CH 5 - Networking and security
The large volumes of data that are constantly being generated by our devices and digital transactions
- Big Data
Refers to large networks of compromised computers that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks
- Botnets
A_____ is any step you take to ward off a threat
- Countermeasure
Today, the term ____ generally refers to an individual who uses a computer and/or network to commit a variety of crimes
- Hacker
A ____ is a set of softtware tools that enables managers to gather, organize, and evaluate information
- MIS
A ____ Uniquely identifies every network connected device in the world
- Mac address
Data____ is the discovery of new patterns or relationships between data.
- Mining
Allows users to communicate and share information between computers and various devices
- Networks
Which type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system
- Trojan horse
A____ contains a rechargeable battery, allowing it to run a computer system for a given amount of time if the power fails
- UPS
A popular way for both individuals and businesses to increase the security of a network connection (via tunneling) is by using a
- VPN
Which type of malware is attached to a host file and has the ability to replicate, or copy, itself
- Virus
A ___ is the connection of two or more central computers or local area networks, generally across a wide geographical area
- WAN ( wide area network )
What type of malware consists of a fully contained program that self-replicates and spreads through computers and networks
- Worm
All nodes connect to a wireless ____ in order to communicate wirelessley
- access point
Networks use media to carry data from one ___, or connection point to another
- node
_____ Are pieces of a message broken down into small units by the sending device and reassembled by the receiving device
- packets
machines that communicate over a network must follow certain fules, or ____ to ensure that the packets are sent, recieved, and interpreted properly
- protocols
_____ is a feature that requires 2 forms of identification, such as a password and possession of your phone, to log into an account
- two-factor authentication
There are 3 general strategies used to authenticate indiviuals
- what you have - who you are - what you know
Name some specification of wi-fi technology
-802.11g -802.11n -802.11ac
A popular type of network attack, known as a ____ attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them w/ requests
- DDoS
____ Can clog cooling systems such as fans, which in turn may cause hardware to overheat
- Dust
_____ Is a standard for LANs that uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
- Ethernet
A ____ system is a type of information system that performs analytical tasks traditionally done by a human, typically by using information contained in a knowledge base
- Expert
Systems known as ____ are able to continue their operation even when problems are present
- Fault - Tolerant
Which type of cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric
- Fiber optic
Many Thieves use the temptation of free (illegal) software on services to lure individuals into downloading malware
- File sharing
involves luring individuals into entering personal information into a website controlled by the hacker.
- Phishing
The wireless access points that are used in homes contain integrated _____, as do the devices that ISPs typically provide for internet connectivity
- Routers
_____ systems can be incrementally expanded to provide increasing amounts of computing power, storage, and/ or software when the need arises
- Scalable
The scam referred to as ____ typically comes in form of an alert message that claims to be from the FBI or your security software
- Scareware
____ Is a form of hacking that focuses on deceiving individuals into giving away information that the thief needs
- Social Engineering
Which type of malware is designed to report activity on your computer to another party ?
- Spyware
What device can guard connected equipment against large power spikes or surges that may infrequently occur
- Surge Protector
Which network device provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it?
- Switch
The _____ of a network is the logical layout of the cables and devices that coonnect the nodes of the network
- Topology
Typically measured in Mbps Or Gbps, ______ is the amount of data that can be transmitted over a given amount of time.
- bandwidth