ITN v6 - Chapter 1 Terms

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

These are used to further filter access and network traffic

Access Control Lists (ACLs)

Used to protect end devices from becoming infected with malicious software.

Antivirus and Antispyware

End users having the freedom to use personal tools to access information and communicate across a business or campus network. Any device, with any ownership, used anywhere.

Bring Your Own Device (BYOD)

A circuit-switched network is one that establishes a dedicated circuit between the source and destination before the users may communicate.

Circuit-switched network

a network device that accesses a service on another computer remotely through a network

Client

Allows users to store personal files, even backup an entire hard disk drive on servers over the Internet. (Ex: Google Drive, Dropbox, etc.)

Cloud computing

The act of working with another or others on a joint project - using software like Cisco's WebEx (videoconferencing) or Google Docs

Collaboration

Networks capable of delivering data, voice, and video between many different types of devices over the same network infrastructure

Converged networks

Built to meet the needs of a specific industry, such as healthcare or media. Can be public or private.

Custom clouds

Having the assurance of timely and reliable access to data services for authorized users.

Data Availability

Only the intended and authorized recipients can access and read data.

Data Confidentiality

Having the assurance that the information has not been altered in transmission, from origin to destination.

Data Integrity

A facility used to house computer systems and associated components.

Data center

An attack to capture private information from an organization's network

Data interception and theft

These are used to provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

Dedicated Firewall Systems

reserved circuits within the service provider's network that connect geographically separated offices for private voice or data networking

Dedicated Leased Line

Attacks designed to slow or crash applications and processes on a network device

Denial of Service (DoS) attacks

either the source or destination of a message transmitted over the network

End device

Provides secure and safe access to individuals who work for a different organization, but require access to the organization's data

Extranet

A network that limits the impact of failures by limiting the number of affected devices.

Fault tolerant network

Used to block unauthorized access to the network

Firewall filtering

An attack by a knowledgeable person to user devices or network resources

Hacker attacks

Made up of two or more clouds (Ex: part custom, part public), where each part remains a distinctive object, but both are connected using a single architecture.

Hybrid clouds

An attack to steal the login credentials of a user in order to access private data

Identity Theft

specialized ports on a network

Interface

connects end devices to the network and can connect multiple individual networks to form an internetwork

Intermediary device

A worldwide collection of interconnected networks (a network of networks)

Internet

a company that provides access to the internet for a monthly fee

Internet Service Provider (ISP)

A private collection of LANS and WANs that belongs to a organization, and is designed to be accessible only by the organization's members, employees, or others with authorization.

Intranet

These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks

Intrusion Prevention System (IPS)

A network infrastructure that provides access to users and end devices in a small geographical area, which is typically an enterprise, home, or small business network owned and managed by an individual or IT department.

Local Area Network (LAN)

Identifies devices, ports, and addressing scheme

Logical topology diagram

provides the channel over which the message travels from source to destination

Medium

networks used by corporations and schools, which can have many locations with hundreds or thousands of interconnected computers

Medium to large network

A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (e.g., a city). MANs are typically operated by a single entity such as a large organization.

Metropolitan Area Network (MAN)

computer hardware, typically used for LANs, that allows the computer to connect to some networking cable. The NIC can then send and receive data over the cable at the direction of the computer

Network Interface Card (NIC)

The technologies that support the infrastructure and the programmed services and rules that move data across the network.

Network architecture

Measured in the number of bits that can be transmitted in a single second, or bits per second (bps)

Network bandwidth

Packet switching splits traffic into packets that are routed over a shared network.

Packet-switched network

allows people to share files with each other without having to store and download them from a central server.

Peer-to-Peer (P2P) File Sharing

Peer-to-Peer file sharing allows people to share files with each other without having to store and download them from a central server.

Peer-to-Peer network

a connector or outlet on a networking device where the media is connected to the end device or another networking device

Physical Port

Identifies the physical location of intermediary devices and cable installation

Physical topology diagram

Uses existing electrical wiring to connect devices to network - "no new wires"

Powerline networking

Intended for a specific organization or entity, such as the government.

Private clouds

Made available to the general population. May be free or offered on pay-per-use model (Ex: paying for online storage). Uses the Internet to provide services.

Public clouds

Managed by the router, it ensures that priorities are matched with the type of communication and its importance to the organization (live video and voice get priority)

Quality of Service (Qos)

A network that can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.

Scalable network

can refer to computer hardware that is to be used by multiple concurrent users. Alternatively, this term can refer to computer software that provides services to many users.

Server

enables computers within a home office or a remote office to connect to a corporate network or access centralized, shared resources

Small Office/Home Office or SOHO network

Technology that is integrated into everyday appliances allowing them to interconnect with other devices, making them more 'smart' or automated.

Smart home technology

Software installed on a user device that secretly collects information about the user

Spyware and adware

A network infrastructure designed to support file servers and provide data storage, retrieval, and replication.

Storage Area Network (SAN)

These are used to provide secure access to remote workers

Virtual Private Network (VPN)

malicious software and arbitrary code running on a user device

Viruses, worms, and Trojan horses

A network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a telecommunications service provider.

Wide Area Network (WAN)

An ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs). WISPs are more commonly found in rural environments where DSL or cable services are not available.

Wireless Internet Service Provider (WISP)

Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.

Wireless LAN (WLAN)

An attack that occurs on the first day that a vulnerability becomes known.

Zero-day/Zero-hour attacks


संबंधित स्टडी सेट्स

Human Nutrition Mid-Term Chapter 6

View Set

Shortened or Lengthened (Muscles)

View Set

Econ Chapters 3-5 Homework and Practice Exam TTU

View Set

C1 S6 Unit 3: Federal Fair Lending Laws

View Set

Ch. 41: Stress and Adaptation PrepU

View Set

Paper 2: Prose - interesting points

View Set

4 - Project Cost Management - Define & Test

View Set

PrepU - Chapter 26: Assessing Male Genitalia and Rectum

View Set

Application in Information Security Chapter 6

View Set

Chapter 10 - Search & Seaizure: Exceptions to the Warrant Requirement

View Set

Psychotic Disorders - Schizophrenia, Personality Disorders from NCLEX 3000

View Set