Unit 12: Behind the Scenes: Networking and Security in the business world Flashcards
4 benefits of business networks
- enables resource sharing
- facilitates knowledge sharing - data access to multiple people
- enables software sharing - deliver software form server to client
- enhances communication - connects employees
network administrators?
additional personnel that are required to maintain a business network due to its complexity
client/server network/server-based network?
contains servers and client computers
sever?
a computer that stores and shares resources on a network
client?
a computer that requests resources from the server
which one is centralized and which one is decentralized
a) client/server networks
b) P2P networks
a) centralized
b) decentralized
when are P2P networks difficult to administer?
past 10 users therefore not used for business networks
scalability?
more users can be added easily without affecting the performance of the other network nodes
what are the 2 most common types of client/server networks?
- LAN - local area network
2. WAN - wide area network
types of client/server networks
- PAN - devices used by one person connect via wireless media
- LAN - network consisting of nodes covering a small geographical area
- HAN - small LAN installed in a home
- WAN - multiple LANs connected together over a long distance
- MAN - WANs constructed by municipalities to provide connectivity in a specific geopraphical area
intranet?
private network set up by a business that is used exclusively by a select group of employees
extranet?
an area of an intranet that only certain corporations/individuals can access
EDI?
electronic data interchange - enabled by extranet they allow the exchange of large amounts of business data in a standardized electronic format
VPN?
virtual private network - uses public internet communications infrastructure to build a secure, private network among various locations
tunneling?
data packets are placed inside other data packets allowing VPN to be achieved
6 key components fo a client/server network
- servers
- network topologies
- transmission media
- network adapters
- network navigation devices
- network OS
network topology?
physical or logical arrangement of computers, transmission media, and other networks components
NIC?
network interface card
dedicated server?
a server used to fulfill the specific function
8 categories of servers
- print servers
- app servers - a repository for app software
- database servers - access
- authentication server - keeps track of who logs in
- file server - storage and management
- email server - process and deliver
- communication server
- web/cloud server - host website to make available on the internet
print queue/print spooler?
a software holding area for print jobs
Apache HTTP server and Microsoft IIS are examples of?
special software run by a web server
IIS?
internet information services
virtualization?
using specialized software to make individual physical servers behave as though they are more than one physical devices
protocol?
set of rules for exchanging communications
bus/linear bus topology?
where all computers are connected in a sequence on a single cable
data collision?
when 2 computers send data at the same time and the sets of data collide somewhere in the connection media
what networks don’t have a data collision problem?
none
access method?
controls which computer can use the transmission media at a certain time in order to prevent data collision
passive topology?
when nodes do nothing to move data along with the network
terminator?
a device that absorbs a signal so that it’s not reflected back onto parts of the network that has already received it
costs and benefits of a bus network
- benefit - inexpensive
2. cost - causes a break in the “cable” and limits performance/delays data transmission
ring/loop topology?
type of network topology where computer and peripherals are laid out in a circular configuration
token?
spacial data packet used in a ring topology
token method?
access method that ring networks use t avoid data collision
active topology?
nodes participate in moving data through a network
is a ring topology an active or passive topology?
active
is a bus topology an active or passive topology?
passive
star topology?
nodes connect to a switch
switch?
central communication device - receives node signal and retransmits it to another node that needs to receive the signal
which topology is most commonly used by client/server networks? why?
star topology - because its the most flexible for a low price - most efficient
CSMA/CD?
carrier sense multiple access with collision detection - where a node uses carrier sense to verify that no other nodes are currently transmitting data signals in order to check if it is safe to transmit data
carrier sense?
computers version of listening
jam signal?
a signal that alerts nodes that a collision has occurred
4 advantages of a star topology?
- failure of one node doesn’t affect network - other nodes
- easy to add nodes
- acceptable performance even with many nodes
- switch makes repairs easier
2 advantages of bus topology?
- min amount of cable
2. easy, reliable, and inexpensive installation
2 advantages of ring topology?
- fair network allocation
2. acceptable performance even with many nodes
hybrid topology?
combining multiple topologies into one network
6 factors to consider when choosing a network cable
- max run length - how long cable can run before data signal degrades
- bandwidth - the amount of data transmission
- flexibility - how much it can bend
- cable cost
- installation cost
- interference
transmission media?
a physical system that data takes to flow between devices on the network
3 types of cables
- twisted-pair
- coaxial
- fiber-optic
things that cause transmission media interference
- EMI - when a cable is exposed to a strong electromagnetic field
- RFI - when a cable is disrupted by a radio frequency
EMI?
electromagnetic field interference
RMI?
radio frequency interference
twisted-pair cable?
pairs of copper wires twisted around each other covered by a protective sheath
STP cable?
shielded twisted-pair - cable that contains a layer of foil shielding on a twisted-pair cable meant to reduce interference
UTP cable?
unshielded twisted-pair - twisted-pair cable that doesn’t have a shielding
what is UTP cable used for and why?
business networks because it is cheaper
what are the 4 components of coaxial cable?
- a core - used to transmit the signal
- layer of nonconductive insulating material surrounding the core
- layer of braided metal shielding covering installation to reduce interference
- external layer of plastic - jacket
what are the 3 components of fiber-optic cable?
- multiple glass/plastic fibre (core) - used to transmit data
- protective layer of glass/plastic wrapped around the core
- outer sheath made of Kevlar - bulletproof vest
network adapter?
devices that perform specific tasks to enable nodes to communicate on a network
NIC?
network interface card - network adapter installed inside a computer/peripheral
3 thing network adapters do
- generate high-powered signals to enable network transmissions
- responsible for breaking the data into packets and transmitting and receiving data
- act as a gatekeeper for info flowing to and from the client computer
what is the standard communication protocol used on most client/server network?
ethernet network
wireless NIC?
wireless network interference card - special networking card that allows a computing device to connect to a network using a wireless media
WAP?
wireless access point - gives wireless devices a sending and receiving connection point to a network
device driver?
a special communication software that enables the network adapter to communicate with the server’s and computing system’s OS
MAC address?
media access control address - physical address/serial number
IEEE?
institute of electrical and electronics engineer - a committee responsible for allocating blocks of numbers to network adapter manufacturers - MAC’s
IP?
internet protocol
what is the difference between a MAC address and an IP address?
MAC address - used to identify purposes internally on a network
IP address - used to identify purposes externally on a network
frame?
groups of the data packet sent together
NOS?
network OS - provides protocols that control communication among devices on a network
what does a switch do?
sends data on a specific route through a network based on the MAC address of the data
bridge?
devices used to send data between different network collision domains
collision domain?
a segment of a network
router?
a device designed to send info between two networks
do P2P networks require a special NOS?
no usually P2P devices already have it built in the system
can a network use multiple NOSs? why?
yes, because each NOS provides different features
the 3 types of threat that client/servers are vulnerable to
- human error
- malicious human activity
- natural events/disasters
who offers more security?
a) P2P
b) client/servers
b)
authentication?
process whereby users prove they have the authorization to use a computer network
possessed object?
any object that users carry to identify themselves and that grants them access to a computer system/facility
brute-force attack?
attempting to access an account by repeatedly trying different passwords
OSI reference model?
open system interconnection reference model - a standard of communication that provides the protocol guideline for all modern networks
7 layers of OSI model?
- application layer
- presentation layer
- session layer
- transport layer
- network layer
- data link layer
- physical layer
OSI model application layer? (2)
- interfaces between app software and network
2. translates user info into language presentation layer can understand
OSI model presentation layer? (2)
- reformats data so the session layer understands
2. compresses and encrypts data
OSI model session layer? (2)
- sets up a virtual connection between sending and receiving deveis
- manages communication sessions
OSI model transport layer?
creates and acknowledges data packets
OSI model network layer?
determines where to sends data packets
OSI model data link layer?
assembles data into frames, addresses them sends them to the physical layer
OSI model physical layer?
transmits data to intended address using network
why might portable storage devices endanger a network? what are they?
they can aid in theft of data or intellectual property - flash drives/USB devices
2 physical devices used to control network access
- access card reader - cheap devices that read info from the magnetic stripe on the back of credit card
- biometric authentication device - uses a unique characteristic of human biology to identify authorized users
3 of the best security methods for sensitive info
- knowledge - passcode
- possession - user ID
- inherence - retina scan/fingerprint
multi-factor authentication?
when a system requires multiple factor demonstrations of authorization before access is granted
packet screening?
having an external screening router examining incoming data packets to ensure that they originated from a valid user on the internal network
bastion host?
a heavily secured server located on a special perimeter network between a company’s secure internal network and firewall - a type of honey pot
honey pot?
a computer system designed to attract unauthorized users by appearing to be a key part of the network
information assurance?
ensuring info system sare adequately secured against tampering
5 key attributes to securing information systems
- availability - the extent a data processing system can receive and process data
- integrity - logical and accurate with protected data
- authentication - contains security measures restricting access
- confidentiality - the assurance that info is not disclosed t unauthorized personnel
- nonrepudiation - proof that a piece of data originated from a specific person
proxy server?
a configuration of a bastion host that resides between internal and external networks in order to maintain adequate security - customs