Chapter 10: Connecting Computers

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts and vocabulary related to networking and cybersecurity as discussed in Chapter 10 of the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

LAN

Local Area Network; a network that connects computers within a limited area.

2
New cards

Ransomware

A type of malware that locks or encrypts a user's data, demanding payment for access.

3
New cards

Packet Switching

A method of data transmission where messages are broken into packets and sent independently.

4
New cards

Botnet

A collection of compromised computers used to perform attacks under the control of a bot-herder.

5
New cards

CSMA/CD

Carrier Sense Multiple Access with Collision Detection; a protocol for managing data transmission in Ethernet.

6
New cards

Encryption

The process of converting information into a coded format to prevent unauthorized access.

7
New cards

Malware

Software designed to harm or exploit any programmable device or network.

8
New cards

Cryptography

The practice of securing information by transforming it into an unreadable format for unauthorized users.

9
New cards

Phishing

A method of trying to gather personal information using deceptive emails and websites.

10
New cards

Two-factor Authentication

A security process in which the user provides two different authentication factors to verify themselves.

11
New cards

Denial of Service (DoS) Attack

A malicious attempt to disrupt the normal functioning of a targeted server, service, or network.

12
New cards

Error Detection

Techniques used to identify errors in transmitted data, ensuring accuracy in data communication.

13
New cards

Network Protocols

Rules and conventions for communication between network devices.

14
New cards

Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks.

15
New cards

Credential Stuffing

A cyber attack where attackers use stolen account credentials to access multiple accounts.

16
New cards

Multi-factor Authentication (MFA)

A security mechanism that requires more than one form of verification to authenticate a user.

17
New cards

RSA Encryption

A public key encryption technology widely used for secure data transmission.

18
New cards

Intrusion Detection System (IDS)

A device or software application that monitors networks or systems for malicious activity or policy violations.

19
New cards

VPN

Virtual Private Network; a service that encrypts your internet traffic and protects your online identity.

20
New cards

Command and Control (C2) Server

A server that issues instructions to remote systems compromised by a botnet.

21
New cards

Network Segmentation

The practice of splitting a computer networking into sub-networks to improve performance and security.