Networking

studied byStudied by 5 people
5.0(1)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 28

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

29 Terms

1

LAN

A collection of computers and peripheral devices connected together within a small geographical area. All of the equipment is wholly owned by the business/homes, not leased.

New cards
2

WAN

A collection of computers and LANS connected together over a large geographical area. It used infrastructure/connections leased from the third party.

New cards
3

Protocol

A set of rules that defines how devices communicate.

New cards
4

Hub

Provides physical connectivity to the LAN. Broadcasts all packets to all devices connected to that hub.

New cards
5

Switch

Provides physical connectivity to the LAN. An intelligent device that forwards packets to the appropriate device based on the MAC address.

New cards
6

Peer-to-Peer network

All the computers are equal and share resources. No central server.

New cards
7

Client-server network

Shared files and resources and on centralised servers. The networked PCs are clients that request services from these servers.

New cards
8

The Internet

A global wide are network that uses IP to transmit data.

New cards
9

Router

Connects different networks together - LANs to the internet specifically. Provides a public IP address.

New cards
10

Malware/Virus

Software designed to harm your system in some way eg : delete files. It replicates itself.

New cards
11

Hacking

Unauthorized access to a computer.

New cards
12

Brute Force Attack

Working through all the possible passwords or code numbers until one is successful.

New cards
13

Denial of Service Attack

Attempting to stop legitimate users accessing services or a website by flooding it with messages.

New cards
14

Data interception

Remote theft by accessing accounts using acquired securtiy systems.

New cards
15

SQL injection

Putting SQL code into a database to acquire data e.g. a list of usernames and passwords

New cards
16

Penetration testing

Attempting to break into a systems to identify points of weakness.

New cards
17

Anit-malware software

Prevents harmful prgrams being installed. Detects and removes malware.

New cards
18

Firewall

Hardware or software that protects a network from unarthourised access using filters based on IP addresses, named websites and types of files.

New cards
19

User authentication

Using a username and password to check a user is authorised/who they say they are.

New cards
20

User access levels/rights

Define whether a user can see a file/folder at all, whether they just read from it (RO) or also wrtie to it (RW). Other access rights include write only and execute.

New cards
21

Physical security

This includes locked rooms, CCTV, guards, barrirs etc.

New cards
22

Plain text

The original un-encrypted message.

New cards
23

Cypher text

The encrypted message

New cards
24

Encryption

The process of converting plain text to cypher text, encoding.

New cards
25

Decryption

The process of converting cypher text to plain text, decoding.

New cards
26

Character Set

The set of symbols that can be represented by a comuter. Each character is represented by a unique numerical code that is stored as a binary integer.

New cards
27

ASCII

A character set that uses 7 or 8 btis to encode each character.

New cards
28

Unicode

A character set that uses at least 16 bits to encode each character.

New cards
29

New cards

Explore top notes

note Note
studied byStudied by 5 people
639 days ago
5.0(1)
note Note
studied byStudied by 12 people
825 days ago
5.0(1)
note Note
studied byStudied by 8 people
252 days ago
5.0(1)
note Note
studied byStudied by 8 people
134 days ago
5.0(1)
note Note
studied byStudied by 38 people
341 days ago
5.0(1)
note Note
studied byStudied by 20 people
992 days ago
5.0(2)
note Note
studied byStudied by 14 people
252 days ago
5.0(1)
note Note
studied byStudied by 198 people
710 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (41)
studied byStudied by 186 people
458 days ago
5.0(1)
flashcards Flashcard (133)
studied byStudied by 3 people
547 days ago
5.0(1)
flashcards Flashcard (52)
studied byStudied by 9 people
557 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 3 people
749 days ago
5.0(1)
flashcards Flashcard (34)
studied byStudied by 93 people
120 days ago
5.0(1)
flashcards Flashcard (45)
studied byStudied by 55 people
461 days ago
5.0(3)
flashcards Flashcard (63)
studied byStudied by 2 people
568 days ago
5.0(1)
flashcards Flashcard (58)
studied byStudied by 351 people
832 days ago
5.0(8)
robot