ITEC Chapter 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

authorization

gives individuals a certain level of access based on who they are.

Data Mining

the discovery of new patterns or relationships between data

Data Warehouse

where a collection of enormous data is store in a central repository

distributed denial-of-service

*DDoS* attack that allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

Decision Support Systems

*DSS* is a special application that collects and reports certain types of data, can help mangers make better decision.

DSS

*Decision Support Systems* is a special application that collects and reports certain types of data, can help mangers make better decision. Passive - simply collects and displays data in the format requested. Active - collects the data but also makes recommendations as to the best decision

Local Area Network

*LAN* - A data communication system consisting of multiple devices that are relatively near each other and are physically connected using cables or wireless media.

LAN

*Local Area Network* - A data communication system consisting of multiple devices that are relatively near each other and are physically connected using cables or wireless media.

Management Information System

*MIS* is a set of software tools that enables managers to gather, organize and evaluate information.

MIS

*Management Information System* is a set of software tools that enables managers to gather, organize and evaluate information.

Network Interface Card

*NIC* also known as a network adapter card - device at each node that performs translation and transmission of media

NIC

*Network Interface Card * also known as a network adapter card - device at each node that performs translation and transmission of media

Redundant array of independent disks (Raid)

*Raid* is a storage system that links any number of disk drives so they act as a single disk.

Raid

*Redundant array of independent disks* is a storage system that links any number of disk drives so they act as a single disk. *Striping* - also known as RAID 0 gives the user rapid access by spreading data cross several disks. *Mirrored system* - Also know as RAID 1 writes data onto two or more disks simultaneously *Striping with parity* - commonly implemented as RAID 5 spreads data across several disks, stores parity information that can be used to reconstruct data if a a disk drive fails.

Transaction processing Systems

*TPS* the information system that handles the processing and tracking of trnasactions

TPS

*Transaction processing Systems * the information system that handles the processing and tracking of trnasactions

uninterruptible Power supply

*UPS* - contains both a surge protector and rechargeable battery

Virtual Private Network

*VPN* - employs a method called tunneling in which each packet from the sending computer is encapsulated within another packet before being sent.

VPN

*Virtual Private Network* - employs a method called tunneling in which each packet from the sending computer is encapsulated within another packet before being sent

Wide area Network

*WAN* - is the connection of two or more central computers or LANS, generally across a wide geographical area. ex: Company has its corporate headquarters and manufacturing plant in one city and its marketing office in another.

WAN

*Wide area Network* - is the connection of two or more central computers or LANS, generally across a wide geographical area. ex: Company has its corporate headquarters and manufacturing plant in one city and its marketing office in another.

WAP

*Wireless Access Point* - needed to create a wireless LAN

UPS

*uninterruptible Power supply* - contains both a surge protector and rechargeable battery

Node

A connection point that carries data

tape library

Large organizations use a lare storage unti for magnetic tape drives.

Safeguards:

Power Failure Power Fluctuations Solution: *Surge protector*

Payload

Second part of a packet which contains the actual data being transmitted between the two nodes.

Intranet

Some organizations offer an internal version of the internet . - uses the same software and service structure as the Internet, but contains only the company's private information. It limits employees with the company.

WI FI

Standards for wireless networking 802.11b up to 11 Mbps 802.11g up to 54 Mbps 802.11n up to 600 Mbps 802.11ac up to 1gbps(>1000 Mbps)

Bandwidth

The amount of data that can be transmitted over a given amount of time. Measured in Megabits per second(Mbps) or Gigabits per second (Gbps)

Header

The first part of a packet that contains information needed by the network. Also contains control data that helps the receiving not reassemble a messages packet in the right order

Attenuation

The loss of intensity and clarity of the data signal being transmitted.

Network Media

The means used to link parts of a computer network

gauging threats

The probability of the threat The degree of vulnerability The penalty or injury that may occur if the threat succeeds in causing harm.

Worm

Type of malware that sef-replicates an spreads through comptueres and networks. - fully contained.

STP

Wires that are known as *shielded* because they contain a metal sheath that surrounds all the wires

UTP

Wires that are known as *unshielded* because they don't contain a metal sheath that surrounds all the wires

Mesh Topology

a cable runs from every computer to every other computer.

Bridge

a device that connects two LANS or two segments of the same LAN. A bridge looks at the information in each packet header and forwards the data traveling form one LAN to another. This is different from routers and gateways, which generally connect two different types of networks.

Social Engineering

a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs. *Pretexting* - gaining someones trust by pretending you are someone else. *Phishing* involves luring individuals into entering personal information into a website controlled by the hacker.

Coaxial Cable

a single copper wire that is surrounded by insulation and a wire mesh shield. Main advantage is that it is less susceptible to signal interference.

Ethernet

a standard for local area networks. It provides a variety of specifications for the equipment and protocols used in a network.

Expert System

a type of information system that performs analytical tasks traditionally done by a human. Examples: monitor the inventory levels for a grocery store Education - create adaptive exams or educational products.

Star Topology

all nodes are connected to a hub and communicate through it. most common topology used today

Countermeasure

any step you take to ward off a threat

Threat

anything that can cause harm

BUS Topology

arranges the network nodes in a series, linking one node to the next via a single cable.

Ring Topology

connects the network's nodes in a circular chain, with each node connected to the next. The last node is connected to the first completing the ring

Twisted pair

consists of four pairs of wires that are twisted around each other

Packets

data move through networks in structures known as packets it is pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

Spyware

designed to report activity on your computer to another party

Wireless networks

does not require physical media for communication between nodes. Uses radio signals to transmit data.

Zombies

hacked computers that are under external control

Rogue Hotspot

hackers hot spot

Hactivism

hacking that has a social or political agenda behind it

Fiber Optic Cable

has a thin strand of glass that transmits pulsating beams of light rather than electric current. Immune to the electromagnetic interference that is a problem for copper wire. It is extremely fast and can carry a ton more messages simultaneously and is a very secure transmission medium. It cost more and is more vulnerable to damage in installation.

Redundant Computers

have multiple hardware systems performing the same task at the same time.

risk assessment

identify and examine possible threats

authentication

individual must confirm his or her identity

Router

is a complex device that stres the routing information for networks.

Information Systems

is a complex system for acquiring, storing, organizing, using and sharing data and information.

Gateway

is a node on a network that serves as an entrance to another network. Also handles the configuration and maintenance of the various WAN or Internet addresses required to connect and relay information outside of the LAN.

vulnerability

is a weakness that has not been protected against threats, thereby making it open to harm.

Switch

is similar to a hub, but it is aware of the exact address ofr identity of all the nodes attached to it.

Botnet

massive networks of zombies used by hackers to spread malware, spam, and conduct network attacks.

Wireless Access Point

needed to create a wireless LAN

Trojan Horse

program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

Hub

provides multiple ports for connecting nodes.

WPA2

requires a password when connecting to your router and makes your wireless transmission unreadable by hackers.

Fault Tolerant computers

systems designed to continue operating without interruption when components and programs fail.

Mission Critical

systems that must run without failure or with nearly instant recovery from failure

Interoperability

the ability of each organizations information system to work with the other, sharing both data and services

Scalability

the capacity to provide increasing amounts of computing power, storage, and software.

Topology

the logical layout of the cables and devices that connect the nodes of the network.

data validation

the process ofm safeguarding against erroneous or duplicate data by checking what is entered and in some cases, placing restrictions on how the data is entered.

Virus

type of malware that is attached to a host fiel and has the ability to replicate, or copy itself.

Repeater

used to prevent attenuation when packets are traveling long distances.

Extranet

used to share some of it's intranet resources with people outside of the organization. Access to an extranet is possible only if you have a valid username and password.

Office automation system

uses computers and or networks to perform various operations such as word processing, accounting, document management or communications.


Set pelajaran terkait

History - The origins and continuity of the Kazakh formation of the state and nation

View Set

CompTIA Security+ - Lesson 11: Implementing Secure Network Protocols (Practice Questions)

View Set

ROLE OF KIDNEYS IN ACID-BASE BALANCE

View Set