Intro to computing Flashcards
Computer Networking
Links computers for shared resources through the internet. Requires computers to access multiple netwroks and share their resources.
Internet Privacy
Deals with the fundamental human rights of a person’s privacy on the internet.
Importance of internet privacy
is the control of personal identity and information
Without internet privacy
interested third-party companies will collect and analyze every online activity to take advantage of these data.
Different techniques to protect internet privacy
- Securing Web Browser
- Using a virtual private network (VPN)
- Double-Checking unfamiliar links
- Limited Sharing on Social Media
- Using Multi-Factor Authentication
Securing Web Browser
Such as Google Chrome and Mozilla Firefox, although a total security is not guaranteed.
Using a Virtual Private Network (VPN)
It is the best way to have internet privacy. it does not change ethe IP Address, it also protects incoming and outgoing internet traffic with extensive encryption
Double-Checking Unfamiliar Links
Double-check the URL to see if it has the correct format.
Limited Sharing on Social Media
Platforms like Instagram, Facebook and Twitter are all publicly accessible.
Using multi-factor authentication
Multi-factor or two-authentication is an added verification step besides a conventional password. Google applies this wherein the users provide a specific code sent to their smartphones to access their accounts
Network Security
Ensures the integrity, confidentiality, and accessibility of computer networks. It is relevant when cybercriminals are becoming more dominant
Network Technologies
- Firewall
- Intrusion Detection System
- Wi-Fi protected Access 3 (WPA3)
- Virtual Private Network
- Email Security
Firewall
It was previously stated that it monitors and filters incoming and outgoing network traffic. Additionally, it serves as a wall. either hardware or software between the trusted and untrusted external internet.
Intrusion Detection System(IDS)
It is a software or a device for closely monitoring a network for any malicious activity or intrusion at the network or the host.
For a network IDS
a signature-based detection method is used wherein it seeks certain patterns of known malicious instructions sequences by targeting new malware sequences. It relies on machine learning to develop a model of trusted activity, then compares it to the current activity.
For a Host IDS
used to run on the individual hosts of a network, therefor it only monitors the inflow and outflow of traffic at the host.
Wifi-Protected Access 3 (WPA3)
The latest wireless network security certificate protocol by the Wi-Fi Alliance. It focuses its filtering at the ‘entry’ when a new device requests to connect to the network.
Also offers “forward Secrecy”
Virtual Private Network (VPN)
It connects any remote device to an enterprise wherein company data is hosted. Ensures that the online activities are publicly hidden. This feature makes it one of the most powerful network security tools.
Email Security
Emails allow scripts inside the device, it is easier for anyone to write a code in an email and send it.
Revenue Loss
One of the most impactful consequences companies face during an internet, network downtime.
Proper cable management is the best way to ensure network reliability.
Maintenance Cost
Repairing damages internet and network lines consumes both time and maintenance costs, including acquiring new cables and upgraded network devices for replacement.
Daily monitoring of the cables and network devices is encouraged
Lesser Productivity
Internet and network failure significantly affect productivity as tasks heavily rely on the internet.
It is advisable to provide a backup network and a backup internet service provider.
Personal Area Network (PAN)
The smallest type of network with a limited span interconnects compatible personal devices. Examples computer to printer.
Local Area Network (LAN)
Used to interconnect and share computer resources in an establishment such as a corporate building, house, or several buildings in a limited area.