Data is stored on multiple servers in a remote location ADV: secure, can be accessed anywhere, no need to buy DIS: needs internet, download and upload can be effected by internet connection, less control if data is held
29
New cards
Operating System
essential software that links the hardware and other software together and generally manages the computer system
30
New cards
Command-line Interface
Text commands where user has to type in command
31
New cards
Graphical User Interface (GUI)
uses icons and other visual indicators to navigate and issue commands
32
New cards
Utility Software
maintains a computer
33
New cards
Defragmentation Software
reorganises data on the hard drive to put fragmented files back together and moves files to collect all the free space
34
New cards
Backup Software
Full Backup - a copy is taken from from every file on the system Incremental Backup - only files created or edited since last backup are copied
35
New cards
Compression Software
reduces file size so they take up less space on hard disk
36
New cards
Encryption Software
scrambles data to stop others from accessing it
37
New cards
Open Source Software
source code is made freely available and users can modify it ADV: free, ,made for greater good, can be adapted DIS: small, buggy, security holes, no warranties, no customer support
38
New cards
Proprietary Software
only the compiled code is released and the source code is kept a secret ADV: warranties, well-tested, reliable, cheaper DIS: expensive, software may not fit user needs
39
New cards
Personal Area Network (PAN)
within the range of an individual person
40
New cards
Local Area Network (LAN)
a network that connects devices close to each other e.g. school, house
41
New cards
Wide Area Network (WAN)
a network within a large geographical area e.g. internet
42
New cards
Bandwidth
amount of data that can be transferred in a given time
43
New cards
Network Interface Card (NIC)
allow a device to connect to a network
44
New cards
Switch
connect devices on a LAN
45
New cards
Router
responsible for transmitting data between networks
46
New cards
Ethernet
a set of standards for connecting computers
47
New cards
Client-server Network
client has connection to server, servers can backup and store centrally but can be expensive and difficult to maintain
48
New cards
Peer-to-peer Network
no central server, each computer equal in responsibility, have to work as both server and a client.
49
New cards
Star Topology
ADV: better performance, rest of network not affected in one fails, simple to add more devices DIS: wire needed for all devices, expensive
50
New cards
Mesh Topology
ADV: faster DIS: expensive
51
New cards
MAC Address
assigned to all devices, unique to all devises and cannot be changed, permanent, identifies the actual device.
52
New cards
IP Address
assigned either manually or automatic, the location of your device on the internet
53
New cards
Packet Switching
split data into packets to be sent across the network, each packet given a number order of data, each router reads packet header and decides which way to send it according to IP rules, packets then arrive and reassemble them in the right order.
54
New cards
TCP/IP
sets of rules for how devices connect on the network.
55
New cards
Hyper Text Transfer Protocol (HTTP)
used to access websites and communicate with web servers
56
New cards
HTTPS
more secure - encryption
57
New cards
File Transfer Protocol (FTP)
used to access, edit and move files between devices
58
New cards
Post Office Protocol (POP3)
used to retrieve emails from a server, holds until download - then deletes from server
59
New cards
Internet Message Access (IMAP)
used to retrieve emails, server holds until you actually delete it- only download a copy
60
New cards
Simple Mail Transfer Protocol (SMTP)
used to send emails, used to transfer emails between servers
61
New cards
Layer
ADV: manageable pieces, self-contained can change without effecting others
62
New cards
Application Layer
turning data into websites
63
New cards
Transport Layer
controlling data flow - splitting data into packets
64
New cards
Network Layer
making connections between networks
65
New cards
Data link Layer
passing data over physical network-
66
New cards
Domain Name Server (DNS)
translates websites' domain name into its IP address
67
New cards
Virtual Network
network that is entirely software based, created by partitioning of some physical network
68
New cards
Blagging
invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information
69
New cards
Phishing
used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses.
70
New cards
Shouldering
used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder.
71
New cards
Malware
malicious software - computer programs designed to infiltrate and damage computers without the users consent.
72
New cards
Virus
program loaded onto a user's computer without the user's knowledge and performs malicious actions. It can self-replicate, inserting itself onto other programs or files, infecting them in the process.
73
New cards
Worm
program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
74
New cards
Trojan Horse
program which misleads users of its true intent.
75
New cards
Spyware
aims to gather information about a person or organization without their knowledge
76
New cards
Adware
unwanted advertisements to the user of a computer
77
New cards
Brute Force Attack
trail and error to gain information
78
New cards
Denial of Service Attack (DOS)
hacker stop users from accessing a part of a network, flooding network with useless traffic making computer very slow
79
New cards
Data Interception And Theft
The unauthorized taking or interception of computer-based information. Data theft is the act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information.
80
New cards
SQL Injection
programming language used to search and query databases.
81
New cards
Zero-day Attack
before software is released it is tested as much as possible
82
New cards
Penetration Testing
organisations employ specialists to stimulate potential attacks on their network
83
New cards
Anti-malware Software
designed to find and stop malware from damaging a network
84
New cards
Encryption
data is translated into code which only someone with the correct key can access