Networks Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

COMPUTER NETWORKS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a computer network?

A

A computer network is 2 or more devices connected to communicate and share resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advantages of a computer network:

A

○Share data
○Share storage
○Share internet
○Share peripherals
○Files can be shared easily between users
○Data is easy to backup as all the data is stored on the file server
○Site (software) licenses are likely to be cheaper than buying standalone licenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disadvantages of a computer network:

A

○Hacking
○Security
○Purchasing the network cabling and file servers can be expensive
○Viruses can spread to other computers throughout a computer network
○A danger of hacking, particularly with WANS. Security procedures are needed to prevent abuse > firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WAP

A

Wireless access point, uses a radio transceiver to allow wireless connections to a network. In effect, the WAP creates its own wireless network, which devices connect to. The WAP then sends wireless traffic it receives onto the main wired network. WAPs can also be used to extend the range of a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NIC

A

Network interface card, a circuit board installed in a computer to allow it to be connected to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Router

A

One of the most commonly used connection devices. They are used to send data signals across the internet. Routers work by collecting knowledge of available routes to transmit data. They then determine the most suitable route for sending data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Switch

A

Switch connects various devices in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TYPES OF NETWORKS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a PAN?

A

Personal Area Network - covers a very small area.

Examples- Cell phones, headsets, wireless keyboards, wireless mice, printers, barcode scanners, game consoles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a LAN?

A

Local Area Network - covers a small geographical area.

Examples- Schools, offices, colleges, homes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a WAN?

A

Wide Area Network - covers a large geographical area.
Examples- Internet, organisations that have more than one office or branch, national telephone infrastructures or via wireless transmission, banks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a WLAN?

A

Wireless Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TOPOLOGIES

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Star topology:

A

All nodes indirectly connect to each other through one or more switches.
The switch acts as a central point through which all communications are passed.
Large networks using a star topology are usually controlled by one or more servers.
Peer-to-peer networks can also have a star topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advantages of a star topology:

A

○If one device fails, the rest of the network is unaffected

○There are fewer data collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Disadvantages of a star topology:

A

○The cost is expensive-have to buy specialist hardware
○You can add a certain number of devices depending on the number of possible connections on the network determined by the switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Bus topology:

A

All nodes in the network are connected directly to a central cable that runs up and down the network.
This cable is known as the backbone.
Data is sent up and down the backbone until it reaches the correct node.
It is easy to connect nodes to the network.
Less cabling is needed compared to a star topology, making it cheaper to install.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Advantages of a bus topology:

A

○If one device fails, the whole network is unaffected

○It doesn’t have a switch-cheap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Disadvantages of a bus topology:

A

○Data collisions are more frequent
○If the main cable breaks it can split the network into 2 or shut the entire network down because there will be a lot of reflected signals-reliant on the main cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TCP/IP MODEL

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Sending data:

A

Application layer > Transport layer > Internet/network layer > Link/Data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Receiving data:

A

Link/Data link layer > Internet/Network layer > Transport layer > Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Application layer:

A

○Opening web browser > software
○Where the software operates: web browsers, email services

Protocols used:
○HTTP
○HTTPS
○FTP
○IMAP
○SMTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Transport layer:

A

○Setting up the communication between 2 devices. Splitting data into packets and checking packets are correctly sent and delivered

Protocols used:
○TCP
○UDP

26
Q

Internet/Network layer:

A

○Adds IP addresses to data packets then directs them between devices using routers

Protocols used:
○IP > used by the router

27
Q

Link/Data link layer:

A

○Where the hardware and drivers operate. Passes data over the physical network, such as ethernet cable, WIFI signals, NICs

Protocols used:
○Wi-Fi
○Ethernet

28
Q

PROTOCOLS

A
29
Q

What are protocols?

A

Protocols are a set of rules for how devices communicate across a network.

30
Q

Ethernet

A

Ethernet is a protocol that describes how data is transmitted in wired networks.

31
Q

HTTP

A

Hyper Text Transfer Protocol > used by web browsers to access websites and communicate with web servers.

32
Q

HTTPS

A

HTTPS Secure > a more secure version of HTTP. Encrypts all information sent and received.

33
Q

FTP

A

File Transfer Protocol > used to access, edit, and moves files between devices on a network. eg. to access files on a server from a client computer.

34
Q

IMAP

A

Internet Message Access Protocol > used to retrieve emails from a server.

35
Q

SMTP

A

Simple Mail Transfer Protocol > used to send emails. Also used to transfer emails between servers.

36
Q

TCP

A

Transmission Control Protocol > establishes a connection between the sending and receiving devices, splits data into packets, and numbers the packets.
TCP is better when you need a reliable connection.

37
Q

UDP

A

User Datagram Protocol > breaks the data down into packets without numbering them.
UDP is suitable for applications that need fast, efficient transmission.

38
Q

MALWARE

A
39
Q

Spyware:

A
Secretly tracks user actions, such as key presses.
Software that observes activities.
Key logger-track activities.
Sensitive information
   ○personal information
   ○bank details
   ○passwords
40
Q

Worms:

A

Can spread from device to devices.
Unlike viruses, they don’t need to attach themselves to other programs.
Can copy themselves hundreds of times, so they can quickly harm devices.
Exploit weaknesses in network security.
Self-replicates (person is not needed for the worm to replicate) faster.

41
Q

Trojan (horse):

A

Pretends it will be an useful and safe program, when actually it will try to hack your device.
Disguises itself on a legitimate software.
Installed without realising.

42
Q

Virus:

A

Spreads by copying itself to normal programs.
Users spread them by copying infected files and activate them by opening infected files.
Files/Software/Computers
Person is needed for the virus to replicate.

43
Q

SECURITY THREATS

A
44
Q

Patched/Outdated Software:

A

○Can be exploited more easily by hackers, malware and viruses.
○Automatic Software Updates are used to patch (fix) any identified security holes in a piece of software.

45
Q

Misconfigured Access Rights:

A

○MAC address filtering is a way of making sure the only people on a network are trusted users.
○Checks the unique identification of each device that tries to connect to the network and only lets allowed devices join the network.
○Some people can see some things others can’t.

46
Q

Weak/Default Passwords:

A

○Can be more easily cracked.
○Hackers can use brute force attacks to get past short or simple passwords easily.
○Hackers use social engineering to figure out commonly used passwords (birthdays or addresses).

47
Q

Removable Media:

A

○Refers to storage devices that can be removed from the computer system
Examples:
○USB
○Hard drives
○DVD’s
○External hard drives
○If removable media contain malware, it will attempt to move onto a system when connected to a computer, and then onto any other connected devices.
○If a computer is connected to others on a network, this could mean that the virus reaches hundreds of machines.

48
Q

SOCIAL ENGINEERING

A
49
Q

Phishing:

A

When criminals end emails or texts to people claiming to be from a well-known business.
The link is the bait.
Gain access to personal information.

50
Q

Pharming:

A

Where an user is directed to a fake version of a website that looks like the real thing.
Often carried out using malware.

51
Q

Blagging:

A

When someone makes up a story or pretends to be someone they’re not to persuade the victim to share information.
Lying to manipulate you to give out their personal information.

52
Q

Shouldering:

A

When someone is observing and watching a person’s activity.
Examples - spying someone’s PIN number at a cash machine, or someone putting their password in a secured computer, typing in personal information.
There are camera’s at cashpoints.

53
Q

List the measures that can be used to maintain the security of a computer system.
For each measure:
○Outline what the measure is.
○Explain what types of threat to cyber security it is effective
against.

Virus checker:

A

Outline:
○Scans files to look for malicious code.
○Needs to be updates regularly with latest virus definitions.
○Can quarantine/delete malware/suspicious files.

Effective against:
○Malware

54
Q

List the measures that can be used to maintain the security of a computer system.
For each measure:
○Outline what the measure is.
○Explain what types of threat to cyber security it is effective
against.

Firewall:

A

Outline:
○Analyses/scans network traffic.
○Can block traffic from suspicious hosts/computers/addresses/ports.

Effective against:
○Hackers
○Transmission of malware

55
Q

List the measures that can be used to maintain the security of a computer system.
For each measure:
○Outline what the measure is.
○Explain what types of threat to cyber security it is effective
against.

Login system/Authentication/Password/Biometric:

A

Outline:
○User has to enter username and password.
○Can be authenticated by other methods such as biometrics.
○Login details matched to a database of users.

Effective against:
○Hackers
○Unauthorised access

56
Q

List the measures that can be used to maintain the security of a computer system.
For each measure:
○Outline what the measure is.
○Explain what types of threat to cyber security it is effective
against.

MAC address filtering:

A

Outline:
○Each hardware device has unique hardware address.
○A database of allowed hardware/MAC addresses is kept/whitelist.
○To connect to a network a device must have an address on the address on the database/whitelist.

Effective against:
○Unauthorised devices

57
Q

List the measures that can be used to maintain the security of a computer system.
For each measure:
○Outline what the measure is.
○Explain what types of threat to cyber security it is effective
against.

Encryption:

A

Outline:
○Data is stored/transmitted as ciphertext (A. in coded form).
○Only people who know the encryption method/key can decrypt/read the data.

Effective against:
○Data theft

58
Q

List the measures that can be used to maintain the security of a computer system.
For each measure:
○Outline what the measure is.
○Explain what types of threat to cyber security it is effective
against.

Prevention of use external storage devices/USB ports:

A

Outlines:
○Ports on a computer are disabled.
○Storage devices connected to them cannot be accessed//flash drives cannot be used.

Effective against:
○Putting malware onto a computer
○Theft of data

59
Q

List the measures that can be used to maintain the security of a computer system.
For each measure:
○Outline what the measure is.
○Explain what types of threat to cyber security it is effective
against.

Access rights:

A

Outline:
○Users are associated with certain privileges.
○These might control files that can be accessed/run //level of internet access//ability to create/delete files//ability to change settings.

Effective against:
○Hackers
○Theft of data
○Authorised users doing unauthorised things

60
Q

List the measures that can be used to maintain the security of a computer system.
For each measure:
○Outline what the measure is.
○Explain what types of threat to cyber security it is effective
against.

CAPTCHA:

A

Outline:
○Users have to type in some distorted text//recognise images for a set of images.
○Humans can do this but it is a difficult task for computer programs/bots.

Effective against:
○Automated hacking programs
○Bots

61
Q

List the measures that can be used to maintain the security of a computer system.
For each measure:
○Outline what the measure is.
○Explain what types of threat to cyber security it is effective
against.

Automatic software updates:

A

Outline:
○Operating system/software configurated to download updates from the internet.
○Hackers look for security vulnerabilities in software.
○Updates can patch (fix) security vulnerabilities.

Effective against:
○Hackers
○Malware