Unit 4: Network Security Edexcel GCSE Computer Science

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/68

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

69 Terms

1
New cards

LAN

A network of computers covering a small geographical area located on a single site

2
New cards

WAN

Covers a large geographical area connecting LANs. Uses 3rd party infrastructure (BT cables, etc). (The internet is an example of this.)

3
New cards

MAC address

Media Access Control: Each unique piece of hardware on a network has this type of address.

4
New cards

Packet Switching

A method of transferring data by breaking it into small chunks called packets.

5
New cards

Server

A computer that holds data to be shared with other computers (A web server stores and shares websites)

6
New cards

WWW

World Wide Web: All the interlinked HTML pages that can be accessed over the Internet

7
New cards

The internet

Global communication network that allows computers to connect and exchange information

8
New cards

Firewall

Network security system that checks incoming and outgoing data, using a set of rules, deciding whether to allow the data from entering or leaving the network

9
New cards

Hacking

The act of gaining unauthorised access to a computer system and its data

10
New cards

Malware

Malicious software - intended to harm or disrupt a computer system

11
New cards

Protocols

sets of rules that networks rely on to allow different devices to communicate with each other

12
New cards

Baiting

Persuading victims with something desirable, such as a free download, to trick them into downloading malware.

13
New cards

Phishing

When attackers trick individuals into revealing sensitive information by posing as trustworthy entities via email or messages.

14
New cards

Quid pro quo

Offering a service or benefit in exchange for sensitive information (e.g. promising IT assistance in return for login credentials.)

15
New cards

Pretexting

Attackers create a fake scenario to gain someone's trust and extract sensitive information (e.g. pretending to be a coworker to obtain company data)

16
New cards

Social engineering

Hackers use their social skills to trick people into revealing access credentials or other valuable information

17
New cards

Access control

In security terms, the process of determining and assigning privileges to various resources and data.

18
New cards

Penetration testing

simulating hacking the system by attempting to find and exploit vulnerabilities (without causing harm)

19
New cards

White box pen testing

Tester has perfect knowledge of the system, the insider's perspective

20
New cards

Black box pen testing

The tester knows nothing about the systems under attack - outsiders perspective

21
New cards

Biometric authentication

Uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users

22
New cards

Examples of Physical security

CCTV cameras

Security guards

Door locks

23
New cards

Password policies

Ensures passwords meet minimum requirements and are changed regularly.

24
New cards

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

25
New cards

Data integrity

The correctness of data after processing, storage or transmission.

26
New cards

Denial of service

An availability attack, to consume resources to the point of exhaustion

27
New cards

Backup and recovery procedures

Critical data and files can be retrieved if they become lost or corrupt. Backups can be set up to be automatic, based on a schedule, manual, incremental or full.

28
New cards

Ethical hacking

When an expert is employed to penetrate a computer system in order to find security vulnerabilities

29
New cards

Authentication

A method for confirming users' identities

30
New cards

Principle of Least Privilege

A security discipline that requires that a user, system, or application be given no more privilege than necessary to perform its function or job.

31
New cards

File permissions

The use of user and file attributes that control which users can read, write, move, or delete each file.

32
New cards

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

33
New cards

Multi-factor authentication (MFA)

A type of authentication that requires more than just a password for account access. Involves two or more of the types of authentication (something you know - password, etc, something about you - fingerprint, etc, something you have - keycard, etc)

34
New cards

Advantages of networking

users can share files

users can share peripherals

users can access their files from any computer on the network

35
New cards

Disadvantages to networking

increased security risks to data

malware and viruses can spread easily between computers

if a server fails, connected computers may not work

36
New cards

How is data sent across a network?

Data is split up into packets for transmission
The header of each packet contains a source and destination IP

It also contains a sequence ID, which means packets can be reassembled into the correct order

37
New cards

Range

The maximum distance a transmission can travel before becoming degraded.

38
New cards

Latency

The time it takes between a transmission being sent and recieved.

39
New cards

Bandwidth

The maximum amount of data that can be transferred per second.

40
New cards

Wired network aspects

More reliable and secure

Transfer data at faster speeds

Require additional cabling

41
New cards

Wireless network aspects

No need for physical connection

Less reliable

Lower transfer speeds

42
New cards

Speed

The transfer rate of data from a source to a destination (measured in bits per second)

43
New cards

Ethernet

Family of related protocols providing the basics of communication over a LAN

44
New cards

Wi-Fi

Family of related protocols for wireless communication

45
New cards

Protocols for communication over LANs and WANs

TCP (Transmission Control Protocol) - provides an error free transmission between two routers

IP (Internet Protocol) - Routes packets across a WAN

46
New cards

Webpage protocols

HTTP (Hypertext Transfer Protocol) - A client-sever method of requesting and delivering HTML web pages

HTTPS - Encryption and authentication for requesting and delivering HTML web pages

47
New cards

Email protocols

STMP (Simple Mail Transfer Protocol) - Sends an email to the mail server and from one mail server to another mail server

POP3 (Post office protocol v3) - downloads the mail and deletes it off the server

IMAP (Internet Message Access Protocol) - used to download email from the mail server

48
New cards

File transfer protocol (FTP)

transfers files between the FTP client and FTP servers

49
New cards

Advantages of layering

Reduces complexity of a problem into sub-problems

Devices can be manufactured to operate at a specific layer

50
New cards

What protocol operates at the Application layer?

(any one from) FTP, HTTP, HTTPS, STMP, POP3 IMAP

51
New cards

What protocol operates at the Transport layer?

TCP

52
New cards

What protocol operates at the Internet layer?

IP

53
New cards

What protocol operates at the Link layer?

Ethernet or Wi-Fi

54
New cards

What is the function of the application layer?

the appropriate protocol is selected based on which application is running (e.g. email client, web client (browser), FTP client)

55
New cards

What is the function of the transport layer?

  • When sending, data is split up into packets, a sequence number and checksum is added to the header of each packet

  • When receiving, reassembles packets in the correct order using their sequence numbers and requests for missing packets to be resent

  • overall, TCP establishes a connection between devices and ensures that is sent without errors

56
New cards

What is the function of the Internet layer (IP protocol) / router ?

  1. looks at the destination IP address of the packet

  2. uses a routing table to decide which router to forward the packet to

  3. sends the packet to the chosen next router

  • overall, packets are sent from source to destination through the fastest pathway possible

57
New cards

What is the function of the Link layer?

sends one packet a time from one node (device, router) to the next

58
New cards

Advantages of a Star topology

If one connection fails, all other devices will continue to operate

It is easy to add new devices without disrupting the network

59
New cards

Disadvantages of a star topology

If the central switch fails, the entire network will shut down

Requires a lot of cabling, which can be expensive

60
New cards

Advantages of a mesh topology

new devices can be added without interruption or interfering with other devices

messages should always get through as they have many possible routes on which to travel

61
New cards

Disadvantages of a mesh topology

overall cost is high because much more cable is required

many connections require a lot of maintenance

62
New cards

Advantages of bus topology

Easy to set up

Relatively cheap to install because little cabling is needed

63
New cards

Disadvantages of bus topology

The whole network will fail if a terminator is removed

if the main cable fails, the whole network will fail

64
New cards

System vulnerabilities caused by people

Not installing latest OS updates

Not keeping anti-malware up to date

Not logging off computers

65
New cards

Describe how a checksum is used to identify packets that have been corrupted

  • A checksum formula is applied to the packet before it leaves the source computer

  • At the receiving end, the same checksum formula is reapplied

  • The new checksum is compared to the received checksum in the packet header

  • If the checksums do not match, a resend request is sent

66
New cards

White hat hacker

a person assigned to try and hack a server in attempt to find vulnerabilities so they can be fixed

67
New cards

Methods of protecting networks

Firewalls

Physical security

Access control

68
New cards

What is access control

Used to control permissions in users and files

69
New cards

Levels of access control

read only

read/write

execute

full access (can edit access levels of other users)