1.3.3 network Flashcards

missing network hardware

1
Q

standalone machine

A

computer that is not connected to anything

stopping the spread of a virus on hardwares(unknown memory sticks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

network

A

a group of devices connected to each other and can communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

internet

A

inter connected networks- global network of computers connected together (network of networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

www

A

collection of webpages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

protocol

A

RULES that govern how devices COMMUNICATION with each other(standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

use of protocol layering

A

DECOMPOSITION-Reducing a complex problem into smaller sub-problems.

ABSTRACTION FOR SPECIFIC FUNCTION-Devices can be manufactured to operate at a particular layer.

COMPATABILITY-Products from different vendors will work together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP/IP Stack

A

used in the routing of packets through networks

how it works:
Data is split into chunks called packets
(1 – AO1.1) which have labels (1 –
AO1.1) including address being sent to
(1 – AO1.1) and order (1 – AO1.1).
Each packet is sent on the most
convenient / avoidable route (1 –
AO1.2) meaning they may arrive in a
different order to which they were sent
(1 – AO1.2). Once packets arrive at
receiver they are reordered (1 –
AO1.2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP

A

Transmission Control Protocol – used with IP to ensure ERROR FREE transmission and package switching

establish an end-to-end connection between the source and recipient computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IP

A

Internet Protocol – used to transfer all packets across the internet between routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DNS

A

use of system: name and organise internet resources

DNS server: that stores a list of domain names and translate them into associated IP addresses (ISP)

TLD: org/uk/com
SLD: google/edgbarrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LAN

A

size of area: small, one site

ownership of hardware: by the organisation using it

link: UTP cable, fiber optic , wifi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WAN

A

size of area: larger geographical area (>1 sq mile)

ownership of hardware: connect to LANs, telecommunication companies who own and manage it.

link: telephone lines, fiber optics cables, satellite links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

UTP

A

link layer- one less layer of shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

STP

A

link layer- one more layer of shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

packet switching

A

Splitting data into packets that can be sends individually across different routes across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

circuit switching

A

Reserving a particular network route to transfer data between two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SMTP

A

outbound:
simple mail transfer protocol-
FORWARD the mail to the appropriate mail server

(the SMTP server has the database of email address)for the recipient’s email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IMAP

A

inbound:
internet message access protocol - keep emails on mail server

(allow flagging and searching, can sync devices, less privacy )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

POP

A

inbound:
post office protocol- deletes email from mail server once it is downloaded

(removes the mail from other devices, cannot do complex searches and flagging mail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

switch

A

Network device that connects multiple devices together, sending the data that it receives to the intended recipient device only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

hub

A

Network device that connects multiple devices together, sending the data that it receives to all connected devices

22
Q

router

A

Network device that directs data from one network to another

23
Q

MAC vs IP

A

MAC: individual device
IP: the location/general area for destination

24
Q

TLD

A

top level domain - e.g. .org, .uk, .com, .edu, .gov

25
SLD
second level domain - e.g. google
26
FTP
file transmission protocol- handles file uploads and downloads (works at the back end), normally on WAN
27
HTTP, HTTPS
for client and server to send and receive requests and deliver HTML web pages (s): secure - encryption and authentication
28
UDP
user datagram protocol- simple connectionless transmission model
29
protocol layering
application transport network link
30
the area/purposes of protocol
email(SMTP,IMAP,POP) webpage request(HTTP,HTTPS) file transfer (FTP) LAN/WAN (TCP/IP, UDP)
31
client to server model
one device (the client) requests services from another device (the server).
32
peer to peer model
all terminals have equal status and there is no powerful central server, each computer acts as both a client and a server.
33
switch(vs hub) vs router
a switch connects multiple devices to create a network, a router connects multiple switches, and their respective networks, to form an even larger network
34
(links) Fibre Optic Cables
newer, faster and high-capacity
35
firewall
Security measure that controls incoming and outgoing network traffic using a set of rules (ports) act as filter mechanism of firewall: -proxy -inspection and packet filtering
36
proxies
A proxy ensures there is no direct physical connection between a single user and a remote source.
37
encryption
A method of transforming data into an unintelligible way so that it cannot be read by unauthorised individuals.
38
malware
malicious software - software that annoys users or damages their data. For example, Worms, Viruses, Trojans and Spyware.
39
worm
standalone copies itself
40
virus
copies itself by attaching itself to another program
41
trojan
looks innocent but has ill intent open up back doors
42
social engineering
involves with “social” and human interaction -smishing : fake text messages -vishing: fake voice call -pharming : fake websites
43
phishing
use of email to take the user to a fake website to take their personal information
44
SQL injections
code enter to input text boxes prevention: sanitisation and by blocking certain characters
45
ransomeware
blackmail(scare users) into making a payment
46
most vulnerable with social engineering
the elderly the youngs people not familiar with technology
47
spyware
designed to collect information about what you are doing on the computer e.g. keylogger there are also hackers that hack cameras and mics
48
anti-malware vs anti-virus
COVERAGE anti-malware: designed to log keys(keylogger) and target adverts(adware) + virus anti-virus: ‘quarantine’ the file so it cannot be used to spread the virus; does not cover malware
49
hackers
black hat grey hat white hat
50
DOS and DDOS
sending requests after requests to affect server performance denial of service- one attacker using one/ more devices distributed denial of service- uses botnet
51
network security methods
-username and password -acceptance usage policy -penetration testing -physical security -user access levels cards included: -firewalls -encryption