Section 5 - Networks and Section 6 - Cyber Security Flashcards
What is a computer network?
Computer network:
— A group of computers connected together
What are the three main types of network?
PAN (personal area network):
— Within the range of a person and have a range of 10m e.g. Bluetooth
LAN (local area network):
- – Connects devices close to each other
- – They cover small geographical areas e.g school or home
- – They are owned and managed by one person or organisation
WAN (wide area network):
- – Connectes devices over a much wider geograhical area (possibly several locations)
- – The internet is the biggest example of a WAN
- – Usually managed by more than one person collectively
- – Internet is made of several LANs connected
Compare wireless and wired networks.
Wired:
- – Generally, data transfer is faster
- – Less likely to suffer from interference
- – Less susceptible to hackers
- – Expensive to install or reconfigure
- – Might not be able to connect to the network from other locations
Wireless:
- – Can access the network from multiple locations
- – Nodes can easily be added without interruption to the network
- – Signals have a limited range
- – Signals can be blocked by walls for example
- – Signals with roughly the same frequency causes interference
- – Each node has a limited bandwidth so more connections = slower bandwidth for each device
- – More prone to hacking
When would fibre optic cables and copper cables be appropriate to use?
Fibre optic cabling is made from glass. Appropriate when wanting to send signals across long distances
What are the purposes and uses of Ethernet and WIFI?
Ethernet:
- – A family of related protocols
- – Ethernet cables are twisted copper cables
Wifi:
- – A family of related protocols
- – Wifi is a trademark, the generic term is WLAN (wireless local area network)
What are the purposes and uses of TCP, UDP and IP?
TCP (Transmission Control Protocol):
- – Operates at the transport layer
- – Deals with the connection between devices
- – When going outbound, it receives data from the application layer and splits it into packets
- – When going inbound, it receives packets from the network layer and reassembles them to the original data
- – It provides error checking and connection
IP (Internet layer):
- – Operates at the network layer
- – Protocol addresses packets with the source and destination IP address
- – When sending back to the transport layer, the protocol removes the IP addresses as they are no longer needed
UDP (User Datagram Protocol):
- – Alternative to TCP, operates at the transport layer
- – TCP sets up a two-way connection whereas UDP sends the data one way
- – Suitable when error checking and connection is not required
- – Faster due to less delay but less reliable than TCP
What are the purposes and uses of HTTP, HTTPS and FTP?
HTTP/S (Hypertext Transfer Protocol/Secure):
- – Operates at the application layer
- – Used to access a webpage from web server
- – HTTPS provides a more encrypted version of a webpage as data is secured
FTP (File Transfer Protocol):
- – Operates at the application layer
- – Used with file uploads and downloads
- – Transfers data and programs
What are the purposes and uses of the email protocols?
SMTP (Simple Mail Transfer Protocol):
- – Operates at the application layer
- – Handles outbound emails from the client to the internet via the mail server
IMAP (Internet Mail Access Protocol):
- – Operates at the application layer
- – Handles inbound email from the internet to the client via a mail server
- – Keeps mail server and client in sync
Describe the four layer TCP/IP model
Application layer:
— this is where the network applications, such as web browsers or email programs operate
Transport layer:
— this layer sets up the communication between the two hosts and they agree on settings such as ‘language’ and size of packets
Internet/Network layer:
— addresses and packages data for transmission, routes the packets across the network
Link layer:
— this is where the network hardware such as the NIC (network interface card) is located. OS device drivers also sit here
Define cyber security.
Cyber security:
— The processes designed to protect networks from attack or unauthorised access
What is malware?
Malware stands for malicious software. It is an umbrella term that refers to variety of forms of intrusive or hostile software.
Describe four different forms of malware.
Viruses:
— implanted inside normal programs themselves so that when the host program is executed then so does the virus
Trojan:
— disguises itself as something else to trick people into thinking of it as desirable software
Adware:
— displays unwanted adverts to generate revenue as people will be intrigued to press on the advert (sometimes these adverts refuse to close unless pressed on)
Spyware:
— collects data by tracking activity on the computer and then sending this information back to the attack instigator e.g. recording passwords entered
How can malware be protected against?
Protection:
— Using up to date anti-malware software
Explain other cyber security threats apart from malware.
- – Unpatched software - security holes have been fixed in a newer version of the software but the user themselves need to install this newer version
- – Outdated software - constant updates are required to ensure security breaches are fixed properly
- – Misconfigured access rights - when a person has permissions they shouldn’t have
- – Weak and default passwords - makes it easy for people to gain access to things they shouldn’t be able to access
- – Removable media - easily transfers malicious code onto other devices
What is social engineering?
Social engineering:
— Manipulating people into giving up their confidential information