Networking

5.0(1)
studied byStudied by 5 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

LAN

A collection of computers and peripheral devices connected together within a small geographical area. All of the equipment is wholly owned by the business/homes, not leased.

2
New cards

WAN

A collection of computers and LANS connected together over a large geographical area. It used infrastructure/connections leased from the third party.

3
New cards

Protocol

A set of rules that defines how devices communicate.

4
New cards

Hub

Provides physical connectivity to the LAN. Broadcasts all packets to all devices connected to that hub.

5
New cards

Switch

Provides physical connectivity to the LAN. An intelligent device that forwards packets to the appropriate device based on the MAC address.

6
New cards

Peer-to-Peer network

All the computers are equal and share resources. No central server.

7
New cards

Client-server network

Shared files and resources and on centralised servers. The networked PCs are clients that request services from these servers.

8
New cards

The Internet

A global wide are network that uses IP to transmit data.

9
New cards

Router

Connects different networks together - LANs to the internet specifically. Provides a public IP address.

10
New cards

Malware/Virus

Software designed to harm your system in some way eg : delete files. It replicates itself.

11
New cards

Hacking

Unauthorized access to a computer.

12
New cards

Brute Force Attack

Working through all the possible passwords or code numbers until one is successful.

13
New cards

Denial of Service Attack

Attempting to stop legitimate users accessing services or a website by flooding it with messages.

14
New cards

Data interception

Remote theft by accessing accounts using acquired securtiy systems.

15
New cards

SQL injection

Putting SQL code into a database to acquire data e.g. a list of usernames and passwords

16
New cards

Penetration testing

Attempting to break into a systems to identify points of weakness.

17
New cards

Anit-malware software

Prevents harmful prgrams being installed. Detects and removes malware.

18
New cards

Firewall

Hardware or software that protects a network from unarthourised access using filters based on IP addresses, named websites and types of files.

19
New cards

User authentication

Using a username and password to check a user is authorised/who they say they are.

20
New cards

User access levels/rights

Define whether a user can see a file/folder at all, whether they just read from it (RO) or also wrtie to it (RW). Other access rights include write only and execute.

21
New cards

Physical security

This includes locked rooms, CCTV, guards, barrirs etc.

22
New cards

Plain text

The original un-encrypted message.

23
New cards

Cypher text

The encrypted message

24
New cards

Encryption

The process of converting plain text to cypher text, encoding.

25
New cards

Decryption

The process of converting cypher text to plain text, decoding.

26
New cards

Character Set

The set of symbols that can be represented by a comuter. Each character is represented by a unique numerical code that is stored as a binary integer.

27
New cards

ASCII

A character set that uses 7 or 8 btis to encode each character.

28
New cards

Unicode

A character set that uses at least 16 bits to encode each character.

29
New cards