0% found this document useful (0 votes)
28 views36 pages

Unit 3 - Networks Flashcards

Uploaded by

daira.nav.alv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views36 pages

Unit 3 - Networks Flashcards

Uploaded by

daira.nav.alv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

DDOS

Botnet

Phishing

Social Engineering
Where multiple devices are used to attack a server across
the internet

a number of internet connected devices controlled by a


hacker

Where an email or website tries to imitate a genuine


website in order to get the user to divulge personal
information

Tricking a person into giving up personal information of


compromising the security of a system of device.
Interception

Brute Force

SQL Injection

Poor Network Policy


Where data is captured on enroute and decrypted

A password attack that targets short of insecure passwords

Where databases are attacked by exploiting poor coding

Examples include allowing weak passwords or unlimited


password attempts
Network Forensics

Anti-Malware

Firewall

User Access Levels


where network logs and other tracking is used to detect
attacks

Software that detects and removes unwanted software

A device that blocks certain incoming and outgoing


packets, using a set of rules

Restricting users so that they can only load resources that


they are allowed
Password

Encryption

Dictionary Attack

Malware
a series of letters,numbers and characters that are used to
access a system

Where is scrambled when stored and transmitted so that it


can only be read be the intended recipient

A password attack that targets commonly used passwords

Software that often includes other unwanted software or


features, often serving unwanted adverts.
Penetration Testing

Rootkit

Spyware

Worm
Paying a person or company to attempt to break into your
network or discover vulnerabilities

Software that installs on the boot sector of a computer,


bypassing virus protection

Software that tracks your browsing and other data

Self replicating network virus


Crimeware

Trojan

Anti-virus

Input Sanitization
software that restricts access to a computer of files for
purposes of blackmail

A type of virus hidden inside of a legitimate program

Software that detects hidden malicious software

Checking and removing malicious data inputs to prevent


SQL Injection
Switch

Router

Server

Web Server
A network device design to forward packets on to their
correct location within a network using the device's MAC
address.

A network device design to act as an interface between 2


different types of network. Often also contains a firewall.

A computer that manages access to centralised resources


within a network, such as printer and internet access.

A computer that hosts an externally accessible website.


When you load a website on your computer, your web
page request is served by the server.
File Server

Authentication Server

Ethernet

WIFI
A computer that hosts centrally managed files and folders.
This allows users to access their files from any networked
computer.

A computer that is responsible for controlling network


resources access for users.

A fast wired networking cable technology that is the


industry standard in most offices.

A wireless networking technology that transmits data using


radio waves.
Wireless Access Point

Bluetooth

WPA / WPA2

WEP
A networking devices that provides an interface between
wired and wireless networks. Allows devices to connect
wirelessly to a wired network.

A wireless networking technology that is usually used to


connect peripheral to devices wirelessly.

Wireless encryption standard used to protect data


transmitted wirelessly. More secure than WEP.

Older wireless encryption standard used to protect data


transmitted wirelessly. Less secure than WPA/WPA2
DNS

ISP

Fibre Optics

Bridge
Domain Name Server. Used to translate website URLS
(e.g. www.google.co.uk) to IP addresses (e.g.
203.101.101.90)

Internet Service Provider. All networks connect to the


internet via an Internet Service Provider

Network transmission media that uses light to transmit


data along glass fiber strands. Very high speed and large
bandwidth.

A device used to connect 2 similar networks together.


Usually used to connect 2 separate LANs into a WAN
Packet

Packet Switching

Latency

Protocol
Data sent from one computer to another is broken down
into pieces, known as packets. Packets contain data, sender
and receiver ip, data type information etc.

Breaking a large packet down into smaller packets and


sending each packet individually across the internet.
Packets are then reassembled at the other end.

The time it takes to receive a response from a web server


after a packet has been sent. Lower latency is better

An agreed set of rules that hardware or software follow


when preparing, encrypting or transmitting data across a
network.
HTTP

HTTPS

FTP

SMTP
Hypertext Transfer Protocol. The set of the rules
computers using when transmitting and receiving web
page data

Hypertext Transfer Protocol Secure. A secure version of


HTTP, used for displaying webpage content securely.

File Transfer Protocol. The set of rules computers using


when sending or uploading files.

Simple Mail Transfer Protocol. The set of rules computers


use when sending emails.
IMAP

TCP/IP

Layers

Domain Name
Internet Message Access Protocol. The set of rules
computers use when accessing email accounts.

Transmission Control Protocol / Internet Protocol. The 2


main protocols used to control the sending over packets of
data across a network

The Open Systems Interconnect model breaks down


network communication into a number of layers. Each
layer has its own protocols and devices that function at that
layer.

The Human Readable address for a website, such as


Google.com. Needs to be matched with an IP address for a
packet to be sent.
MAC Address

SSL

LAN

WAN
Machine Address Code. A fixed unique hexadecimal code
issued to every piece of network hardware. Used by
switches when forwarding packets.

Secure Socket Layer. Encryption Protocol used in


conjunction with HTTPS to establish a secure connection
to a website.

Local Area Network. A wired/wireless collection of


connected machines, located in one physical location,such
as an office building

Wide Area Network. A number of linked LANs, using


over a wide area, such as a university campus.
Internet

World Wide Web

Client - Server

Peer to Peer
An international network of interconnected LANs and
WANs

The global collection of HTML web pages, linked together


by Anchor links and accessed using a Web Browsers

A centralised network where access to resources is


controlled by the server.

A decentralized network where all connected devices have


equal access to resources. Less secure than a Client-Server
Network but easier and cheaper to setup.
Wifi Frequency

Wifi Channel

Star Network

Mesh Network
The wavelength used by a particular wifi device.

Wifi devices can choose which channel to operate on (e.g.


from 1 to 11). Multiple networks operating on the same
channel will result in a slow connection

The topology used by Client-Server networks

The topology used to Peer to peer networks. Each device


acts a node on the network and forwards on packets to
other devices in range
Packet Switching

Network Performance

The cloud

Transmission Media
Breaking a large packet down into smaller packets before
sending them across a network. Packet travel
independently and then are reassembled at the receiving
end.

How fast and reliably data is sent around a network.


Affected by technology used (wired / wireless), number of
clients, type of data being sent (email vs video)

Offsite storage, only accessible when the computer has


access to the internet. Often not stored in a single
locations.

The physical hardware along which data is sent. Includes


Ethernet, FIber Optics, WIFI
NIC

WAP

Virtual Network
Network Interface Controller. The networking device in a
computer into which an ethernet cable is plugged in,
allowing wired to the network.

Wireless Access Point. Allows wireless access to a wired


network. Home routes usually include an in-built WAP

Applies a logical structure to a network, regardless of the


physical network. You can change the physical setup but
the network will still work the same.

You might also like