Cyber Security Final
What is a LAN network?
A local area network - collection of devices connected together in one physical location
What is the purpose of a router?
A router receives and sends data in computer networks
What is a server?
A server is a computer that provides data to other computers. It may serve data to systems on local area network (LAN) or a wide area network (WAN) over the internet.
Who does cyber security affect?
Anyone that accesses the internet.
What is the CIA triad?
Confidentiality, Integrity, Availability
Port 21
FTP
Pet 80
HTTP
Port 443
HTTPS
What are main components of a network?
Hardware: server, client, peer, transmission medium, and connecting devices Software: operating system and protocols
How do you keep your computer safe from malicious content, such as unsafe files and harmful processes?
If someone sends you an email you do not know with a file attachment, delete the email. Verify the email is from the correct sender before putting in personal information.
What is social engineering? It's purpose?
Instead, social engineering is all about the psychology of persuasion: it targets the mind like your old school grifter or con man. The aim is to gain the trust of targets, so they lower their guard, and then encourage them into taking unsafe actions such as giving up personal information or clicking on malicious web links or attachments.
Purpose of a fire wall?
It's a security network device that monitors incoming and outgoing network traffic and decides wether to allow or block specific traffic based on a defined set of security rules.
How can you insure your browsing experience is secure?
Make sure your connection is safe websites using https, search on google before blindly typing in a url
What is malware?
Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contradiction for "malicious software". Examples of common malware systems include viruses, worms, Trojan viruses, spyware, adware, and ransoms are.
What are some careers that relate to cyber security?
Network engineer, network admin, and cyber security consultant
How does passive differ from active analysis?
Passive pulls real user data from specific points in the network (like putting an alarm in your house). Active looks at when, where, and how a burglar is likely to strike.
What is phishing?
Phishing attacks are the practice of sending fraudulent communications that appear to come firm a reputable source. It is usually performed through email.
Port 25
SMTP
What is a spam email?
Spam email is unsolicited and unwanted junk email sent out in bulk to an indiscriminate recipient list. Typically, spam is sent for commercial purposes.
What is the purpose of a network switch?
Switches facilitate the sharing of resources by connecting together all the devices, including computers, printers, and servers, in a small business network.
What is cyber security? Why do we need it?
The practice of protecting systems, networks, and programs from digital attacks.
What is the difference between authorized and unauthorized hacking?
Unauthorized is gaining access into computers, phones, tablets, loT devices, networks or entire computer systems Authorized involves the legal use of hacking