paper 1 - section 2 Flashcards
what is a LAN?
A LAN (Local Area Network) is a network that covers a small geographical area, often located on a single sight.
who owns the hardware for a LAN?
the organization using it
Why use a LAN? (what are the positives?)
- sharing files is easier - network users can access the same files, work collaboratively on them and copy files between machines
- you can share the same hardware (like printers)
- the internet connection can be shared between every device connected to the LAN
- you can install and update software on all computers at once, rather than one-by-one
- you can communicate with all LAN users cheaply and easily, e.g. with instant messaging
- user accounts can be stored centrally, so users can log in from any device on the network
What is a WAN?
A WAN (Wide Area Network) is a network that connects LANs that are in different geographical locations. for example, a business with offices in three different countries would need a WAN for all their devices to connect together
Who owns the hardware for a WAN?
organisations hire infrastructure (e.g. communication lines) from telecommunications companies who own and manage the WAN. this is because a WAN is much more expensive to set up than a LAN.
Is the Internet a LAN or a WAN?
A WAN
Do most people have LANs or WANs in their homes?
Most people have LANs in their homes.
name 4 factors that can affect the performance of networks.
1 - Bandwidth (the amount of data that can be transferred in a given time)
2 - the amount of users (available bandwidth is shared between users of a network - too many users or heavy use may cause congestion and slow the network )
3 - mode of connection (wired connections are generally faster and more reliable than wireless)
4 - choice of hardware and network topology
What is a network interface controller (NIC)?
an internal piece of hardware that allows a device to connect to a network. they used to be on separate cards, but nowadays they’re built into the motherboard.
Do switches connect devices on a LAN or a WAN?
A LAN
Do switches transmit data in frames or packets?
frames
What address do switches use to transmit data?
a MAC address
Do routers transmit data within networks or between networks?
Between networks
Do routers direct data in frames or packets?
packets
Why are routers used in homes and offices?
to connect the LAN to the Internet
What are ethernet cables used for?
They are used to connect devices in a LAN
What are ‘twisted pair cables’?
pairs of wires that are twisted together to reduce interference.
Are ethernet cables twisted pair?
Yes
Are coaxial cables twisted pair?
No
Describe the structure of coaxial cables.
A single copper wire surrounded by a plastic layer for insulation and a metallic mesh which provides shielding from outside interference.
How do fibre optic cables transmit data?
as light
list three advantages and one disadvantage of fibre optic cables.
Advantages:
They are high performance
They don’t suffer interference
They can transmit over very large distances without loss of signal quality
Disadvantage:
They very expensive
What does a wireless connection use to transmit data?
Radio Waves
What is a WAP?
A Wireless Access Point - you need one to connect to a wireless network, and it is basically a switch that allows devices to connect wirelessly.
Advantages of a Client-server network:
- easier to keep track of files as they are stored centrally
- easier to perform back-ups
- easier to install and update software
- easier to manage network security (e.g. anti-malware software and user access levels)
- servers are very reliable and are always on
Disadvantages of a client-server network:
- expensive to set up and needs IT specialists to maintain the network and server
- server dependence - if the server goes down all clients lose access to their work
- the server may become overloaded if too many clients are accessing it all at once
Advantages of a peer-to-peer network:
- easy to maintain - you don’t need any expertise or expensive hardware
- no dependence on server - if one device fails the whole network isn’t lost
disadvantages of peer-to-peer networks:
- no centralized management - devices need their updates and security installed individually. Backups are also more complicated
- copying files between devices creates duplicate files, so it’s easy to lose track of what’s stored where and which files are up-to-date
- peer machines are less reliable and data may be lost if one fails
- machines are prone to slow down when other devices access them
describe a star network topology
all the devices are connected to a central switch or server that controls the network.
Pros of star topology:
- if a device fails or a cable is disconnected, the rest of the network is unaffected.
- it’s simple to add more devices to the network
- better performance than other setups - data goes straight to the central service so all devices can transmit data at once and there a few data collisions
Cons of star topology:
- in wired networks, every device needs a cable to connect to the central switch or server. This can be expensive, e.g. for an office building with 50 terminals
- if there is a problem with the switch/server, the whole network is affected
Is a mesh network centralised or decentralised?
decentralised
describe a mesh network.
all networking devices are either directly or indirectly connected to each other without the need for one central switch or server. Mesh networks work by sending data along the fastest route from one device to another.
What is the main advantage of a mesh network?
there is no single point where the network can fail - if one device fails then the data is sent along a different route to get to its target
what is the traditional disadvantage of mesh networks, and why is it becoming less of a problem?
they can be very expensive - you need a lot of wires to connect so many devices together. However, now that more people are using wireless technology, mesh networks are a more practical option.
what is the difference between a full mesh topology and a partial mesh topology?
in a full mesh topology, every device is connected to every other device, whereas in a partial mesh topology, not all devices are directly connected.
what address does communication on the same network use?
a MAC address
why do we have MAC addresses?
every device needs a unique identifier so it can be found on a network
How are MAC addresses assigned to a device?
MAC addresses are assigned to all network enabled devices by the manufacturer. They are unique to the device
can MAC addresses by changed?
no
how many bits do MAC addresses have? (how long is their binary number)
MAC addresses are 48 or 64 bit binary numbers (i.e. a long string of 48 or 64 0s and 1s)
what decimal system are MAC addresses converted into to make them easier to use?
hexidecimal
what are MAC addresses mainly used by?
the Ethernet protocol on LANs. LAN switches read the MAC addresses and use them to direct data to the right device
what address is used for communication between different networks?
IP address
when are IP addresses used?
when sending data between TCP/IP networks e.g. over the internet
are IP addresses linked to hardware?
no
are MAC addresses linked to hardware?
yes
when are IP addresses assigned?
they are assigned either manually (static) or automatically (dynamic) before the device can access the network
what are static IP addresses?
permanent addresses
what are static IP addresses used for?
they’re used to connect printers on a LAN and for hosting websites on the internet - companies don’t want the IP address of their website changing
what are dynamic IP addresses and when are they assigned?
dynamic IP addresses are assigned when a device logs on to a network, meaning that it may have a different address every time it connects.
which is more expensive - static IP addresses or dynamic IP addresses?
static IP addresses are more expensive - businesses pay big money for them. dynamic IP addresses are more cost-effective
do Internet Service Providers (ISPs) commonly use dynamic or static IP addresses?
dynamic - they are more cost effective and can be reused
how many bits is an IP address? (how many digits long is the binary number?)
either a 32-bit or a 128-bit binary number, depending on the version of IP you’re using
what are 128-bit binary numbers translated into?
eight hexadecimal numbers
what are 32-bit binary numbers converted into?
four denary (normal) numbers
what is packet switching used for?
packet switching is used by routers to direct data packets on the internet and other IP networks
what are the 6 steps of packet switching?
- the sending device splits the data into packets to be sent across the network. Each packet is given a packet number to show the order of the data
- each router reads the packet header and decides which way to send the packet next, according to the IP rules
- the way the data is sent next changes depending on network traffic so the packets can take different routes. If a router receives too many packets at once, it may prioritise some over others
- as the packets take different routes, they can arrive in the wrong order. The receiving device uses the packet numbers to reassemble them in the right order
- sometimes packets go missing in transit, so the receiving device checks periodically that all packets have been received. If it hasn’t received them within a certain time, it sends a timeout message back to the sending device
- if all the data is received and the checksums match, a receipt confirmation is sent to the sending devices
why is packet switching an efficient use of the network?
there are so many possible routes that data can take - packets can reach their receiving device even if there’s heavy traffic
what protocol is the internet based around?
TCP/IP
what is the world wide web?
a collection of websites that are hosted on web servers and accessed through the http protocol
what are URLs?
addresses used to access web servers and resources on them
what does a domain name server (DNS) do?
it translates a website’s domain name into it’s IP address - the internet has a network of domain name servers, meaning you don’t need to remember IP addresses to access websites - you can use domain names instead
what is hosting?
when a business uses its servers to store files of another organisation
what is the traditional use for hosting on the internet?
the hosting of website
what is a relatively recent use of internet hosting?
general storage of user files and also providing online software
what is the cloud?
general storage of user files and also providing online software - this is cloud computing, or simply ‘the cloud’. It acts like an extension of a traditional client-server network where user files are stored centrally on a network server
what are 6 pros of the cloud?
- users can access files from any connected device
- easy to increase how much storage is available
- no need to buy expensive hardware to store data
- no need to pay IT staff to manage the hardware
- cloud host provides security and back ups for you
- cloud software will be updated automatically
what are 5 cons of the cloud?
- need connection to the internet to access files
- dependent on host for security and back-ups
- data in the cloud can be vulnerable to hackers
- unclear who has ownership over cloud data
- subscription fees for using cloud storage and software may be expensive
what are virtual networks?
networks that are entirely software-based
how are virtual networks created?
by partitioning off some of a physical network’s bandwidth to form a separate network
can more than one virtual network exist on the same physical network?
yes
are virtual networks more or less efficient than standard physical networks?
more - they all share the same hardware
does each virtual network have its own security? What does this mean?
yes, including its own firewall. this means virtual networks can only be accessed by using certain software or login information - other people could be using the same physical network and not have access to the virtual network, or even know that it exists
what is a virtual private network (VPN)?
a type of virtual network that can be used to send data securely over a large network, like a WAN or the internet. e.g. a vpn can be used to send data securely between offices on different sites, or to set up a school intranet that all the students can access from home
what does a virtual LAN allow you to do?
split a LAN into several separate networks using the same hardware
what is a passive attack?
someone monitors data travelling on a network and intercepts any sensitive information they find. they use network-monitoring hardware and software such as packet sniffers.
are passive or active attacks harder to detect
passive attacks are harder to detect as the hacker is quietly listening
what is the best defence against passive attacks?
data encryption
what is an active attack?
when someone attacks a network with malware or other planned attacks
what is the main defence against active attacks?
a firewall
what is an insider attack?
Someone within an organisation exploits their network access to steal information
what is a brute force attack?
a type of active attack used to gain information by cracking passwords through trial and error. Brute force attacks use automated software to produce hundreds of likely password combination, e.g. combining real words with predictable number sequences. Hackers may try lots of passwords against one username or vice versa.
what helps to reduce the risk of a brute force attack?
simple measures like locking accounts after certain number of failed attempts and using strong passwords will reduce the risk of a brute force attack
what is a denial-of-service (DoS) attack?
where a hacker tries to stop users from accessing a part of a network or website. Most DoS attacks involve flooding the network with useless traffic, making the network extremely slow or completely inaccessible
what is malware?
malicious software that can harm devices
what are 6 typical actions of malware?
- deleting or modifying files
- scareware - e.g. it tells the user their computer is infected with loads of viruses to scare them into following malicious links or paying for problems to be fixed
- locking files - ransomware encrypts all the files on a computer. The user receives a message demanding a large sum of money be paid in exchange for a decryption key
- spyware - secretly monitors user actions, e.g. key presses, and sends info to the hacker
- rootkits alter permissions, giving malware and hackers administrator-level access to devices
- opening backdoors - holes in someone’s security which can be used for future attacks
what are three types of malware, and how can they access your device?
- viruses attach (by copying themselves) to certain files, e.g. .exe files and autorun scripts. Users spread them by copying infected files and activate them by opening infected files
- worms are like viruses but they self-replicate without any user help, meaning they can spread very quickly. they exploit weaknesses in network security.
- trojans are malware disguised as legitimate software. Unlike viruses and worms, trojans don’t replicate themselves - users install them not realising they have a hidden purpose
what is social engineering?
a way of gaining sensitive information or illegal access to networks by influencing people, usually the employees of large companies
describe a common form of social engineering that takes place over the telephone
someone rings up an employee of a company and pretends to be a network administrator or somebody else within the organisation. The social engineer gains the employee’s trust and persuades them to disclose confidential information - this might be personal (e.g. their login details) or sensitive company data
is phishing social engineering or malware?
social engineering
what is phishing?
phishing is when criminals send emails or texts to people claiming to be from a well-known business, e.g. a bank or an online retailer. The emails often contain links to spoof versions of the company’s website. They then request that the user update their personal information (e.g. password or bank account details). when the user inputs this data into the website they hand it all over to the criminals, who can then access their genuine account
which networks are vulnerable to SQL injection attacks?
networks which make use of databases
what is SQL?
Structured Query Language - it’s one of the main coding languages used to access information in databases
what are SQL injections?
pieces of SQL typed into a website’s input box which then reveal sensitive informatio
how do SQL injections work?
a website may allow you to view your account information, as long as you enter your password into an input box. If the website’s SQL code does not have strong enough input validation, then someone may be able to enter a piece of SQL code which allows them to access other people’s account information as well as their own.
what is a network policy?
a set of rules and procedures the organisation will follow to ensure their network is protected against attacks and unauthorised access
what are 5 things a good network policy will do?
- regularly test the network to find and fix security weaknesses and investigate any problems
- use passwords to prevent unauthorised people from accessing the network
- enforce user access levels to limit the number of people with access to sensitive information
- install anti-malware and firewall software to prevent and destroy malicious software attacks
- encrypt sensitive data
what is penetration testing?
penetration testing is when organisations employ specialists to simulate potential attacks on their network
what is penetration testing used for?
it’s used to identify possible weaknesses in a network’s security by trying to exploit them. the results of the pentest are then reported back
what are network forensics?
investigations undertaken to find the cause of attacks on a network.
what must an organisation have in order to conduct network forensics?
a system of capturing data packets as they enter their network
how do network forensics work?
an organisation captures all the data packets as they enter their network. after the network is attacked, these packets can be analysed to discover how the network was attacked and decide how to prevent further attacks
what makes a strong password?
a strong password should be many characters long, use a combination of letters, numbers and symbols, and be changed regularly
what do user access levels control?
which parts of the network different groups of users can access, e.g. business managers are likely to have a higher access level allowing them to access more sensitive data, like pay information
how do user access levels help to make a network more secure?
user access levels help limit the number of people with access to important data, so help prevent insider attacks on the network
what is anti-malware software designed to do?
to find and stop malware from damaging a network and the devices on it
what do antivirus programs do?
isolate and destroy computer viruses
what do companies use firewalls for?
to block unauthorised access. Firewalls examine all data entering and leaving the network and block any potential threats
what is encryption?
Encryption is when data is translated into a code which only someone with the correct key can access, meaning unauthorised users cannot read it
what is encrypted text called?
cipher text
what is non-encrypted data called?
plain text
what is encryption essential for?
sending data over a network securely
what does the computer measure when it samples a sound wave?
amplitude and frequency
what is metadata?
metadata means “data about data” and provides information about the data, e.g. file format, resolution, dimensions, colour depth, etc.