CH. 10 - NETWORKING

Ace your homework & exams now with Quizwiz!

Risks associated w/ connected network

- Adware: displays unwanted ads on your computer - Spyware: tracks and transmits personal info from your computer or device without your knowledge - Virus: damages data on your device or changes system settings - Worm: spreads throughout a computer and/or network without requiring user interaction - Trojan: disguises itself or hides itself in a legitimate file, then causes damage to programs and data when opened - Ransomware: locks you out of programs and data on your computer until you pay a ransom to regain access - Rootkit: gains administrator-level (root-level) access to a computer or network without the system or users detecting its presence

Additional network types

- Wired network: sends signals and data through cables, travel through floors + walls to connect to other network devices; more secure and transmit data faster than wireless - Wireless network: sends signals through airwaves usually not requiring cables, tend to be more convenient and easier to set up but less secure, make it possible to connect devices in locations where physical wiring isn't possible or difficult - Intranet: private network for use by authorized individuals, used by organizations to communicate internally, allows users to use a web browser to access data posted on webpages, preferable when data transferred shouldn't reach the internet - Extranet: allow outsiders (customers, venders, supploers) to access an organization's intranet - Virtual private network (VPN): private, secure path across a public network that allows authorized user's secure access to a company or other network, lets individuals access an organiaztion's network by using encryption and other tech to secure data transmitted along the path

Geographic reach

- local area network (LAN): connects computers + devices in a limited area (home, school, small office complex) - wide area network (WAN): network that connects devices in a large demographic region (multinational company, national retail chain, Internet) - metropolitan area network (MAN): type of wide area network operated by a city or country - personal area network (PAN): connects personal digital devices w/in a range of approximately 30 feet (smartwatch connecting to cell phone), usually through bluetooth - body area network (BAN): form of personal area network that consists of small, lightweight biosensors implanted in the body; monitor individual's health or activity, reporting results to a medical professional

Social engineering

attempt to exploit human weaknesses by building relationships with victims for the purpose of stealing confidential info

Network Interface Card (NIC)

circuit board that connects a computer to a wired or wireless network, often internal to the device

Modem

communications device that connects a communications channel such as the Internet to a sending or receiving device (computer); connects to the internet through ISP

network architecture

determines the logical design of all devices on a network; 2 types

Zombie

device infected with malware that an attacker uses to control the device remotely

Router

device that connects two or more networks and directs (routes), the flow info along the networks; connect computer to the Internet so multiple users can share a connection

Hub

device that provides a central point for cables in a network + transfers all data to all devices

Network attached storage (NAS)

devices to store data through network attached storage, with one or more hard drives that connect directly to a network and provide a centralized location for storing programs and data on large and small networks

Strong password

long combination of letters, numbers, and/or symbols that unlocks access to protected electronic data, more secure than a shorter password regardless of complexity, should be changed frequently

Malware

malicious software installing itself without permission to damage or steal data on your device

cable modem

may be part of a set-top cable box or separate devuce

network topology

method by which computers and devices are physically arranged on a network; include multiple networks - bus network: all devices on a central cable (bus) that carries all the data; if it fails all devices on the network can no longer communicate - ring network: data travels from one device to another in sequential fashion; if one device fails communication could cease to function; no longer common - star network: each device is connected to a central device (server or switch); if central device fails, other devices can't communicate, if connected device fails, others can still communicate; multiple can connect to form a tree topology (schools + businesses use it) - mesh network: all devices interconnect, when one device fails the rest can continue to function through an alternate route

Peer-to-Peer network (P2P)

network architecture that typically connects a small number of computers (often fewer than 10); computers communicate directly with each other and can share resources

Evil twin

normal-looking but fraudulent Wi-Fi network that allows hackers to capture personal info users transmit using it

Client/server network

one or more computers act as a server and the other computers on the network request resources from the server; controlled by a network admin - server: computer on the network that controls access to hardware, software, and other resources; can provide centralized storage location that other computers on the network can access - client: computer or mobile device on the network that relies on the server for its resources; some clients have more permissions than others

Cloud computing

part of Internet P2P, Internet-based delivery of computing services (data storage, apps) ADVANTAGES - files stored/accessed from any device w/ internet connection - files stored on remote servers + remain intact if anything happens to your device - files don't take up space bc they are stored in the cloud - easily share files w/ others and control who has access to each file - configure your device to automatically back up certain files DISADVANTAGES - potential for unwanted individuals accessing your files if you don't carefully manage who can access them - inability to access your files if you lose Internet connection

Encryption

process of converting data so that it is unrecognizable when it is transmitted on a network or stored on a storage device, except to users who enter the correct password

Authentication

process of identifying a user to the network; normally a username and password or biometric devices to scan characteristics

Firewall

protective barrier between a computer or network and others on the Internet that inspects data being transmitted to or from a network to prevent unsolicited data exchanges - Hardware firewalls: physical devices used on larger corporate networks that block unauthorized traffic and intruders from accessing the network - Software firewalls: "local firewalls" installed on your computer or device and block unauthorized communication to or from the network. often built into the computer's operating system

Wireless network key

series of numbers and/or letters sometimes also referred to as a network security key, to encrypt data sent between devices

Bluetooth

short-range wireless technology, often used to facilitate communication at a range of 30 ft/9 m or less

Switch

similar to a hub but used more frequently today, provides central point for cables in a network; transfers data only to the intended recipient

Network

system of 2 or more devices linked by wires, cables, + telecommunications systems; requires a combination of hardware & software system's features to operate

Internet Service Provider (ISP)

telecommunications company that sells Internet access; most offer a broadband connectivity capable of transmitting large amounts of data at high speeds

Internet Peer-to-Peer (internet P2P) network

type of P2P network where users share files with each other over the internet, with files directly transferring from one user's computer to another without first being stored on a server - illegal to share files protected by copyright

Denial of Service (DoS) attack

type of attack, normally on a server, meant to overload the server with network traffic so it cannot provide necessary services

Phishing

type of email scam that tries to trick you into revealing personal or financial info; disguise themselves as email messages from legitimate sources, but may encourage you to click a link within the email or open an attached file

DSL modem

uses existing standard copper telephone wiring to send and receive digital data

distributed denial of service (DDoS) attack

when an attacker uses multiple computers to attack a server or other network resource


Related study sets

Theft of Data & Intellectual Property 1.700

View Set

Chapter 36: Pain Management in Children

View Set

SAY BETTER WORDS: Vocabulary to know and/or use more

View Set

Cell Bio Final TopHat/Homework Questions

View Set

MEDIEVAL MIDDLE EASTERN HISTORY 100 OBJECTS

View Set

Module 4: Methods of Estate Transfer at Death Quiz 3

View Set

Chapter 3 - Building Marketing Strategy Skip to Main Content (Consumer Behavior)

View Set