Cyber Security Final

Ace your homework & exams now with Quizwiz!

What is a LAN network?

A local area network - collection of devices connected together in one physical location

What is the purpose of a router?

A router receives and sends data in computer networks

What is a server?

A server is a computer that provides data to other computers. It may serve data to systems on local area network (LAN) or a wide area network (WAN) over the internet.

Who does cyber security affect?

Anyone that accesses the internet.

What is the CIA triad?

Confidentiality, Integrity, Availability

Port 21

FTP

Pet 80

HTTP

Port 443

HTTPS

What are main components of a network?

Hardware: server, client, peer, transmission medium, and connecting devices Software: operating system and protocols

How do you keep your computer safe from malicious content, such as unsafe files and harmful processes?

If someone sends you an email you do not know with a file attachment, delete the email. Verify the email is from the correct sender before putting in personal information.

What is social engineering? It's purpose?

Instead, social engineering is all about the psychology of persuasion: it targets the mind like your old school grifter or con man. The aim is to gain the trust of targets, so they lower their guard, and then encourage them into taking unsafe actions such as giving up personal information or clicking on malicious web links or attachments.

Purpose of a fire wall?

It's a security network device that monitors incoming and outgoing network traffic and decides wether to allow or block specific traffic based on a defined set of security rules.

How can you insure your browsing experience is secure?

Make sure your connection is safe websites using https, search on google before blindly typing in a url

What is malware?

Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contradiction for "malicious software". Examples of common malware systems include viruses, worms, Trojan viruses, spyware, adware, and ransoms are.

What are some careers that relate to cyber security?

Network engineer, network admin, and cyber security consultant

How does passive differ from active analysis?

Passive pulls real user data from specific points in the network (like putting an alarm in your house). Active looks at when, where, and how a burglar is likely to strike.

What is phishing?

Phishing attacks are the practice of sending fraudulent communications that appear to come firm a reputable source. It is usually performed through email.

Port 25

SMTP

What is a spam email?

Spam email is unsolicited and unwanted junk email sent out in bulk to an indiscriminate recipient list. Typically, spam is sent for commercial purposes.

What is the purpose of a network switch?

Switches facilitate the sharing of resources by connecting together all the devices, including computers, printers, and servers, in a small business network.

What is cyber security? Why do we need it?

The practice of protecting systems, networks, and programs from digital attacks.

What is the difference between authorized and unauthorized hacking?

Unauthorized is gaining access into computers, phones, tablets, loT devices, networks or entire computer systems Authorized involves the legal use of hacking


Related study sets

Psychology A Unit 3: Lifespan Development

View Set

Marketing 350 exam 3 review questions

View Set

Surgical Management of Peritonitis

View Set

Week 1 - Postpartum assessment & Newborn assessment and care

View Set

Patho Pharm II Practice Questions Exam 3

View Set