final exam Flashcards
who owns the internet?
Individuals
Universities
Government agencies
Private companies
WAN (Wide Area Network) connection point used to obtain access to the WAN
Wired or wireless
Point of presence (POP)
Collection of large national and international networks
Internet backbone
Initially used for backbone ISP connections
T lines
Today’s most common backbone ISP connection
Optical carrier line (OC)
Once known as network access points
NAPs
Exchange data via Internet exchange points
IXPs
Types of servers
Commerce servers
Web servers
File servers
Uses cables, radio waves, or infrared signals
Links computers in a limited geographic area
LAN
Uses long-distance transmission media
Links computer systems a few miles or thousands of miles
Internet is the largest WAN
WAN
Designed for a city
Larger than a LAN, smaller than a WAN
MAN
Several LANs located in various locations on a college or business campus
Smaller than a WAN
Use devices such as switches, hubs, and routers
CAN
Network of an individual’s own personal devices
Usually within a range of 32 feet
Usually use wireless technology
PAN
Joins multiple computers together in a single network
Does not manage traffic between the connections
Hub
Filter and forward data between nodes
Are similar to routers but work within a single network
Switches
Connect two or more networks
Inspect the source and target of a data package
Determine the best route to transmit data
Routers
Rules for electronic information exchange
Computer protocols
Any computer can communicate with other computers using the same protocols
Open system protocols
Data is broken into small units (packets)
Packets are sent over various routes to their destination
Packets are reassembled by the receiving computer
Packet Switching
Prepares data for transmission
Provides error checking
Enables resending lost data
Transmission Control Protocol (TCP)
Responsible for sending data from one computer to another
Internet Protocol (IP)
Unique number that identifies each device connected to the Internet
IP address
Allows a single IP address to represent several unique addresses
classless interdomain routing (CIDR)
Names that take the place of an IP address
Sample domain name: www.mywebsite.com
domain names
Internet servers that translate domain names into IP addresses
domain name system servers
Protocol for transferring hypertext documents
Hypertext documents are linked to other documents through hyperlinks
HyperText Transfer Protocol (HTTP)
Tags that describe the formatting and layout of a Web page
HyperText Markup Language (HTML)
Browsers request that a program file executes (runs)
Common Gateway Interface (CGI)
Statements that define in a single location how to display HTML/XHTML elements
Cascading Style Sheets
Allows inexpensive or free long-distance phone calls over the Internet
Voice over Internet Protocol (VoIP)
small files written to your hard disk by websites visited; tracks browsing habits and gathers personal information without your consent; CAN be diabled
cookies
targeted display ads based on cookies
banner ads
identification number produced by software or a piece of hardware; web servers read the GUID
global unique indentifier (GUID)
interacting with multiple networked devices; current devices: hold private information that can be exploited if the device is lost or stolen (i.e. smartphones)
ubiquitous computing
transmits infared signals to create an electronic trail
active badge
uses radio waves to track a chip or tag; used for inventory control in stores; recognizes microchips in pets; may compromise anonymity and privacy if information stored on RFID tags attached to US passports
radio frequency identification (RFID)
unsolicited messages sent in bulk over electronic mailing systems; CAN-SPAM act of 20033 provided tools to combat spammers
SPAM
-use products such as Anonymous Surfing or IronKey Secure USB flash drive
-use free Web-based throwaway e-mail addresses in chat rooms and for mailinglists
-tell children not to give out personal information
-complete forms only if you see a privacy statement
-turn off cookies
How to protect privacy online
transparent graphic images placed on a website or in an e-mail used thats used to monitor web or email behavior
web beacons
-create logins and passwords for each person using the computer
-do not save account numbers or passwords
-close a secure account site when not using a computer
-use strong passwords
how to protect privacy at home
-do use: difficult to guess passwords; at least 14 characters or mroe long; uppercase letters; lowercase letters, numbers, and special characters
-DONT use: a recognizable word or phrase; name of anything or anyone close to you, including names of family members or pets; recognizable strings of numbers, such as a social security number or birthdates
strong passwords
refrain from making personal calls on a work phone
-avoid using company e-mail for personal purposes
-assume you are monitored
-be aware of shoulder surfing
-do not allow others to tailgate
protecting privacy at work
computer-based activities that violate the law
computer crimes
-crimes perpetuated through the internet
-many websites educate users about cybercrime and cybercriminals
cybercrimes
area of law dedicated to computer crime
cyberlaw
criminal access to personal information in order to impersonate someone
identity theft
disgruntled employees or theives go thru a company’s trash to find information that they can steal
dumpster diving
(similar to phishing) uses targeted fake emails and social engineering to trick recipients into providing personal information to enable identity theft
spear phising
programs that intentionally harm a computer system or allow individuals to gain access without permission
malware
software that gathers private information and tracks web use
spyware