet Service Provider (ISP)
A private collection of LANS and WANs that belongs to a organization, and is designed to be accessible only by the organization's members, employees, or others with authorization.
Intranet
These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks
Intrusion Prevention System (IPS)
A network infrastructure that provides access to users and end devices in a small geographical area, which is typically an enterprise, home, or small business network owned and managed by an individual or IT department.
Local Area Network (LAN)
Identifies devices, ports, and addressing scheme
Logical topology diagram
provides the channel over which the message travels from source to destination
Medium
networks used by corporations and schools, which can have many locations with hundreds or thousands of interconnected computers
Medium to large network
A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (e.g., a city). MANs are typically operated by a single entity such as a large organization.
Metropolitan Area Network (MAN)
computer hardware, typically used for LANs, that allows the computer to connect to some networking cable. The NIC can then send and receive data over the cable at the direction of the computer
Network Interface Card (NIC)
The technologies that support the infrastructure and the programmed services and rules that move data across the network.
Network architecture
Measured in the number of bits that can be transmitted in a single second, or bits per second (bps)
Network bandwidth
Packet switching splits traffic into packets that are routed over a shared network.
Packet-switched network
allows people to share files with each other without having to store and download them from a central server.
Peer-to-Peer (P2P) File Sharing
Peer-to-Peer file sharing allows people to share files with each other without having to store and download them from a central server.
Peer-to-Peer network
a connector or outlet on a networking device where the media is connected to the end device or another networking device
Physical Port
Identifies the physical location of intermediary devices and cable installation
Physical topology diagram
Uses existing electrical wiring to connect devices to network - "no new wires"
Powerline networking
Intended for a specific organization or entity, such as the government.
Private clouds
Made available to the general population. May be free or offered on pay-per-use model (Ex: paying for online storage). Uses the Internet to provide services.
Public clouds
Managed by the router, it ensures that priorities are matched with the type of communication and its importance to the organization (live video and voice get priority)
Quality of Service (Qos)
A network that can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.
Scalable network
can refer to computer hardware that is to be used by multiple concurrent users. Alternatively, this term can refer to computer software that provides services to many users.
Server
enables computers within a home office or a remote office to connect to a corporate network or access centralized, shared resources
Small Office/Home Office or SOHO network
Technology that is integrated into everyday appliances allowing them to interconnect with other devices, making them more 'smart' or automated.
Smart home technology
Software installed on a user device that secretly collects information about the user
Spyware and adware
A network infrastructure designed to support file servers and provide data storage, retrieval, and replication.
Storage Area Network (SAN)
These are used to provide secure access to remote workers
Virtual Private Network (VPN)
malicious software and arbitrary code running on a user device
Viruses, worms, and Trojan horses
A network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a telecommunications service provider.
Wide Area Network (WAN)
An ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs). WISPs are more commonly found in rural environments where DSL or cable services are not available.
Wireless Internet Service Provider (WISP)
Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
Wireless LAN (WLAN)
An attack that occurs on the first day that a vulnerability becomes known.
Zero-day/Zero-hour attacks