90 DECK 1 - NINJA NOTES Flashcards
Advantage of SaaS
Users do not have to worry about the underlying infrastructure or the software itself because all maintenance is taken care of by the service
Advantages of a Network Firewall
-easy to set up and configure
-inexpensive
Advantages of Application Firewall
-provide more granular control of traffic; used to protect individual programs and data
-able to inspect contents of network traffic which allows them to detect and block attacks that network firewalls cannot
-provides additional user authentication procedures to protect the program and data making access more difficult for unauthorized users
-can be used to detect and block traffic that originates from within the network (helps to prevent insider threats)
An URL includes several parts. What are they?
protocol: HTTP or HTTPS
domain: www.ninjacpareview.com
path to the resource: /about or /image.jpg
Example: https://www.ninjacpareview.com/image
antivirus software
designed to prevent, detect, and remove malware from a computer or mobile device.
-scans files and software on the device for known patterns of malware
-can monitor network traffic for suspicious activity
-software typically updates its malware definitions regulary in order to protect against new and emerging threats
-may have additional features such as firewall and antiphishing protection
-keep up to date and run regular scans
Application Firewall
implements at the application level
-controls traffic that flows in and out of programs and applications
-provides additional layer of security
-allows for additional user authentication procedures to protect program and data
-makes it more difficult
-can block unauthorized traffic
Application Software
Performs special tasks such as word processing, spreadsheets, photos; productivity; graphics; multimedia; communication; games; heuristic.
bridge
a networking device that connects two separate LANs together, allowing them to communicate with each other as if they were a single network
Bus topology
all devices are connected to a central cable called a bus.
-inefficient
-prone to failure if central cable is damaged
advantage: simple and easy to set up.
client
clients are individual computers or workstations that are used by users to access the resources provided by the server
Client-server architecture
one server is responsible for providing specific service to other devices (the clients).
Commonly used for email, file sharing and web services.
It can be implemented on a LAN or over the internet.
Community Cloud
shared by a specific group of organizations managed by one or more of the organizations in the group or by a third-party.
-economies of scale
healthcare, financial services
Compilation
the process of converting the source code into machine code.
Compiler
a type of software that converts source code written in a programming language into machine code that can be executed by a computer.
CPU
Fetches instructions from memory and decodes them. It retrieves instructions and sends them to the arithmetic logic unit (ALU) for execution.
Customer Support and Service
Cloud service providers provide support and assistance: tech support, documentation, training, consulting services.
Disadvantages of an Application Firewall
-expensive
-difficult to set up
-hard to configure
-need more maintenance
-need to be updated to support new apps and protocols
-may require additional hardware resources to run which increase cost of ownership
-may create a bottleneck in the network slowing down performance
Disadvantages of Network Firewall
-do not provide protection against all types of attacks such as malware or phishing attacks
-does not protect against malicious traffic from within the network
-cannot inspect contents of encrypted traffic
-less sophisticated than application firewalls
- don’t provide the same level of protection against app-level threats
EDI, which stands for Electronic Data Interchange
a technology that allows the exchange of business documents and information in a standardized electronic format between organizations. It’s a key component in automated business processes, enabling faster, more efficient, and error-free transactions compared to traditional paper-based methods.
Examples of PaaS
Heroku, Salesforce App Cloud, Google App Engine, AWS Elastic Beanstalk, Azure App Service
Examples of SaaS
Examples: Office 365, Salesforce, Zoom, G-Suite, Adobe Creative Cloud, Slack
Extranet
private network that shares part of an organization’s information or operations with suppliers, vendors, partners, customers, etc.
- used for supply chain management, customer service, online collaboration
-protected by firewalls, virtual private networks (VPNs)
Firewall
a security system used to control incoming and outgoing network traffic by analyzing data packets and determining whether they should be allowed through or not.
-acts as a barrier between a private internal network and the public internet
-protects computer and information from insiders
gateway
a networking device that connects two different networks together allowing them to communicate with each other.
Hoax Virus
a message that is circulated through email or social media warning users of a virus that does not actually exist.
-scares users into taking action such as forwarding or deleting files
-causes unnecessary panic
How do VPNs work?
-creates a secure, encrypted tunnel between the user’s device and VPN seriver
-all data is encrypted and then the VPN server acts as a gateway to the internet routing the user’s internet traffic through the encrypted tunnel
-allows user to access the internet and internal network resources as if they were on the same physical network
HTML
Hypertext Markup Language
Hyper-Text Transfer Protocol (HTTP)
a protocol for transferring data over the internet.
-the foundation for the World Wide Web
-used to transmit data between a server and a client
Hypertext Markup Language (HTML)
a markup language used to create the structure and layout of a webpage
-consists of series of elements each represented by a tag which describes the content and structure of the page
-it is the standard markup language for creating web pages that can be displayed in a web browser.
Infrastructure as a Service (IaaS)
virtualized computing services such as servers, storage and networking over the internet.
- users can provision and manage resources on demand and only pay for what they use
Scaling up or down for IT resources as needed
Examples are Amazon Web Services and Google Cloud Platform
Infrastructure management
cloud service providers are responsible for setting up, maintaining, and managing the physical infrastructure required to deliver cloud services
-data centers, servers, storage devices, networking equipment
Innovation and Scalability
cloud service providers must continuously innovate and improve their services to stay competitive
internet
a network that connects millions of devices
Internet Service Provider (ISP)
a company that provides customers with access to the internet
-dial-up
-DSL (over phone lines with DSL technology)
-Cable
-Fiber
Intranet
a private network used by an organization to share information and resources among its employees, members or departments
IP
responsible for routing data packets to their destination
ISP
Internet Service Provider
Key features of EDI transactions include:
Standardization: EDI documents adhere to strict formats, ensuring compatibility and understandability across different systems and organizations. Common standards include ANSI X12 (widely used in North America) and EDIFACT (predominant in international trade).
Types of Documents: EDI can handle a variety of documents such as purchase orders, invoices, shipping notices, and payment documents.
Automation: EDI facilitates automated processing of business transactions, reducing the need for manual data entry and minimizing errors.
Efficiency and Speed: Transactions can be completed in minutes or seconds, rather than days, improving the speed of business cycles.
Security: EDI transmissions are often encrypted and follow security protocols, ensuring data integrity and confidentiality.
Integration: EDI systems are often integrated with internal enterprise resource planning (ERP) systems, streamlining internal and external business processes.
EDI is widely used in various industries such as retail, manufacturing, healthcare, and logistics, helping these sectors to improve the speed, accuracy, and efficiency of their business communications.
Killer Application (killer app)
a software program that is so useful and in-demand that it drives the sales of a particular hardware platform or operating system.
-software app is so compelling people buy new hardware or software just to use it
LAN
Local Area Network: connects devices in a limited geographic area such as a home or school or office. LANS are used to share printers and servers.
Billing and Cost Management
cloud service providers offer flexible, pay as you go pricing models which requires them to track and monitor cutomer’s resource usage correctly
-transparent billing
-detailed usage reports
-cost management tools
Machine Language is also known as
machine code or assembly language
Mesh topology
each device is connected to every other device on the network
adv: it provides redundant connections so network is highly resilient.
adv: If one connection fails there are alternative paths for data to be transmitted.
disadv: It can be complex and costly because it requires a large number of connections.
Network
allows devices to connect and communicate with each other enabling the exchange of data and information.
Network Firewall
implemented at the network level so it controls all traffic that flows in and out of the network
-uses security algorithms and router communications protocols to prevent outsiders from accessing the corporate database and email systems.
-blocks unauthorized traffic such as incoming traffic from known malicious IP addresses