IT and Informatics Exam 2

0.0(0)
studied byStudied by 0 people
0.0(0)
linked notesView linked note
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

Internet

A global network of interconnected computer networks communicating using standard protocols (TCP/IP) for information sharing and communication.

2
New cards

Undersea Cables

Hair-thin fiber optic strands bundled within larger cables that connect continents, enabling global internet connectivity.

3
New cards

TCP/IP Model

A practical model with four layers used by the Internet that merges some layers of the OSI model.

4
New cards

Fiber Optic Technology

A technology that transmits data as pulses of light through thin glass or plastic fibers.

5
New cards

Network Hubs

Buildings where multiple networks interconnect physically, forming essential points for data transmission.

6
New cards

URI (Uniform Resource Identifier)

A general category of identifiers for resources, which includes URLs and URNs.

7
New cards

URL (Uniform Resource Locator)

The address used by web browsers to locate resources on the internet, following the format scheme://server/path.

8
New cards

ICMP (Internet Control Message Protocol)

A network protocol used for diagnostic purposes, including the operation of traceroute.

9
New cards

Traceroute

A network diagnostic tool that tracks the path and measures the transit time of packets across networks.

10
New cards

Navigating the Internet's Resources

The process of using URLs to access and retrieve information from the Internet.

11
New cards

Digital Attention

The divided focus between engaging with digital devices and being aware of physical surroundings.

12
New cards

Confidentiality

The principle of ensuring that sensitive information is not disclosed to unauthorized users.

13
New cards

Integrity

The assurance that information and systems are accurate and unchanged except in authorized ways.

14
New cards

Availability

The promise that authorized users have access to information and resources when needed.

15
New cards

Hypertext

A non-linear way to present information through interconnected documents and links, distinguishing it from linear text.

16
New cards

Phishing

A social engineering tactic involving fraudulent communications to obtain sensitive information.

17
New cards

Exploitation (in security context)

The act of taking advantage of weaknesses in a network or system to gain unauthorized access.

18
New cards

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.

19
New cards

Social Engineering

Manipulating people to divulge confidential information, often by exploiting trust.

20
New cards

Metadata

Data providing information about other data, illustrating details such as time, location, and participants of communication.

21
New cards

Routing

The process of selecting paths in a network along which to send network traffic.

22
New cards

Elicitation

A social engineering tactic focused on discreetly obtaining information from individuals.

23
New cards

Baiting

A tactic used in social engineering to entice targets to take undesirable actions by offering something appealing.

24
New cards

Access Policy

A set of rules defining who can access what in a network or system.

25
New cards

Defense-in-Depth

A security strategy involving multiple layers of defense to protect resources from threats.

26
New cards

Encapsulation

The process of adding headers and trailers to data as it passes down the OSI layers.

27
New cards

De-encapsulation

The process of removing headers from data as it ascends back through the OSI layers.

28
New cards

Risk Management

A process that involves identifying, evaluating, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the impact.

29
New cards

CIA Triad

A model of information security that focuses on confidentiality, integrity, and availability.

30
New cards

Server

A computer or system that provides resources, services, or data to other computers, called clients.

31
New cards

Vulnerability

A weakness in a system that can be exploited by threats to gain unauthorized access.

32
New cards

Insider Threat

A risk posed by individuals within an organization who have inside information concerning the organization's security practices.

33
New cards

User List

A list of usernames permitted access to certain resources or systems within a network.

34
New cards

Network Protocol

Set rules for data exchange over a network that governs formatting, sending, receiving, and interpreting data.

35
New cards

NIST

The National Institute of Standards and Technology, which provides guidelines for information security.

36
New cards

Error Handling

The processes in place to manage errors and omissions in systems, ensuring data integrity and system reliability.

37
New cards

Cloud Computing

The delivery of computing services over the internet, enabling on-demand access to resources.

38
New cards

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

39
New cards

Encryption

The process of converting information or data into a code to prevent unauthorized access.

40
New cards

Access Control

The method of restricting access to systems and data to authorized users only.

41
New cards

Penetration Testing

A simulated cyberattack on a system to evaluate its security and identify vulnerabilities.

42
New cards

Authentication

The process of verifying the identity of a user, device, or system.

43
New cards

Authorization

The process of granting or denying a user access to specific resources or functions.

44
New cards

TCP/IP

A set of communication protocols used for the Internet and similar networks, consisting of layers that govern how data is transmitted.

45
New cards

Link

The connection or relationship between nodes in a network.

46
New cards

Node (in a network)

Any device or point in a network that can send, receive, or forward data.

47
New cards

System Development Processes

Structured approaches to designing, implementing, and managing information systems.

48
New cards

Open Systems Interconnection Model

A standard framework for understanding how different networking protocols relate to each other.