UNIT 5 - NETWORK (PROTOCOLS + SECURITY)

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/5

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

6 Terms

1
New cards

Network protocol

A set of rules that allow devices/ networks to communicate/ transfer data

2
New cards

TCP/IP Model:

- Application layer (HTTP/S, FTP, IMAP, SMTP) - network applications (web browsers/ email programs) operate, data encoded, formatting, added appropriate headers accroding to protocol so can be understood by recipient


- Transport Layer (TCP, UDP) - communication set up between two hosts + agree settings like language + size of packets, splits data, adds packet info (like number to specify order + total no of packet), hides diff netwrork techonoliges + architectures

- Internet Layer (IP) - addresses + packages data for transmission, routes packets across the network, attaches IP address of sender so know who sent + destination IP add

- Link Layer - nw hardware like NIC, OS device drivers, attaches MAC add of sender + recipinet so packet can be directed to specific device on LAN


UDP = simple connectionless transmission model; computer applications can send messages/ datagrams to other hosts on an IP network/ alternative to TCP but no error checking or correction -> maintains open connection between sender + recipient (often faster so used for live stream/ gaming sessions)

3
New cards

PROTOCOLS

TCP = standard that defins how messages are broken up into packetes + reassembled at desintation; detects errors + resends lost packets

IP = identifies loctaion of a device on Internet + routes the individual packets from source to destination via routers


SMTP: sends emails between servers (sending)


IMAP: stores emails on a server; retrieves emails + view + manipulate emails; email displayed on client programs/ devices (usually receiving)


HTTP: accessing/receiving web pages in form of HTML files on Internet; protocol requests web server to transmist requested web page to user's browser for viewing


HTTPS protocol:  sending/ receiving web pages; using an encrypted connection (encrypted vers of HTTP); more secure web transactions; authentication of website being visited; encryption of data between server + client; reduces likelihood of man-in-the-middle attacks


FTP = standard network protocol used to transfer files between client + server on comp network; based on client-server model + uses separate control/data connections between c + server

4
New cards

Authentication: ways of identifying a genuine, authorised user

eg: Password protection, combination of username + password, should be strong; user access levels (should be set for disks, folders, files; Read-Only, Data Protection Act says employers must keep personal data secure so legal responsibility); encryption - process of converting plaintext into ciphertext (makes data more secure, prevent being hacked -> scrambles data b4 transmission so can't be understood unless has necessary decryption tools - key, encryption algorithm)

5
New cards

Firewall

network security device that monitors incoming + outgoing network traffic; decides whether to allow or block specific traffic, based on defined set of security rites (eg: may block data from certain IPs, OS like MS Windows have fw utilies included)

6
New cards

MAC address filtering:

allows devices to access/ be blocked from accessing a network based on their physical address embedded within device's network adapter (everyone has unique, so possible to used on wireless network tool but doesn't identity to user itself only device)