1/30
networking, social engineering.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Malware
an umbrella term for lots of bad things that can harm your phone, computer or the likes
Virus
a piece of code that can copy itself and corrupts the system and destroys data with a bad effect. A virus relies on a posta piece of code that can copy itself and corrupts the system and destroys data with a bad effect. A virus relies on a post. Spreads through malicious intent, clicking on a bad file, or when your computer has a security weakness.
Trojan
appears safe but is malicious, installs a backdoor into your system and can lead to worse things. Usually spreads by downloading sketchy files
Worm
similar to a virus but doesnt need a post to spread, so it can copy itself and email it to other people
Ransomware
encrypts data and demands payment to give it back. Usually gotten through emails or downloads.
Keylogger
Tracks what keys are typed, can find credit card numbers or other important information. Usually downloaded through a trojan
Social engineering
manipulating a person into giving information or doing something unsafe
Phishing
scam messages designed to trick people into clicking links, downloading files or giving away personal information
Blagging / pretexting
pretending to be someone trustworthy in order to get information
Impersonation
pretending to be another person or organisation
urgency
rushing people to make a decision
Authority
pretending to be someone important like a bank.
strong password
A password that is difficult to guess
Passphrase
A long password that is made of multiple words
Mfa
extra security using something only you have
Authentication
proving who you are
Antivirus
Software that deceived and removes malware
Update
something that fixes security
Backup
a copy of data that is stored elsewhere
Network
a connection of devices That can share resources
Advantages and disadvantages
Shared Peripherals: Using one high-quality printer for the whole office.
Cybersecurity Risks: Hackers trying to steal data through the connection.
Centralised Backups: The server automatically saves everyone's work at 9 PM.
Network Traffic: If everyone watches YouTube at once, the connection slows down.
Roaming Profiles: You can log into any computer in school and see your files.
High Initial Cost: Buying expensive cables, switches, and servers to start with.
Centralised Software: Installing a new app on 200 PCs at once from one desk.
Malware Spread: A virus on one computer can quickly infect the whole building.
Dependency: If the main server crashes, no one can do their work.
Communication: Sending instant messages or emails to anyone on the netw
Lan
network in home or school, you own it, it is faster than wan, smaller geographical area.
Wan
Covers a large area, larger geographical area, flowers, leased
Wired internet
uses Ethernet, faster than wireless network and has less latency.
Wireless network
easier to set up and cheaper than wired network, also allows movement
Bandwidth
The amount of data that can be transferred
Network topology
The way devices are arranged in a network
Node
a device or client that is connected in the hardware
Star topology
when all devices are connected in a central switch
bus topology
when all the devices are connected to one main wire
mesh topology
Connect all devices to each other so there are multiple routes from each device to another. Partial mesh + full mesh