Networking Flashcards
What are some Authentication Methods?
Username and Passwords
Biometrics
Swipe Cards/Keys
Personal Details
Two factor Authentication
What does the Health Records Act 2001cover?
Is it a state or federal law?
-Victorian Law
-Contains condition and laws to how and when an individual’s personal health data and info can be collected by Vic gov and private organisations that either offer health services or handle health records
Chapter 7: What are the two types of IDS’?
A Host Intrusion detection system (HIDS) and A Network Intrusion detection system (NIDS)
What is Multi-factor authentication?
requires the user to provide two or more pieces of evidence to verify their identity to be able to complete a transaction online.
Define and describe an IPS
Intrusion Prevention Systems - contains the functionality of an IDS, but also attempts to stop and block threats without the need for human intervention.
What are security threats?
Anything that would cause potential harm to data or information.
Loss, Theft, Damage and Malicious software
What does WAN stand for?
Wide Area Network
What is multi-factor authentication?
Multi-Factor Authentication is a process that requires a user to provide two or more pieces of evidence of identity.
Chapter 7: What should a password include?
At least 8 characters
One UPPER case
One lower case
One symbol
No spaces
NOT be password
Same as username
Regularly be changed
What is packet switching?
When data is sent over the internet, TCP breaks it down into small packets, each packet is then sent over the internet. packets may take different routes to the same destination. IP identifies the most efficient route for each packet.
Chapter 7: What is an Intrusion Detection System? (IDS)
Monitors network traffic and aims to detect intrusions
Can be hardware or software based
Chapter 7: What is a Stand Alone Device?
A self contained device or system that can perform its function without the need of another device computer or connection it does not communicate with any other device.
What is a Blockchain?
The Blockchain is a collection of data records that is stored on multiple devices.
What is Psuedo Code ?
Represents steps of processing that will occur when the solution is implemented in plain english
Chapter 7: What are some benefits of a network ?
Sharing Hardware
Sharing Data and Information
Sharing Software
Transferring funds
What is the Privacy Act 1988?
Is it a state or Federal law?
-Federal Law
-Related to how personal data and info can be collected by Australian government and private organisations
State and explain a function of a Network operating system.
Administration - adding, deleting and organizing users and performing maintenance tasks such as backups
File management - locating and transferring files
Device management - co-ordinating printing, record use, etc
Security - monitoring and when necessary restricting access
What is Pseudo Code?
Logic processes written in plain English
What is a microcontroller?
an integrated circuit that incorporates a processor, memory and input/output (I/O) controllers within one chip.
Chapter 7: What are some examples of authentication methods.
Username and Passwords
Biometrics
Swipe Cards/Keys
Personal Details – DOB, Drivers Licenses, Medicare card, address or a combo
Two factor Authentication
Describe a Personal Area Network
a network in which a a users individual devices are connected to each other
List the 10 Privacy Principles
Collection, Use and Disclosure, Data quality, Data Security, Openness,
Access and corrections, Unique Identifiers, Anonymity, Transborder data flows, Sensitive information.
List 3 types of Network Architecture
Peer to Peer
Client Server
Personal Area
Describe a peer to peer network
each device shares information and data with other devices
Explain how a router differs from a switch ?
Routers connect local devices to each other and the internet, while switches only connect devices locally.
Explain credential management?
involves checking user credentials to determine whether they are who they claim to be ?
Chapter 7: What is an Intrusion Prevention System (IPS)?
Is an extension of an IDS
IDS identifies issue and alerts people
IPS blocks the threat without the need for human intervention
May delete suspicious packets, reset network connections, block packets from particular locations.
Can be configured to follow a set of rules.
What is a digital system?
Can consist of a single device, a collection of devices or a network.
Consists of Both Hardware and Software
What does the HIDS and the NIDS do?
HIDS: Monitors data packets and sends an alert is it detects suspicious activity
NIDS: Monitors passing traffic and checks it against a library of known attacks
List 3 key pieces of legislation that you should be aware of when working with user data?
Privacy Act 1988
Privacy and Data Protection Act 2014
Health Records Act 2001
Copyright Act 1968
Ethics are?
beliefs, principles or standards that individuals, organisations or society have regarding acceptable behaviour
Define and describe an IDS
Intrusion Detection System - is used to monitor network traffic in an attempt to detect intrusions
Types of constraints that affect a digital solution:
Economic, Technical, Legal, Usability
Chapter 7: What are the two types of Networks?
Local Area Network (LAN)
Wide Area Network (WAN)
Define and explain the acronym TCP/IP
Transmission Control Protocol/Internet Protocol - is a set of rules that allow communication between two networked devices,
What is a digital system used for?
Used to transform data into information, providing output to meet the user’s needs
What is the Privacy and Data Protection Act 2014
Is it a State or Federal Act ?
-Victorian State Law
-Relates to how and when personal data and info can be collected by Vic Gov agencies, local councils…
What does the Copyright Act 1968 cover?
Is it a state of federal law?
-Federal Law
-Contains conditions and rules related to copyright
Define and explain the acronym IP
Internet Protocol - is a set of rules that are followed to allow devices to communicate over the internet
Describe a client-server network
contains a server that provides data and services to client devices
What are Access Rights?
Defines what areas or information a user has access to in a network.