1/39
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
LAN (Local Area Network)
It’s a network of computers within small area like room, buildings or colleges. LAN where wireless media are used is known as Wireless Local Area Network
WAN (Wide Area Network)
WAN is a a network of a computers in a wide geographical area such as a country, neighboring countries continent. A WAN can be formed by joining LANs. E.g. the internet is the largest WAN.
WPAN (Wireless personal network)
A personal area network is a computer network for connecting individuals within a limited range.A WPAN is a type of personal network that uses wireless transmission media to transfer data between a users personal device.Common devices found within a WPAN includes laptops, smart TVs, wearable tech, phones and speakers.

Network Architecture
Specifies how computers on the networks interacts and communicates with each other.
Client Server Network
Computers are connected to a central server and communication is done through it.
Server is the main computer and gives services to the work station
Serve runs the NOS (network operating system) controls LAN
Peer to Peer Network
Every computer in the network has equal right
Does not contain a file server to control the LAN
Has trust in the users and a small number of users
Virtual Private network (VPN)
A network that is constructed by using the internet to connect to a private network, such as a company’s internal network.
NIC (network interface card)
Is a component of the computer which allows it to connect to the network and “interface with it”
Hub
Serves as a central connection point for multiple computers and devices linking them together in a LAN.
Switch
A switch can read the address of of the data and send the data to the correct device. Like traffic lights.
Connectors
cables and connectors are used to transfer data
Routers
Routers used to connect to other networks also may allow wireless access to the network.
Wireless Access Point
any point which you can access a network E.g. modem or router
File Server
Server specifically set up to share documents and digital resources e.g. videos, programs
Network Protocol
Established set of rules that dictate how to format, transmit and receive data so computer network devices can communicate regardless of the differences in their underlying infrastructures, design.
TCP/IP
The TCP/IP (Transmission Control Protocol/Internet Protocol)
is a set of rules that allow communication between two
networked devices.
DDoS
a DDoS attack is an attack in which multiple compromised computer systems attack a target, such as a server, website
Security Threat
Anything that has potential to cause harm to data and information stored and in communication between information systems.
Malware
software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Virus
A computer program that reproduces it self on the same computer
Worms
Is a self replicating malware that can spread across computer systems, which can modify, corrupt or detect data and information
Trojans
Take the form of ‘free virus checking software’ when in fact they are malware and can be virus propagators
Spyware
Collects data about a users activity and sends that data to another location without the users knowledge
Brute Force Attacks
Making repetitive attempts to access an information system using variations of possible usernames and/or passwords
Encryption
Involves encoding or changing data so that it can only be decrypted by the receiver if they have the correct key.
Encryption Key
A series of bits that is used to apply an algorithm to the data packets to scramble and unscramble the data.
Symmetric Encryption
Both sender and receiver use the same private key. Sender encrypts using that private key and the receiver decrypts using that private key.
Full Backup
Copies all of the files from a device to a storage medium. It takes a long time and only performed once over a time period.
Differential Backup
Copies only the files that have been modified or changed since the last full backup.
Incremental Backup
Only copies files that have been changed since the last incremental backup.
Location of backup files
Backups should be stored in a location that is safe from theft and damage. Furthermore, backups can also be stored on the cloud away from the onsite location.
APP1
Open and transparent management of personal information. Organizations must have a clear and accessible privacy policy.
APP6
Use or disclosure of personal information. Can only use or disclose personal info for the primary purpose it was collected.
APP11
Security of personal information. Organizations are required to take reasonable measures to prevent breach.
IPP2
Personal information can only be used and disclosed for the primary purpose for which it was collected, or for a secondary purpose that be expected.
IPP4
Information must be protected from misuse. Reasonable steps must be taken to destroy or de identify personal info that is not needed anymore.
IPP5
The organization needs to be transparent about what it does with information
HPP2
Only use or disclose health info for the primary purpose for which it was collected or directly related secondary purpose. Or you would need consent.
HPP4
Safe guard the health info you hold against misuse, loss, unauthorized access and modification.
HPP5
Document clearly expressed policies on your management of health information and make this statement available to anyone who asks for it.