Chapter 5

Ace your homework & exams now with Quizwiz!

Local Area Network (LAN)

Data communication system consisting of multiple devices that are near each other and physically connected using cables or wireless media.

Packets

Data moves through network in structures. Pieces of a message broken down into small units by sending device and reassembled by receiving data.

Spyware

Designed to report activity on your computer to another party.

Network interface card(NIC)

Device at each nod that performs translation and transmission.

Bridge

Device that connects two LANS or segments of the same LAN

Bridge

Device used to connect two LANS or two segments

Data minimg

Discovery of new patterns or relationships between data.

Threat

A thing that can cause harm

Interoperability

Ability of each organization's information system to work with the other, sharing both data and services.

Inference engine

Accepts information about the problem being analyzed and uses the knowledge base to select the most appropriate response or follow up question.

Virtual private network(VPN)

Activity will pass through this first before entering the internet.

Network

Allows users to communicate and share information between computers and various devices.

Hacker

An individual who uses a computer and or network to commit crimes

Countermeasure

Any step you take to ward off a threat

Distributed denial of service

Attack that allows hackers to shut down or block access to the websites and other network resource by overwhelming them with requests.

Cyberterrorism

Attack that seeks large-scale chaos and damage to a countries infrastructure .

Scalability

Capacity to provide increasing amounts of computing power, storage, and/or software.

Passive DDS

Collects and displays data in a format request

Active DDS

Collects data and makes recommendations

Router

Complex device that stores the routing information for networks. Determines the best route for packets.

Information system (IS)

Complex system for acquiring,storing, organizing , using and sharing data and information

Fault-tolerant

Computers able to continue their operation even when problems are present.

Redundant

Computers have multiple hardware systems performing the same task at the same time to protect against the failure of one system

Wide Area Network (WAD)

Connection of two or more central computers or LANs, generally across a wide geographical area

Fiber-optic cable

Consist of a thin strand of glass that transmits pulsating beams of light rather than electric current.

Twisted pair cable

Consist of four pairs of wires twisted around each other. All wires are bound together in a layer of plastic that is referred to as network cable

Payload

Contains actual data being transmitted .

Header

Contains information needed by the network, such as address of the destination code.

Data warehouse

Enormous digital warehouse that contains data gathered from multiple databases.

Social engineering

Form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

Cybercrimes

From Creating viruses to disrupting computer networks.

Pretexting

Gaining someone's trust by pretending you're someone else.

Authorization

Gives individuals a certain level of access based on who they are.

Identity theft

Hackers that look for personal data that will allow them to assume the identity of another individual.

Surge protector/suppressor

Inexpensive product that guards connected equipment against large power spikes or surges

Zombies

Infected computers that are under the external control of a hacker.

Knowledge base

Information gathered by human experts is entered into a highly detailed database

Mission critical

Information systems that run without failure or with nearly instant recovery from failure.

Intranet

Internal version of the Internet. Contains only the company's private information.

Tape library

Large storage unit for magnetic tape drives, to create backup and archives of data.

Topology

Logical layout of the cables and devices that connect the nodes of a network (bus, star, ring, mesh)

Phishing

Luring individuals into entering personal information into a website controlled by the hacker.

Wireless adapter

Most desktop computers require and internal or external ______ to connect to a WAP

Wi-fi

Most powerful standard for wireless networking called 802.11 _____

Ethernet

Most widely used standard for local area networks.

Botnets

Networks of zombies used by the hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

Gateway

Node on a network that serves as an entrance to another network.

Power fluctuations

Power levels that rise and fall can produce unpredictable behavior in, or cause damage to, sensitive computer components .

Data validation

Processing of safeguarding against erroneous or duplicate data by checking what is entered and placing restrictions on how data is entered.

Trojan horse

Program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

Hub

Provides multiple ports for connecting nodes.

Authentication

Refers to the requirement that an individual confirm his or her identity.

Protocols

Rules of communication that ensure packets are sent, received, and interpreted properly, and that data integrity, or accuracy , is guaranteed.

Management information system (MIS)

Set of software tools that enables managers to gather, organize, and evaluate information.

Malware

Several types of malicious computer programs that are created to harm computer systems and their users

Switch

Similar to hub. Aware of the exact address or identity of all the nodes attached to it.

Coaxial cable

Single copper wire surrounded by insulation and a wire mesh shield, all inside a plastic sheath.

Decision support system(DDS)

Special application that collects and reports certain types of data. Help make better decisions.

Bandwidth

Speed. The amount of data that can be transmitted over a given amount of time. Measures in megabits per second (Mbps) or gigabits per second(gbps)

Redundant array of independent disks(RAID)

Storage system that links any number of disk drives so that they act as a single disk. Helps guard against data loss if a single disk breaks.

Power failure

The complete loss of power can result in the lost of unsaved work or the interruption of an important business function

Transaction processing system (TPS)

The information system that handles the processing and tracking of transactions

Attenuation

The loss of intensity and clarity of the data signal being transmitted. Affected by distance.

Node

The network uses the media to carry data from one connection point to another

A wireless access point(WAP)

To create a wireless LAN. all nodes connect to the device.

Network Media

To link parts of a computer network.

Scareware

Tricks users into following a thief's orders.

Expert system

Type of information system

Expert system

Type of information system that performs analytical tasks done by humans.

Virus

Type of malware that is attached to a host file and has the ability to replicate or copy itself

Worm

Type of malware that self replicates and spreads through computers and networks

Office automation system

Use computers and/or networks to perform various office-related operations, such as word processing, accounting , document management or communications.

Wireless networks

Use radio signals that travel through air to transmit data.

Repeater

Used to prevent attenuation when packets are traveling long distances.

Extranet

Used to share some of a company's intranet resources with people outside the organization.

Vulnerability

Weakness that has not been protected against threats.

Risk assessment

Where you identify and examine possible threat.

Uninterruptible power supply (UPS)

Which contains battery, can keep a system on in the event of a power failure.

Rogue hotspot

Wireless access point users accidentally connect to.


Related study sets

CNST Chapter 39: Pressure Injury Prevention and Care

View Set

KARCH Chapter: Chapter 50: Introduction to the Renal System Prep U

View Set

Arthritis/Autoimmune Therapy (Ch. 64)

View Set

Intermediate Financial Accounting II Exam 1

View Set

Benign Prostatic Hyperplasia HESI Case Study

View Set

Chapter 11. Building Nursing Management Skills

View Set