Chapter 12 - Business Networking and Security Flashcards
Access card reader
A device that reads information from a magnetic strip on the back of a credit card-like access card
Access method
A method to control which computer is allowed to use transmission media at a certain time
Active topology
In a network, a type of topology where the nodes participate in moving data through the network
Application server
A server that acts as a repository for application software
Authentication
The process of identifying a computer user, based on a login or username and password. The computer system determines whether the computer user is authorized and what level of access is to be granted on the network
Authentication server
A server that keeps track of who is logging on to the network and which services on the network are available to each user
Bastion host
A heavily secured server located on a special perimeter network between the company’s secure internal network and its firewall
Biometric authentication device
A device that uses some unique characteristic of human biology to identify authorized users
Bridge
A device that is used to send data between different collision domains in a network, depending on where the recipient device is located
Brute force attack
An attempt to access an account by repeatedly trying different passwords
Bus topology
A system of networking connections in which all devices are connected in sequence on a single cable
Centralized
A characteristic of client/server networks where the server, not the individual user, coordinates data security
Client/server network
A type of network that uses servers to deliver services to computers that are requesting them (clients)
Cloud server
A server that is maintained by a hosting company and that is connected to networks via the Internet
Coaxial cable
A single copper wire surrounded by layers of plastic insulation, metal sheathing, and a plastic jacket, used mainly in cable television and cable Internet service
Communications server
A server that handles all communications between the network and other networks, including managing Internet connectivity
CSMA/CD
The method used on Ethernet networks to avoid data collisions, short for carrier sense multiple access with collision detection
- node connected to the network uses carrier sense to verify that no other nodes are currently transmitting data signals
Data collision
When two computers send data at the same time and the sets of data collide somewhere in the connection media
Database server
A server that provides client computers with access to information stored in databases
Decentralized
A characteristic of peer-to-peer networks where the individual user coordinates data security
Dedicated server
A server used to fulfill one specific function, such as handling email
Device driver
Software that facilitates the communication between a device and its operating system or between a network adapter and a server’s operating system and the operating system of the computer in which the adapter is installed
Electronic data interchange (EDI)
The exchange of large amounts of data in a standardized electronic format
E-mail server
A server whose sole function is to process and deliver incoming and outgoing email
Extranet
An area of an intranet that only certain corporations or individuals can access; the owner of the extranet decides who will be permitted to access it
Fibre-Optic cable
A cable that transmits data at close to the speed of light along glass or plastic fibres
File server
A server that stores and manages files for network users or that acts as a storehouse for files that users can download
Frame
Groups of data packets that are sent together in a package
Honey pot
A computer system that is set up to attract unauthorized users by appearing to be a key part of a network or system that contains something of great value
Hybrid topology
Combining multiple topologies into one network
Information assurance
Ensuring that information systems contain accurate information and are adequately secured against tampering
Intranet
A private network set up by a business or an organization that is used exclusively by a select group of employees, customers, suppliers, volunteers or supporters
Jam signal
A special signal sent to network nodes alerting them that a data collision has occurred
Local area network (LAN)
A network in which the nodes are located within a small geographic area
Media access control (MAC) address
The physical address, similar to a serial number, of each network adapter
Network adapter
A device that enables the computer to communicate with the network using a common data communication language or protocol
Network administrator
Person who maintains networks for businesses
Network operating system
Software that handles requests for information, Internet access and the use of peripherals for the rest of the network node, providing the services necessary for the computers on the network to communicate
Network topology
The physical or logical arrangement of computers, transmission media, and other network components
Open Systems Interconnection (OSI)
A networking protocol established by the Institute of Electrical and Electronics Engineers (IEEE) that provides guidelines for modern networks
Packet screening
Having an external screening router examine incoming data packets to ensure they originated from or are authorized by valid users on the internal network
Passive topology
In a network, a type of topology where the nodes do nothing to move data along the network
Possessed object
Any object that users carry to identify themselves and that grants them access to a computer system or facility
Print queue
A software holding area for print jobs (aka print spooler)
Print server
A server that manages all client-requested printing jobs for all printers on a network
Protocol
A set of rules for exchanging communications
Proxy server
A server that acts as a go-between, connecting computers on the internal network with those on the external network
Ring topology
A type of network topology where computers and peripherals are laid out in a configuration resembling a circle
Router
A device that routes packets of data between two or more networks
Scalability
A characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes
Shielded twisted-pair cable
Twisted-pair cable that contains a layer of foil shielded to reduced interference
Star topology
The most widely deployed client/server network topology where the nodes connect to a central communications device called a switch in a pattern resembling a star
Switch
A device for transmitting data on a network
- makes decisions, based on the MAC address of the data, as to where data is to be sent
Terminator
A device that absorbs a signal so that it is not reflected back onto parts of the network that have already received it
Token
A special data packet used to pass data in a ring topology network
Token method
The access method used by ring networks to avoid data collisions
Transmission media
The radio waves or the physical system that transports data on a network
Tunneling
The main technology for achieving a virtual private network
- placement of data packets inside other data packets
Twisted-pair cable
Cables made of copper wires that are twisted around each other and are surrounded by a plastic jack
- such as traditional home phone wire
Virtual private network (VPN)
A network that uses the public Internet communications infrastructure to build a secure, private network among various locations
Virtualization
Using specialized software to make individual physical servers behave as though they are more than one physical device
Web server
A computer running a specialized operating system that enables it to host web pages and to provide requested web pages to clients
Wide area network (WAN)
A network made up of local area networks connected over long distances
Wireless access point (WAP)
Gives wireless devices a sending and receiving connection point to the network
Wireless network interface card (NIC)
A special network adapter card that allows a computing device to connect to a network using wireless access