1/92
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is a network?
A collection of computers or electronic devices, that are connected together for the purpose of communication.
Give six advantages of using a LAN.
- File sharing: network users can access the same files, work collaboratively on them and copy files between machines.
- Hardware sharing: users can share hardware, such as a printer.
- Internet connection: the internet connection can be shared between every device connected to the LAN.
- Software installing, software can be installed and updated on all computers, rather than one by one.
- Communication: LAN users can communicate cheaply and easily.
- User accounts can be stored centrally, so users can log in from any device on the network.
Give four disadvantages of using networks.
- Cost: digital equipment is needed to allow computers to communicate.
- Management: networks require management by technical staff, such as a network manager.
- Spread of malware: viruses and other forms of malware can easily spread across an improperly secure network.
- Hacking, once a device is connected another device, it is possible that data may be accessed without the device owner's permission.
What is a LAN?
A local area network; a network that is spread over a small geographical area, where all the hardware for the network is owned by the organisation that uses it.
What is a WAN?
A wide area network; a network that that consists of multiple LANs connected together, is spread over a large geographical area, and the infrastructure is hired not owned outright.
What is a NIC?
A network interface card; an internal piece of hardware that allows a device to connect to a network.
What is a Switch?
A switch is a networking device, that connects devices on a LAN. They receive data in units called frames from one device and transmit this data to the device on the network with the correct MAC address.
What is a hub?
A hub is a networking device, that allows devices to connect to a network. Hubs broadcast the signals they receive to all connected computers, unlike a switch, which only sends data to the intended recipient. This greatly decreases network performance due to the amount of transmissions.
What is a router?
A router is a networking device that transmits data between networks in packets. Alternatively a router can mean a device which contains a hub, modem and WAP, to allow devices to connect to the internet.
What is a modem?
Stands for modulate/demodulate: a networking device that converts data intended for communication between different formats.
What is transmission media?
A method of carrying data signals from one computer to another. They are either wired or wireless.
What are CAT 5e and CAT 6 cables?
Transmission media that consist of "twisted pair cables" containing pairs of copper wires, twisted together to reduce internal interference. They are the most common kind of Ethernet cable.
What are coaxial cables.
Transmission media, that consist of a single coper wire surrounded by a plastic layer for insulation and a metallic mesh which provides shielding from outside interference.
What are fibre optic cables?
Transmission media that use light to transmit data, through cables. They are high performance, therefore very expensive, they can transmit data over very large distances without loss of signal quality.
What is a wireless network?
A network that uses radio waves to transmit data.
What is the difference between a WAP and a hotspot?
A WAP is essentially a switch, that allows devices to connect wirelessly, whereas a hotspot is just a location where you can connect to a WAP.
What is a WAP?
A wireless access point, a device that uses a radio transceiver to allow wireless connections to a network, in effect creating its own network.
What is needed to set up a wireless network?
You need a WAP(wireless access point), and the devices need wireless capability.
What is WiFi?
Wireless Fidelity; a standard for connecting devices on a wireless network using radio waves.
What is meant by a "frequency band", and "channels".
A frequency band is a range of frequencies that data is transmitted on, a channel is a range of frequencies within a band. They both help to reduce interference.
What is a client-server network?
A network managed by a server, where the devices connected to it are the clients. The clients send requests to the server, and the server processes the requests and responds.
Give 5 advantages of a client-server network.
- They make it easier to keep track of files, as they're stored centrally.
- Easier to perform back-ups.
- Easier to install and update software.
- Easier to manage network security(e.g anti-malware software and user access levels).
- Servers are very reliable and always on.
Give 3 disadvantages of a client-server network.
- They are expensive to set up and need IT specialists to maintain the network and server.
- Server dependence - if the server goes down, all clients lose access to the network.
- The server may become overloaded if too many different clients are accessing it at once.
What is a peer-to-peer network?
A network, where all devices are equal, connecting directly to each other without a server. Files are stored on individual devices, and are shared with others.
What are 2 advantages of a peer-to-peer network?
- They are easy to maintain: they don't need any expertise or expensive hardware.
- No dependence on server: if one device fails, the whole network isn't lost.
Give 4 disadvantages of a peer-to-peer network.
- No centralised management: devices need their updates and security installed individually. Backups are more complicated.
- Copying files between devices creates duplicate files - its easy to lose track of whats stored where and which files are up to date.
- Peer machines are less reliable and data may be lost if one fails.
- Machines are prone to slow down when other devices access them.
What is a star topology?
A type of network, where all the devices are connected to a central node, which is usually a switch or server.
What are 3 advantages of a star topology?
- If a device fails, the rest of the network is unaffected.
- Its simple to add more devices to the network.
- It has better performance than alternatives, as data goes straight to the central node, so devices can all transmit data at once, meaning there are very few data collisions.
What are 2 disadvantages of a start topology?
- In wired start topologies, every devices needs a cable to connect to the central node, this can be expensive.
- If there is a problem with the central node, then the whole network is affected.
What is a bus topology?
A network arrangement, where devices are arranged in a line, all connected to a single backbone cable with a terminator at each end. Devices send data in both directions, meaning lots of data collisions occur, slowing the network.
What is a ring topology?
A network arrangement, where data moves in one direction around the ring, preventing collisions, but only one device can send data at a time and data passes through many devices, before reaching its destination.
What is a mesh toplogy?
A network arrangement, where the devices are either directly or indirectly connected to every other one without the need for one central server or switch. Data is sent along the fastest route from one device to another.
What is an advantage of a mesh network?
There is no single point of failure in the network, if a device fails, then data is sent along a different route.
What is a disadvantage with a mesh network?
Wired mesh networks require lots of cabling to connect all the devices together, this can be expensive.
What is meant by a "full" or "partial" mesh?
A full mesh is where every device is connected to every other device. In a partial mesh, not all devices are fully connected.
What is a protocol?
A set of rules for how devices communicate and how data is transmitted across a network
What is a MAC address?
MAC addresses are unique identifiers so a device can be found on a network, they are made up of 48 or 64 bit binary numbers.
What is an IP address?
A unique address for each computer device on a network that uses TCP/IP.
What is a static IP address?
A permanent IP address. They are used to connect printers on a LAN, and for hosting websites on the internet.
What is a dynamic IP address?
An IP address assigned when a device logs on to a network, meaning that it may have a different address each time it connects.
Whats the difference between an IP and a MAC address?
MAC addresses are linked to hardware, whereas IP addresses aren't, they're either assigned manually(static) or automatically(dynamic).
How is data sent between networks?
- Data sent on networks is split into equal sized packets.
- Every packet of data has a header - which contains the control information, the control information is like the envelope of a letter, and includes the destination address, the source address, and the packet number.
- The packets payload is like the letter inside an envelope, it is the whole reason the packet was sent and contains its contents.
- Packets may also have a checksum number, a checksum number is a form of validation used to check that the payload data has not been corrupted during transit. The sending and receiving devices both calculate a checksum value by performing a function on the payload data, if the values match, then the data has been received correctly.
What is packet switching?
Packet switching is how routers direct data packets on the internet and other IP networks.
What are the steps involved in packet switching?
- The sending device splits the data into packets to be sent across the network. Each packet is given a packet number to show the order of the data.
- The routers in the network read the packet header and decide which way to send the packet next, according to the IP rules.
- The way the data is sent changes depending on network traffic so the packets can take different routes. If a router receives too many packets at once it may prioritise some over others.
- As the packets take different routes, they can arrive in the wrong order. The receiving device uses the packet numbers to reassemble them in the right order.
- Some packets go missing in transit, so the receiving device checks periodically that all the packets have been received. If it hasn't received them within a certain time, then it sends a timeout message back to the sending device.
- If all the data is received and the checksums match, a receipt confirmation is sent to the sending device.
What is TCP/IP?
A protocol which dictates how data is sent between networks. It is made up of two protocols - TCP and IP.
What is TCP?
Transmission control protocol; sets the rules for how devices connect on a network. It's in charge of splitting the data into packets and reassembling the packets back into the original data once they reach the receiving device. It's also responsible for checking the data is sent correctly and delivered.
What is IP?
A protocol responsible for packet switching.
List 6 other protocols, and explain their functions.
HTTP - Hyper text transfer protocol: used by web browsers to access websites and communicate with web servers.
HTTPS - HTTP secure: a more secure version of HTTP, encrypts all information sent and received.
FTP - File transfer protocol: used to access, edit and move files between devices on a network, e.g. to access files on a server from a client computer.
POP 3 - Post office protocol v3: used to retrieve emails from a server. The server holds the email until you download it, at which point it is deleted from the server.
IMAP - Internet message access protocol: used to retrieve emails from a server. The server holds the email until you actually delete it - you only download a copy. Used by most web-based clients.
SMTP - Simple mail transfer protocol: used to send emails. Also used to transfer emails between servers.
What are network protocols divided into?
Layers.
What is meant by a layer?
A layer is a group of protocols which have similar functions. Layers are self-contained, so protocols in each layer can do their job without needing to know what's happening in other layers. In the order of layers, each layer serves the layer above it - it does the hidden work needed for an action on the layer above.
What are the four layers and protocol examples?
Layer 4 - Application layer: Turning data into websites and other applications and visa versa. E.g. HTTP, FTP, SMTP.
Layer 3 - Transport layer: Controlling the flow of data. E.g. packet splitting. E.g. TCP.
Layer 2 - Internet Layer: Making connections between networks, directing data packets and handling traffic. Used by routers. E.g. IP.
Layer 1 - Link layer: Passing data over the physical network. Responsible for how bits are send as electric signals over cables, wireless and other hardware. E.g. Ethernet.
What are 3 advantages of using layers?
- It breaks network communication into manageable pieces. This helps developers concentrate on only one area of the network without having to worry about the others.
- As layers are self contained, they can be changed without the other layers being effected.
- Having a set of rules for each layer, forces companies to make compatible, universal hardware and software, so different brands will work with each other and always work in basically the same way.
What is the internet?
The internet is a WAN which connects devices from all over the world, using the TCP/IP protocol.
What is the difference between the world wide web and the internet?
The internet is the physical infrastructure that allows devices to communicate, whereas the world wide web is a collection of websites that are hosted on web servers.
What are URLs?
Addresses used to access web servers and resources on them.
What is a DNS?
A domain name server; a computer that translates a websites domain name into its IP address. The internet has a network of domain name servers, meaning you don't need to remember IP addresses to access websites - you can use domain names instead.
What is hosting?
When a business uses its servers to stores the files of another organisation.
What is the cloud?
General storage of user files accessed through online software on the internet.
Give six advantages of using the cloud.
- Users can access files from any connected device.
- It's very easy to increase the amount of storage available for users.
- No expensive hardware is needed by the user to store data.
- No need to pay IT staff to manage hardware.
- Cloud host may provide security and backups for you.
- Cloud software is usually updated automatically.
Give five disadvantages of using the cloud.
- A connection to the internet is needed to access files.
- Dependent on the host for security and backups.
- Data in the cloud can be vulnerable to hackers.
- Unclear who has ownership over cloud data.
- Subscription fees for using cloud storage and software may be expensive.
What is a virtual network?
A virtual network is a network that is entirely software based, they are created by partitioning off some of a physical networks bandwidth to form a separate network.
What is a VPN?
A virtual private network; a type of virtual network that can be used to send data securely over a large network.
What is a passive attack?
When someone monitors data travelling on a network and intercepts any sensitive information they find without permission.
What is a good defence against passive attacks?
Data encryption.
What is an active attack?
When a hacker attempts to modify or delete data, or to prevent a network from operating correctly.
What is a good defence against active attacks?
Firewalls.
What is a insider attack?
When someone within an organisation exploits their network access to steal information.
What is a brute force attack?
An attack used to gain information by cracking passwords through trial and error, using automated software.
What is a DoS attack?
A denial of service attack; a form of active attack where a hacker tries to stop users from accessing a part of a network or a website. They often involve flooding the network with useless traffic making it slow or inaccessible.
What is malware?
Malicious software installed on someones device without their knowledge or consent.
What are viruses?
Malware hidden in another program that replicates itself usually to cause damage by deleting or modifying files.
What are worms?
Self-replicating malware that does not necessarily need to embed itself in another program.
What are trojans?
Malware disguised as legitimate software, that are installed by users under the pretence that they are useful.
What is ransomware?
Malware that interferes with the user's operations of a computer or threatens to do so unless a sum of money is paid, either by actually encrypting files or by threatening alone.
What is spyware?
Software that gathers information about a user or organisation and sends it back to a hacker.
Give one example of spyware.
Keyloggers.
What are rootkits?
Malicious software that alters permissions to give malware and hackers administrator level access to systems.
What are backdoors?
An approach whereby malware opens an access channel to outsiders that can bypass normal security checks.
What is social engineering?
A way of gaining sensitive information or illegal access to networks by influencing people, often the employees or large companies.
What is phishing?
When criminals send emails or texts to people claiming to be from a well known business, the messages often contain links to fake versions of the companies website. They then get the user to enter their personal information, and if they do the criminals can use it to access the victims genuine account.
What is data interception and theft?
Where data is intercepted during transmission, using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker.
What is an SQL injection?
SQL injections are pieces of malicious SQL code entered into a websites input box, which then reveals sensitive information without the permission of the website owner when executed.
What is way to prevent an SQL injection?
Validating all input to text boxes to check for SQL commands.
Give five qualities of a good network policy.
- The network is regularly tested to find and fix security weaknesses and investigate problems if they happen.
- Use passwords to prevent unauthorised people from accessing the network.
- Enforce user access levels to limit the number of people with with access to sensitive information.
- Install anti-malware and firewall software to prevent and destroy malicious software attacks.
- Encrypt sensitive data.
What is penetration testing?
When potential attacks are simulated on a network to identify possible weaknesses in a networks security, which are then reported back and fixed.
What is network forensics?
When investigations are undertaken to find the cause of attacks on a network, by capturing data packets as they enter the network, to analyse and discover how the network was attacked and how to prevent future attacks.
What is the purpose of passwords?
To prevent unauthorised users from accessing a network.
What are the features of a strong password?
- Many characters long.
- Uses a combination of letters numbers and symbols.
- Changed frequently.
What are user access levels?
Rules which dictate which parts of a network different groups of users can access.
What is anti-malware software?
Software that is designed to detect and remove malware, before it damages an organisations network and the devices on it.
What is a firewall?
Software and/or hardware placed between on network and another node, in order to control inbound and outbound traffic. Firewalls make use of predetermined rules in order to exert control over the flow of data.
What is encryption?
The process of encoding data so that it can only be understood by its intended recipient.
What are often the weak point in secure systems?
People.