section 2 networks Flashcards
what is a LAN
local area network that covers a small geographical area and is often found in schools and universities
Why use a LAN
sharing files share the same hardware share internet connection updates all at once communicate cheaply user accounts can be stored centrally
what is WAN
wide area network
connect LANs that are in different areas
what factors affect performance of networks
Bandwidth
wired or wireless connections
network topology
what is bandwidth
is the amount of data that can be transferred in a given time
what is a network interface card
an internal piece of hardware that allows a device to connect to a network
built into the motherboard
what are switches
connect devices on a LAN
switches receive data from one device and transmit this data to the device on the network with the correct MAC address
what are routers
responsible for transmitting data between networks
they also direct data packets to their destinations
Ethernet cables
CAT 5 and CAT 6
twisted pair cables which are twisted together to reduce internal interference
Coaxial cables
single copper wire surrounded by plastic layer which provides shielding from outside interference
Fibre optic
transmits data as light
high performance because they don’t suffer from interference and can transmit over large distance
how do wireless networks work
use radio waves to transmit data
how do you connect a network to wireless and devices
need a wireless Access point which is a switch that allows devices to connect wirelessly
how does WIFI work
uses two radio frequency bands the two bands overlap
What affects WIFI
interference between net works using adjacent channels
what is a passive attack and the best defense
someone monitors data travelling on a network and intercepts any sensitive information they find
data encryption
what is an active attack and best defense
when someone attacks a network with malware
firewall
what is an insider attack
someone within the organisation exploits their network access to steal information
what is a brute force attack and best defense
is a type of active attack used to gain information by cracking passwords through trail and error
use automated software to produce hundreds of passwords
locking accounts and strong passwords
what is a denial of service attack
where hacker tries to stop users from accessing a part of a network
involve flooding the network with useless traffic
what is malware
software that can harm devices
what are typical actions of malware
locking files(ransomware)
spyware
opening back doors
rootkits(alter permission)
what is a virus and how they spread
attach by coping themselves to certain files
users spread them by copying infected files and activate by opening them
what are worms and how they spread
they self replicate without any user help
exploit weaknesses
what are Trojans
malware disguised as legitimate software
what is social engineering
a way of gaining sensitive information or illigal access to networks by influencing people
what is a common way of social engineering
over the telephone by pretending to be administrator and persuades them to give confidential information
what is phishing
when criminals send emails to people claiming ti be from a well known business
they are normally sent to lots of people
what is SQL
structured query language
main coding languages used to access information in a database
what are SQL injections
are pieces of SQL typed into a website input box which then revels sensitive information
what will a good network policy have
regularly test the network use passwords enforce user access levels install anti-malware encrypt sensitive data
what is penetration testing
organisation employ specialists to simulate potential attacks on their network
it identifys possible weaknesses
what is network forensics
investigations undertaken to find the cause of attacks on a network. For this to work an organisation needs a system of capturing data packets
why are passwords used and what should they be like
help prevent unauthorized users accessing the network
should be strong, combinations, regularly changed
what are user access levels
control which part of the network different groups of users can access
what is good about user access levels
help limit the number of people with access to important data, so help prevent insider attacks