1 | Network | A series of interconnected nodes (connection points) that are able to transmit, receive and exchange data |
2 | Personal area network (PAN) | The smallest type of network, consisting of the connected devices that are in close proximity to an individual |
3 | Local area network (LAN) | A group of computers or devices that are connected on a single site |
4 | Metropolitan area network (MAN) | A network that covers a larger geographical area, such as city |
5 | Wide area network (WAN) | A national or international network; example is internet |
6 | Wireless networks | Use of wireless technologies to connect the different nodes to form a network (eg : uses radio signals) |
7 | Cloud network | Incorporation of network capabilities either public or private cloud platform |
8 | Client-server networks | A type of network where data is stored centrally on a server and access is given to each device (client) connected to the network. |
9 | Peer-to-peer network | A decentralized network in which each computer is equally responsible for storing and sharing data |
10 | Network interface card | Device responsible for converting data into a digital signal and communicating this data to a network |
11 | MAC address | A unique identifier assigned to every piece of hardware |
12 | Router | A networking technology that transfers data from one network to another by the most efficient route available |
13 | Modem | A device that converts digital data into analogue data so that it can be transmitted over a telephone line |
14 | Wireless access point (WAP) | A device that creates a wireless local area network to improve coverage throughout a building. |
15 | Hub | A networking device that broadcasts data to all devices on the network. |
16 | Switch | A networking device that forwards data packets more efficiently than a hub. |
17 | Interoperability | Allows different digital technologies or systems to connect and exchange data with one another without restrictions. |
18 | Network protocol | A set of agreed rules that state how to format, send and receive data |
19 | Transmission control protocol/ internet protocol (TCP/IP) | Protocol that defines where data is to be sent to and from (IP), and how the data is to be broken down into packets before sending (TCP) |
20 | IP (internet protocol) address | A logical numeric address that is assigned to every node on a network |
21 | Domain name server (DNS) | A server that translates domain names into IP addresses |
22 | Bandwidth | The maximum rate of data transfer at any one time, measured in hertz (Hz) |
23 | Speed | The length of time it takes for data to be transferred, measured in megabits per second (Mbps). |
24 | Data compression | Process that reduces the size of a file by reencoding it to use fewer bits of storage than the original file. |
25 | Net neutrality | all data requests on the internet should be treated equally by the internet service providers (ISPs) ~ internet should be free equally |
26 | Multi-factor authentication | The use of multiple methods of authentication to verify a user’s identity |
27 | Firewall | Hardware or software designed to block unauthorized access to a network by inspecting incoming and outgoing network traffic |
28 | Proxy server | Computer system that acts as an intermediary between the client on the network and the internet; providing an additional layer of security |
29 | Mobile service provider (MSP) | A company that offers cellular connection to mobile phone subscribers |
30 | VoIP (voice over internet protocol) | Allows users to make voice calls using a broadband Internet connection instead of an analogue phone line. |
31 | Internet service provider (ISP) | A company that provides internet access and other related services to its customers |
32 | Internet | The global collection of networks and networking technologies that link billions of users worldwide. |
33 | World Wide Web (WWW): | The websites and web services that are hosted on web servers and identified by their URL (uniform resource locator). |
34 | Internet of things (IoT) | Internet-connected devices that collect and share data |
35 | Spamming | Sending unsolicited emails, mainly for the purpose of advertising |
36 | Hacking | Unauthorized access to a computer or network |
37 | Social engineering | In internet security, this means to manipulate a user into sharing confidential or personal information with a fraudster - impersonate |
38 | Phishing | A type of social engineering that involves sending fraudulent emails designed to trick users into revealing sensitive information |
39 | Virus | A type of malicious software comprised of small pieces of code, often attached to legitimate programs or emails |
40 | Ransomware | Malware that infects a computer and effectively locks the user out of their own device and demands a payment to unlock it. |
41 | Distributed denial of service (DDOS) attacks | Overwhelming a site or service so that it is not available to its intended users. (attack to one’s server until its shut down) |
42 | Anonymity | The use of digital technology to conceal a person’s true identity |
43 | Internet trolls | People who leave intentionally provocative or offensive messages online in order to get attention, cause trouble or upset someone. |
44 | Identity theft | When someone steals your personal information with the intention of committing fraud. They may use your information to apply for a credit card or gain access to medical services. |