Networks and security Flashcards
What is a computer network?
Two or more devices connected for communication or file sharing
What is a LAN? What area does it cover?
Local area network. It covers a small geographical area
What is a WAN? What area does it cover?
Wide area network. Covers a large geographical area
What is a PAN? What area does it cover?
Personal area network. Covers connected devices around 1 person.
Describe the layout of a star topology.
Server in the middle. Devices arranged around the server shaped as a star.
Describe the layout of a bus topology.
Computers connected outwards from a straight line. Terminators at each end of the line.
Give 2 advantages of the star topology.
High performing as no data collisions can occur
Very reliable, if one cable fails it will still run.
Give 2 disadvantages of the star topology.
Expensive to install as it uses lots of cable
Extra hardware is required
Give 2 advantages of the bus topology.
Easy to install
Cheap to install
Give 2 disadvantages of the bus topology.
If main cable fails the network fails.
It will be more slow as more devices connect.
List the TCP/IP model in order
- Application layer.
- Transport layer.
- Network/internet layer.
- Network interface layer.
What are 3 advantages of sharing a network
File sharing, hardware sharing, communication.
What are 3 disadvantages of sharing a network
Cost, management, spread of malware.
List all the different protocols
TCP/IP UDP WIFI HTTP HTTPS FTP SMTP POP IMAP
What is adware?
Type of software that either causes pop ups of windows that can’t close.
What is ransomware?
This hijacks computer data and demands money for it to be decrypted.
What is spyware?
Type of malware that collects data and sends to an anonymous person without the user being aware.
What are worms?
Self replicates and spreads itself very quickly.
What is a trojan?
Appears as harmless software but contains hidden malicious code.
What are viruses?
A piece of malware that infects a computer and replicates to be passed onto another.
What is phishing?
Someone will email you pretending to be an official company to get your personal details.
What is pharming?
A cyberattack which redirects a user from 1 website to another which looks genuine but it is fake.
What is blagging?
When someone lies to you encouraging you to send money or personal details
What is shouldering?
This includes looking at someone’s details over their shoulder
List 3 different security measures.
Long complicated passwords, CAPTCHA, misconfigured rights
List 4 different security threats.
No antivirus software, patched/outdated software, weak passwords.