WGU C182

0.0(0)
Studied by 7 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/56

flashcard set

Earn XP

Last updated 10:26 PM on 11/17/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

57 Terms

1
New cards

Application Software

Programs end users run to accomplish tasks.

2
New cards

Productivity Software

Application software used to aid in productivity. I.E. Presentation software, word processor, spreadsheets.

3
New cards

Internet Usage Software

Email, FTP client, web browser

4
New cards

System Software

Consists of programs that make up the OS and directly support system itself.
**Includes services or DAEMONS

5
New cards

Server Software

Works with hardware to provide network service.

6
New cards

Local Application

Software stored on an individual computer.

7
New cards

Intranet

A LAN that uses IP. Used to communicate within organization.

8
New cards

Cloud Computing

Allows organization to access resources/app anywhere, anytime. Beneficial because an org. may access resources it may not normally have.

9
New cards

Operating Systems

Allows a user to easily access hardware/software, required to maintain computer environment.

10
New cards

Kernel

Core component of OS.
Loads when computer first boots
Sits on top of hardware, is interface b/w hardware and software.

11
New cards

Device Drivers

Interface b/w OS and hardware.

12
New cards

Shell

Interface for user, often personalized. The shell provides access to the kernel.
I.E. The GUI will translate mouse motions into calls to kernel/routines. Desktop elements include shortcuts, windows theme, menus, background.

13
New cards

Services (Daemons)

OS programs that start when OS is loaded. They run in the background and wait for an event to initiate.

14
New cards

Utility Programs

Allow user to monitor system performance.

15
New cards

Web Server

Role is to respond to HTTP requests.
*Most HTTP requests are for HTML docs, but could include any web accessible resource.
It's all combined into the URL.
**APACHE is most popular web server-can execute scripts for dynamic pages, use security mechanisms, log request for trend tracking.

16
New cards

Proxy Server

Acts as a giant cache and allows pages accessed frequently in an organization to be accessed locally.
*Also provides degree of anonymity, since IP address recorded is for proxy server and not individual client.
*Can also be used to block requests to certain servers (i.e Facebook)
*Can reject responses that contain certain content (i.e "porn")
**SQUID is most common, but APACHE can also be used as proxy server.

17
New cards

Database Server

Permits dB access across a network.
Performs tasks such as data analysis, data manipulation, security,and archiving.
May/may not store database itself.
**MySQL is popular.

18
New cards

FTP Server

Hosts files and allows clients access to files.
Access is in form of uploading/downloading files.
Requires either user has an account or logs in as anonymous user.

19
New cards

File Server

Computer with large hard disk storing files, but can also store software to be run over network.

20
New cards

Email Server

Provides email service.
Accepts email request from clients.
IMAP,POPS,HTTP,MAPI,MIME

21
New cards

String Data

Alphanumeric or text
Ex: James (Last name)
623 Hill Street

22
New cards

Number Integer

Numeric data, whole numbers.
Ex: 4

23
New cards

Floating Point

Decimal.
Ex: 4.2

24
New cards

Date/Time

Type of Data

25
New cards

Boolean/Logical

Type of Data.
Ex: True/False (in reply to active subscriber?)
Only two possible answers: yes/no or true/false

26
New cards

Flat File Database

One large single table without relations between tables.
*Most common is CSV file (files separated by comma)
*Flat file is used if amount of data is fairly small.
Ex: Spreadsheet

27
New cards

Relational Database

Most common structure for database.
*Distinguished by multiple tables with interrelated fields.
*When queried, data can be pulled form any # of relations that may be contained in multiple databases.
*Provides lots of flexibility.

28
New cards

Hierarchical Database

Organizes data by using tree-like or organizational chart type structure.
*Main data points can have multiple sub-data points (Parent/child structure)-Subpoints can only have one main data point.
* Records can be broken up so one portion is in one location and another is in another section.
Ex: Employee database could list all employees, but a child relation could contain info about employee position, pay level, responsibilities. Another child relation could include info about employee projects. Sub data is always specific to main data point.

29
New cards

Tuples

Records represented by rows.

30
New cards

Unshielded Twisted Pair (UTP)

Most commonly used network connections. Looks just as it sounds, wires twisted together in a pair.

31
New cards

Fiber Optic Cable

Transmits via light pulses as opposed to electromagnetic ones.

32
New cards

Twisted Pair

Network connection commonly used in the past. It is still seen a lot today because it was used extensively in the phone systems. Is cheap and and already in place.
**transmits using electromagnetic waves.

33
New cards

Coaxial Cable

Commonly used network connection.
*Transmits using electromagnetic waves.

34
New cards

Bandwidth

Transfer rate permissible over the media, and is described as bps or b/s (bits per second).
**Modern bandwidth is described in millions/billions bits per second (i.e. Mbps or Gbps)
*Older tech limited to thousands, (i.e. 56 Kbps)

35
New cards

Network Hub

Device that connects multiple computers together.
*Broadcasts to all connected devices, even if message is intended for just one.

36
New cards

Network Switch

Device that connects multiple computers together.
**Able to broadcast to just one if message is intended for one, but has ability to send message to all if needed.

37
New cards

Router

Used to connect multiple networks together.
**Has decision making abilities, can purposefully drop messages if message traffic exceeds capacity. In the event multiple messages are sent, router can make the decision to determine which message is sent first.

38
New cards

Transmission

Last step network performs when sending a message.

39
New cards

Reception

First step when network receives message.

40
New cards

Circuit Switch Network

Requires full pathway (or circuit) to be established and maintained during entire submission.
Ex: Phone network b/c path exists during entire conversation and communication can be both ways.

41
New cards

Packet Switch Network

Message pathway established as it's sent. The choice of the pathway is determined by network availability.
Ex: Message traffic.

42
New cards

Peer to Peer

Workstation in which each computer is equal to another.
*Cheaper than other types of servers and workstations.

43
New cards

Client-Server

Client is computer that will request info from another computer (the server) .
The server takes requests and responds.
*More expensive than peer to peer.
BENEFITS: More storage=faster response time.

44
New cards

Virtual Machine

Allows access to multiple machines without having to purchase multiple computers.
Also allows user to run software for a computer that normally would not be able to run that software.

45
New cards

Network Server

Dedicated, high performance computer with large hard disk drives. It may be in a cabinet so multiple servers can be housed.
**Stand alone computer, not a desktop.

46
New cards

Information Security Assurance Goals

"CIA"
1. Confidentiality
2. Integrity
3. Availability

47
New cards

IAS Confidentiality

Requires data be kept secure so that it does not fall to unauthorized users.
It goes beyond security measures and extends to policies.
Security measures should extend beyond network. A stolen laptop should not violate confidentiality.

48
New cards

IAS Integrity

Requires data are correct.
Requires 3 different efforts:
1. Data gathering should include an accuracy component.
2. Data must be entered into system accurately.
3. Once data is in dB, changes made will leave a record of when the change was made and by whom.

49
New cards

IAS Availability

Requires data/information be available when needed.

50
New cards

Steps of Strategic Risk Analysis

1.Identify organization information assets.
2. Identify vulnerabilities.
3.Identify threats.
4.Implement policies.

51
New cards

Social Engineering

Targets users directly, could include calling and asking for password because there is an issue. Could also include phishing, which involves emails that will redirect to a malicious website.

52
New cards

SQL Injection

Hacker issues a SQL command to web server as part of URL. B/c web server is not expecting SQL command, may pass SQL command to database. Malicious SQL command may then do damage.

53
New cards

Buffer Overflow

Most well known type of software injection attack.
Because buffer is limited in size, if software doesn't ensure insertions in buffer are limited in size, sufficient amounts of malicious code could overflow buffer. Malicious overflow code could then be stored in memory and run to perform operations inserted by hacker.

54
New cards

White Hat

Ethical Hacker

55
New cards

Black Hat

Unethical Hacker

56
New cards

Grey Hat

Both ethical and unethical at times. A fence sitter.

57
New cards

Packet Sniffing

Means of obtaining a password or anything sent over network without encryption.