Networks and the internet

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/79

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

80 Terms

1
New cards

Bandwidth

The maximum theoretical rate that data can be sent over a network connection

2
New cards

Bluetooth

a wireless technology for communication between devices that are near each other

3
New cards

caching

the process of storing images or other data on a user’s computer to increase download speed

4
New cards

circuit switching

a computer networking method that uses a dedicated and private wire

5
New cards

client

any one of the devices that is part of a network

6
New cards

data

any information that a computer can store or transmit (e.g., numbers, letters, or symbols)

7
New cards

Domain Name System

a server that matches an IP address to the domain name (DNS)

8
New cards

ethernet

a commonplace computer networking protocol used for local area networks (LANs) that use cables to connect computers and servers

9
New cards

firewall

a security tool designed to block unauthorized access to a network while allowing data to flow out to the internet

10
New cards

Internet Protocol

the principle communication protocol for the internet; provides the basis for IP addresses to communicate with one another (IP)

11
New cards

Internet Protocol Address

the numerical address associated with every website (IP address)

12
New cards

internet service provider

a company or organization that provides access to the internet (ISP)

13
New cards

intranet

a website only available on an internal network

14
New cards

load

the amount of data being requested by a network, either download or upload; also used for the act of downloading web pages and files

15
New cards

Local Area Network

a group of computers that share communication lines (LAN)

16
New cards

message switching

a computer networking method that requires you to pass your message along several different stops

17
New cards

modem

a network device that passes data between a local network to the internet

18
New cards

network

a group of interconnected computers or other devices

19
New cards

Network Interface Card

the hardware component that connects a device to the network (NIC)

20
New cards

packet

encapsulated data that can be delivered over a network

21
New cards

pixel

a small square of a single color; digital images are formed of pixels

22
New cards

protocol

a set of rules

23
New cards

router

a device that receives and sends data between devices within a network

24
New cards

routing

the selection of the path that data takes from transmitter to receiver

25
New cards

server

a computer or program that controls access to common resources; the brains of a network

26
New cards

throughput

the actual rate of data transfer

27
New cards

topology

the way a network is arranged and the various parts of the network

28
New cards

uniform resource locator

the unique web address of a resource, such as a website, accessible over the internet (URL)

29
New cards

bus topology

all devices connected to a single cable

30
New cards

business continuity planning

the plans a business makes that help it to recover from a security crisis

31
New cards

cloud

servers that are physically located at data centers and rented out to host data and websites for organizations and individuals

32
New cards

cyber-physical attack

when important infrastructure, such as electricity grids, water treatment systems, transportation systems, military defense systems, and large companies, is targeted through the use of technology

33
New cards

cybercriminal

a person who use technology to steal, defraud, harm, and extort

34
New cards

cybersecurity

the protection of technology systems and devices

35
New cards

encrypt

to scramble information or put it in secret code

36
New cards

hacking

a method cybercriminals use to break into IT systems

37
New cards

intellectual property

a person’s creations such as art and inventions

38
New cards

least privilege access

the principle that staff should only have the minimum access they need to perform their duties

39
New cards

malware

malicious software that damages and/or gains access to your computer

40
New cards

node

a single device in a network 

41
New cards

phishing

when a cybercriminal poses as a trustworthy source, such as a bank, in an attempt to obtain sensitive information

42
New cards

PPRR risk management model

a process used to manage risk that stands for prevention, preparedness, response, and recovery

43
New cards

preparedness

ensuring the necessary steps have been taken before a security incident occurs; this includes effective response and recovery plans

44
New cards

prevention

taking actions that eliminate or reduce the possibility or effects of a security breach

45
New cards

ransomware

a kind of malware that aims to scramble or encrypt data, and then demands a ransom to unscramble the data

46
New cards

recovery

the steps that must be taken to minimize recovery and disruption times

47
New cards

response

effectively containing, minimizing, and controlling the effects of a security incident

48
New cards

security configuration

how security measures are implemented and built into security systems

49
New cards

spam

digital communication, such as an email, that is sent out in bulk and is unsolicited 

50
New cards

spyware

a kind of malware used to spy on people and gather information about them

51
New cards

star topology

each device has a separate cable going to a central device

52
New cards

state-sponsored attack

when governments use cyber skills to infiltrate other governments and attack critical infrastructure

53
New cards

advanced persistent threat

a nation or state-sponsored group of people whose aim is access to computer networks and who work for a sustained period of time before being detected (APT)

54
New cards

biometric authentication

authentication credentials based on the user’s physical characteristics, such as a fingerprint or facial recognition

55
New cards

CAPTCHA

a system that confirms a user is a human and not a computer or automated system by asking questions that are easy for humans to answer but extremely difficult for computers to answer 

56
New cards

confidentiality

ensuring that only authorized users have access to sensitive data

57
New cards

information security

the methods used to protect data from unauthorized access

58
New cards

multi-factor authentication

authentication method that requires the user to provide at least two unique credentials

59
New cards

password-based authentication

the process of confirming a user’s identity by providing a username and password

60
New cards

password criteria

a policy or set of requirements for the creation of passwords that increases security

61
New cards

password management software

a program that generates and maintains strong passwords

62
New cards

personal identification number

a number used to verify an account or individual (PIN)

63
New cards

point of sale

a place at which customers pay for an item purchased (POS)

64
New cards

scam

a dishonest scheme

65
New cards

skimming

the illegal practice of stealing bank or credit card information by installing devices into bank account or credit card machine readers

66
New cards

smart card

a physical card containing an embedded memory chip supplied to a device in order to confirm a user’s identity

67
New cards

activity monitor

a Mac operating system tool that monitors computer activity, including memory, active processes, and applications

68
New cards

application

a program designed for users

69
New cards

background process

a process that runs without user interaction for running the computer

70
New cards

breach

an unauthorized break in security or protection

71
New cards

ciphertext

text that has been encrypted from plain text

72
New cards

cryptographic keys

data used to lock or unlock cryptographic functions

73
New cards

cryptography

practice of converting ordinary plain text into unintelligible text and vice-versa

74
New cards

decryption

reverting encrypted data into their original form

75
New cards

encryption

a method of converting information by scrambling data into secret code to hide the information's true meaning

76
New cards

multithreading

the ability of a central processing unit to provide multiple threads of execution concurrently

77
New cards

padlock

an image used in an address bar to indicate a secure site

78
New cards

secure coding

writing code to reduce security vulnerabilities

79
New cards

task manager

a Windows operating system tool that monitors computer activity, including memory, active processes, and applications

80
New cards

two-factor authentication

a security system that requires two distinct forms of identification in order to access an account