Chapter 1 Flashcards
Name the advantages and disadvantages of peer-to-peer networking.
Adv:
Easy to set up
Less complexity
Lower cost (since network devices and dedicated servers may not be required.
Can be used for simple tasks, such as transferring files and sharing printers.
DisAdv: No centralized administration Not as secure Not scalable All devices may act as both clients and servers, which can slow their performance.
Define Scalability
A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users. The figure shows how a new network can be easily added to an existing network. In addition, networks are scalable because the designers follow accepted standards and protocols. This allows software and hardware vendors to focus on improving products and services without worrying about designing a new set of rules for operating within the network.
Security
The network infrastructure, services and the data contained on network attached devices are crucial personal and business assets. There are two types of network security concerns that must be addressed. What are they?
network infrastructure security and information security
Securing a network infrastructure includes the physical securing of devices that provide network connectivity, and preventing unauthorized access to the management software that resides on them.
Information security refers to:
protecting the information contained within the packets being transmitted over the network and the information stored on network attached devices.
What are the three primary requirements needed to achieve network security?
1 - Confidentiality: data confidentiality means that only the intended and authorized recipients can access and read data.
2 - Integrity: Data integrity means having the assurance that the information has not been altered in transmission from origin to destination.
3 - Availability: data availability means having the assurance of timely and reliable access to data services for authorized users.
Name some of the most common external threats to networks. Include definitions.
1) Viruses, worms and trojan horses - malicious software and arbitrary code running on a user device.
2) Spyware and adware - software installed on a user device that secretly collects information about the user.
3) Zero-day attacks (also called zero-hour attacks) - an attack that occurs on the first day that a vulnerability becomes known.
4) Hacker attacks - an attack by a knowledgeable person to user devices or network resources.
5) Denial of service attacks - attacks designed to slow or crash applications and processes on a network device.
6. Data interception and theft - an attack to capture private information from an organization’s network.
7. Identity theft - an attack to steal the login credentials of a user in order to access private data.
There have been studies shown that the most common data breaches happen because of ____.
internal users of the network.
When developing a security policy, it is important to address both ___ and ___ security threats.
external and internal
Define what a “Host” is.
end device
What is a “server”?
Computers with software; provides information to other end devices.
Define a “client”.
Computers with software installed that enable them to request or display information obtained from the server or web browser (chrome/firefox)
Name several types of clients and several types of servers.
Clients: Web, file, email
Servers: email, web
Define “peer-to-peer”.
Computers that function as the server and client on the network.
What makes up the network infrastructure? Define what they are.
Devices and Media - the physical elements or hardware.
Services - network apps people use everyday. email hosting/web hosting.
Define “Intermediary Network Devices”.
connected end devices to the network and connect multiple individual networks to form an inter-network, provide connectivity and ensure data flows across the network.