1/20
These flashcards cover key concepts and vocabulary related to networking and cybersecurity as discussed in Chapter 10 of the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
LAN
Local Area Network; a network that connects computers within a limited area.
Ransomware
A type of malware that locks or encrypts a user's data, demanding payment for access.
Packet Switching
A method of data transmission where messages are broken into packets and sent independently.
Botnet
A collection of compromised computers used to perform attacks under the control of a bot-herder.
CSMA/CD
Carrier Sense Multiple Access with Collision Detection; a protocol for managing data transmission in Ethernet.
Encryption
The process of converting information into a coded format to prevent unauthorized access.
Malware
Software designed to harm or exploit any programmable device or network.
Cryptography
The practice of securing information by transforming it into an unreadable format for unauthorized users.
Phishing
A method of trying to gather personal information using deceptive emails and websites.
Two-factor Authentication
A security process in which the user provides two different authentication factors to verify themselves.
Denial of Service (DoS) Attack
A malicious attempt to disrupt the normal functioning of a targeted server, service, or network.
Error Detection
Techniques used to identify errors in transmitted data, ensuring accuracy in data communication.
Network Protocols
Rules and conventions for communication between network devices.
Cybersecurity
The practice of protecting systems, networks, and programs from digital attacks.
Credential Stuffing
A cyber attack where attackers use stolen account credentials to access multiple accounts.
Multi-factor Authentication (MFA)
A security mechanism that requires more than one form of verification to authenticate a user.
RSA Encryption
A public key encryption technology widely used for secure data transmission.
Intrusion Detection System (IDS)
A device or software application that monitors networks or systems for malicious activity or policy violations.
VPN
Virtual Private Network; a service that encrypts your internet traffic and protects your online identity.
Command and Control (C2) Server
A server that issues instructions to remote systems compromised by a botnet.
Network Segmentation
The practice of splitting a computer networking into sub-networks to improve performance and security.