* network of networks in which host computers are connected by routers * governed by the Internet Protocol Suite * based on open *standards*, enabling it to grow exponentially
2
New cards
protocol
system of rules that govern the behavior of a system
3
New cards
SMTP/POP
system of rules that govern email services
4
New cards
TCP/IP
routes messages between the clients & servers finding a path from the sender to the receiver
5
New cards
SSL (Secure Socket Layer)
protocol that establishes an encrypted link between a web server & a browser.
6
New cards
HTTP
* system of rules that govern the WWW application * ensures secure, trusted, encrypted communication over the Internet
7
New cards
World Wide Web (WWW)
Internet application that is based on HTTP
8
New cards
URI (Uniform Resource Identifier)
uniquely identifies a resource on the WWW
9
New cards
HTML
language used to code Web pages
10
New cards
digital divide
* gap between those who have access to the Internet & computers with those who do not * usually affected by socioeconomic, geographic, or demographic characteristics
11
New cards
bandwidth (throughput)
* rate at which data is downloaded/uploaded in a network * measured in bits per second, kilobits per second, or megabits per second
12
New cards
latency
* measure of the amount of time it takes for a piece of data to reach its destination * measured in milliseconds
13
New cards
ping
networking utility used to measure latency on the Internet/reachability of a host
14
New cards
traceroute
networking utility used to trace the route of & measure delays of packets moving through the Internet
15
New cards
broadband
high speed Internet service that is always on, typically through cable/DSL modems
16
New cards
Internet Service Provider (ISP)
company that provides customers with Internet access
17
New cards
network
group of 2 or more computers linked together
18
New cards
routing
The process of finding a path from sender to receiver.
19
New cards
router
transmits data between 2 different networks
20
New cards
enterprise-level router
connects the ISP to the core Internet backbone routers
21
New cards
home router
connects local devices to a cable modem
22
New cards
cable modem (DSL modem)
connects a home to an Internet Service Provider (ISP)
23
New cards
local area network (LAN)
connects computers within a small area i.e. home/school
24
New cards
wifi (wifi network)
uses radiowaves to connect devices
25
New cards
wide area network (WAN)
connects devices over a broad geographic region
26
New cards
internetwork (internet \[small “i”\])
collection of disparate networks that are connected together via routers
27
New cards
ethernet
uses wires to connect computers
28
New cards
fault-tolerant network
continues operating in the event of failure of 1 or more of its components
29
New cards
circuit-switched network
contains a dedicated channel between A & B
30
New cards
packet-switched network
contains no sustained connection between A & B
31
New cards
redundancy
* The inclusion of extra components that can be used to mitigate the failure of a system if other components fail * Network redundancy can be accomplished by having more than 1 path between any 2 connected devices
32
New cards
firewall
barrier that protects a network from unauthorized access
33
New cards
computing system
group of computing devices & programs working together for a common purpose
34
New cards
client
computer/software application that requests services from a server located on the internet i.e. web browser
35
New cards
server
host that provides a service i.e. Google’s Gmail service
36
New cards
host
computer that is connected to the Internet i.e. servers
37
New cards
port
memory location in a server’s RAM that is connected to software that listens for incoming requests
38
New cards
scalability
capability of a system to change in size & scale to meet new demands
39
New cards
packet
* fixed collection of data used by TCP/IP protocol to transmit data across the Internet * contains routing data & content of the message
40
New cards
packet switching
Method in which information is transmitted through the Internet via breaking the information into packets & routing it independently from source to destination
41
New cards
packet sniffer
* Software used by network administrators to monitor data being transmitted over a network. * Can be used to steal email messages and other information
42
New cards
Application Layer
* Composes a message & passes it to the Transport Layer * Receives other messages passed on from the Transport Layer
43
New cards
Transport Layer
* Splits a message into packets, adds TCP headers to number the packets, & sends it to the Internet Layer * Receives packets from the Internet Layer, places them in order, & passes it to the Application Layer when all is received
44
New cards
Internet Layer
* Adds the destination IP address to each packet & passes it to the Link Layer * Receives packets from the Link Layer & checks to see if it is their IP address * If it is, it passes it to the Transport Layer * If not, it sends it back to the Link Layer to pass on to another IP address
45
New cards
Link Layer
* Sends the individual packets to the Link Layers of other IP addresses * Receives packets from other addresses & passes them to the Internet Layer
46
New cards
IP address
String of numbers separated by periods that identifies each computer using Internet Protocol to communicate over a network
47
New cards
IPv4
32-bit dotted decimal notation IP address
48
New cards
IPv6
128-bit hexadecimal notation IP address
49
New cards
domain name
hierarchical name that identifies a domain & institution on the Internet i.e. .com, .edu, .gov
50
New cards
hostname
domain name that is associated with an IP address
51
New cards
Domain Name System (DNS)
Internet service that translates domain names into IP addresses
52
New cards
routing table
used to look up a domain name & find its corresponding IP address
53
New cards
cryptography
* “secret writing” * art & science of writing secret messages
54
New cards
public key cryptography
uses two keys: a public key known to everyone & a private/secret key known only to the recipient of the message.
55
New cards
plaintext
unencrypted, readable message
56
New cards
ciphertext
unreadable, secret message
57
New cards
encryption
process of using a secret key to convert plaintext into ciphertext
58
New cards
decryption
process of using a secret key to convert ciphertext into plaintext
59
New cards
encryption key
piece of secret data used by encryption & decryption algorithms
60
New cards
encryption algorithm
uses a secret key to encrypt messages
61
New cards
symmetric encryption
the same key is used for encryption and decryption
62
New cards
asymmetric encryption
separate but related keys are used for encryption & decryption.
63
New cards
diffie-hellman
* algorithm used to establish a shared secret between two parties * primarily used to exchange a symmetric key among 2 parties
64
New cards
cipher
system for creating a new alphabet/secret messages
65
New cards
substitution cipher
letters from a ciphertext alphabet are substituted for letters in a plaintext message systematically
66
New cards
Caesar cipher
shifts the alphabet by 3 letters to create cipher alphabet, substituting plain letters with shifted letters
67
New cards
Vigenere cipher (polyalphabetic substitution)
uses multiple alphabets to encrypt a message
68
New cards
transposition cipher
letters are rearranged in a plaintext message without substitution
69
New cards
frequency analysis
The counting of the occurrence of letters in an encrypted message in an effort to discover patterns that might reveal its encryption key
70
New cards
one time pad
Perfect (unbreakable) encryption that is achieved by using a single-use random polyalphabetic key that is as long as the message itself
71
New cards
key exchange problem
problem of sharing a secret cryptographic key between Alice and Bob without Eve being able to intercept it
72
New cards
RSA (Rivest-Shamir-Adleman)
* Cryptosystem used for public-key encryption * Widely used for securing sensitive data sent over an insecure network like the Internet. * Based on a one-way function (m^e mod N→c)
73
New cards
strong password
A series of characters that is easy for a user to remember, but would be difficult for someone else to guess based on knowledge of that user.
74
New cards
bug
error in computer hardware/software
75
New cards
syntax error
An error that results from a violation of a programming language’s grammatical rules.
76
New cards
semantic error
error in which the program is not working as it is designed to work.
77
New cards
run-time error
mistake in the program that occurs during the execution of a program.
78
New cards
debugging
process of removing errors from computer hardware/software
79
New cards
malware
Software intended to damage a computing system or to take partial control over its operation.
80
New cards
malware scanning software
Software that helps protect a computing system against malware infections.
81
New cards
ransomware
malware that encrypts & locks computer systems until a ransom is paid.
82
New cards
Trojan horse
a malicious program that disguises itself as a useful program that unsuspecting users download.
83
New cards
virus
* a malicious program that can copy itself & gain access to a computer in an unauthorized way * often attach themselves to legitimate programs and start running independently on a computer.
84
New cards
worm
a malicious program that spreads by itself through networks of computers
85
New cards
phishing
technique used to trick a user into providing personal information usually through email.
86
New cards
rogue access point
Gives unauthorized access to secure networks wirelessly.
87
New cards
trust model
The use of a trusted third party to verify the trustworthiness of a digital certificate.
88
New cards
certificate authority
entity that issues digital certificates.
89
New cards
digital certificate
data packet that certifies the holder of a public key.
90
New cards
keylogger
Program used to record every keystroke made by a computer user in order to gain fraudulent access to passwords & other confidential information
91
New cards
biometrics
use of unique physical characteristics i.e. finger prints, face recognition for identification
92
New cards
multi-factor authentication (MFA)
Method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence i.e. knowledge, possession, and/or inherence
93
New cards
function
procedure that computes & returns a value
94
New cards
local variable
variables that are declared & exist only within a procedure or function (scope)
95
New cards
crowdsourcing
practice of obtaining input/information from a large group of people via the Internet