communication, network, and cyber threats Flashcards

1
Q

• Modem

A

Modems modulate (convert) a computer’s digital data to analog data, transmit it, then demodulate (reconvert) it back to digital data for the receiving computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network:

A

system of interconnected computers, telephones,

and/or other communications devices that can communicate with one another and share applications and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Benefits of Networks

A
Share peripheral devices, such as printers, scanners, disk drives
• Share software
• Share data and information
• Better communications
• Accessing databases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wide area network (WAN):

A

Communications network that covers a wide
geographic area, such as a country or the world. Most long-distance and regional telephone companies are WANs. the internet is a WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Metropolitan area network (MAN):

A

Communications network covering a

city or a suburb. Many cellphone systems are MANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Local area network (LAN):

A

Connects computers and devices in a limited

geographic area, such as one office, one building, or a group of buildings close together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How Networks Are Structured

Client/Server

A

Consists of clients, which are computers that request data, and servers, which are computers that supply data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How Networks Are Structured

Peer-to-Peer (P2P)

A

All computers on the network are “equal” and communicate directly with one another, without relying on servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intranets

A

—use infrastructure and standards of the Internet and the web, but for an organization’s internal use only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Extranets

A

similar to intranets but allows use by selected outside

entities, such as suppliers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VPNs

A

use a public network (usually the Internet) plus intranets and extranets to connect an organization’s various sites) but on a private basis, via encryption and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

wired

A

twisted-pair, coaxial cable, fiber-optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

wireless

A

infrared, microwave, radio, Wi-Fi, satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hosts and Nodes

A

Client/server network has a host computer, which

controls the network; a node is any device attached to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Packets

A

fixed-length blocks of data for transmission, reassembled after transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protocols

A

set of conventions, or rules, governing the exchange of data between hardware and/or software components in the network; built into the hardware or software you are using.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Each packet, or electronic message, carries four types of information that will help it get to its destination

A
  1. the sender’s address (IP)
  2. the intended receiver’s address
  3. how many packets the complete message has been broken into
  4. the number of this particular packet. The packets carry the data in the protocols that the Internet uses—that is, TCP/IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network linking devices:

A

Switch—Device that connects computers to a network; sends only to intended recipients; operates back and forth at the same time.
• Bridge—Interface device that connects same type of networks.
• Gateway—Interface device that connects dissimilar networks.
• Router—Device that directs messages among several networks, wired or and/or wireless.
• Backbone—Main Internet highway that connects all networks in an organization; includes switches, gateways, routers, etc.
• NIC (Network interface card)—inserted in a slot on the motherboard, enables computer to operate as part of a network.
• NOS (network operating system)—the system software that manages network activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network topology: The layout (shape) of a network

A
  • Star – all nodes are connected through a central network switch
  • Ring – all nodes are connected in a continuous loop
  • Bus – all nodes are connected to a single wire or cable
  • Tree – a bus network of star networks
  • Mesh – messages sent to the destination can take any possible shortest, easiest route to reach its destination.
20
Q

Ethernet

A

Network standard for linking all devices in a local area network that describes how data can be sent between computers and other networked devices usually in close proximity.

21
Q

Communications media

A

are the means of interchanging or transmitting and receiving information.

22
Q

Twisted-Pair Wire (dial-up connections)

A

slow

23
Q

Coaxial Cable

A

Used for cable TV and cable Internet electric signals

24
Q

Fiber-optic cable

A

Dozens or hundreds of thin strands of glass or plastic that transmit pulses of light, not electricity
• Can transmit up to 2 gigabits per second (very fast)

25
Q

Bandwidth:

A

range (band) of frequencies that a transmission

medium can carry in a given period of time

26
Q

narrowband / broad band

A

narrow band doesn’t have much

broad band has a lot

27
Q

WAP (wireless application protocol):

A

Wireless handheld devices such as cellphones use the Wireless Application Protocol for connecting wireless users to the Web.

28
Q

Five Types of Wireless Communications Media

A
Infrared transmission (wireless remote)
Broadcast radio(sends data long distances, transmitter and receiver)
Cellular radio(used in cellphones and wireless modems)
Microwave radio( telephones)
Communication satellites (basis for gps)
29
Q

communication satellites can be placed at different elevations GEO,MEO, LEO,

A

GEO - highest 22000 miles
MEO - 5000 - 10000 miles
LEO - 200-1000 miles

30
Q

Long-Distance Wireless: One-Way Communication

A

One-way Pagers:

31
Q

Long-Distance Wireless: Two-Way Communication

A
1G
2G
3G
4G
LTE
32
Q

Short-Range Wireless: Two-Way Communication

A

Local Area Networks (wifi)
Personal Area Networks (bluetooth)
Home Automation networks(zigbee)

33
Q

• Denial of Service Attack

A

Consists of making repeated requests of a computer or network device, thereby overloading it and denying access to legitimate users.

34
Q

Virus

A

Deviant program that hides in a file or a program on a disk, flash memory drive, in an e-mail, or in a web link and that causes unexpected effects such as destroying or corrupting data

35
Q

Worms

A

A program that copies itself repeatedly into a computer’s memory or disk drive.

36
Q

Trojan Horses

A

Programs that pretend to be a useful program such as a free game or a screensaver but that carry viruses or malicious instructions that damage your computer or install a backdoor or spyware.

37
Q

Rootkits

A

In many computer operating systems, the “root” is an account for system administration. A “kit” is the malware secretly introduced into the computer. A rootkit gives an attacker “super powers” over computers—for example, the ability to steal sensitive personal information.

38
Q

blended threats

A

A blended threat is a more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses, and other malware into one single threat.

39
Q

Zombies & Bots

A

A botmaster uses malware to hijack hundreds to many thousands of computers and is able to remotely control them all, including the ability to update the malware and to introduce other programs such as spyware. Hijacked computers are called zombies.

•A botnet (robot network) is a network of computers in which each computer has been implanted with instructions to wait for commands from the person controlling the botnet.

40
Q

Ransomeware

A

A botnet may be used to install ransomeware, which holds the data on a computer or the use of the computer hostage until a payment is made. Ransomware encrypts the target’s files, and the attacker tells the victim to make a payment of a specified amount to a special account to receive the decryption key.

41
Q

Time, Logic, & Email Bombs:

A

A time bomb is malware programmed to “go
off” at a particular time or date.
A logic bomb is “detonated” when a specific event occurs—for example, all personnel records are erased when an electronic notation is made that a particular person was fired.
Email bombs overwhelm a person’s email account by surreptitiously subscribing it to dozens or even hundreds of mailing lists.

42
Q

Phone Malware:

A

Worms and viruses and other malware are attacking
smartphones. The most common type of cellphone infection occurs when a cellphone downloads an infected file from a PC or the Internet, but phone-to-phone viruses are also on the rise.

43
Q

Cyberthreats

• How they spread

A
  • Via e-mail attachments
  • By infected disks and flash drives
  • By clicking on infiltrated websites
  • By downloading infected files from websites
  • Through infiltrated Wi-Fi hotspots
  • From one infected PC on a LAN to another
44
Q

Encryption

A

Process of altering readable data into unreadable form to prevent unauthorized access

45
Q

Some threats to privacy:

A
  • Name migration
  • Résumé rustling & online snooping
  • Government prying & spying
46
Q

Identity (ID) theft, or theft of identity (TOI),

A
is a crime in which thieves hijack your name and identity and use your information and credit rating to get cash or buy things.
• Wallet or purse theft
• Mail theft
• Mining the trash
• Telephone solicitation
• Insider access to database
• Outsider access to database