DDOS
Botnet
Phishing
Social Engineering
Where multiple devices are used to attack a server across
the internet
a number of internet connected devices controlled by a
hacker
Where an email or website tries to imitate a genuine
website in order to get the user to divulge personal
information
Tricking a person into giving up personal information of
compromising the security of a system of device.
Interception
Brute Force
SQL Injection
Poor Network Policy
Where data is captured on enroute and decrypted
A password attack that targets short of insecure passwords
Where databases are attacked by exploiting poor coding
Examples include allowing weak passwords or unlimited
password attempts
Network Forensics
Anti-Malware
Firewall
User Access Levels
where network logs and other tracking is used to detect
attacks
Software that detects and removes unwanted software
A device that blocks certain incoming and outgoing
packets, using a set of rules
Restricting users so that they can only load resources that
they are allowed
Password
Encryption
Dictionary Attack
Malware
a series of letters,numbers and characters that are used to
access a system
Where is scrambled when stored and transmitted so that it
can only be read be the intended recipient
A password attack that targets commonly used passwords
Software that often includes other unwanted software or
features, often serving unwanted adverts.
Penetration Testing
Rootkit
Spyware
Worm
Paying a person or company to attempt to break into your
network or discover vulnerabilities
Software that installs on the boot sector of a computer,
bypassing virus protection
Software that tracks your browsing and other data
Self replicating network virus
Crimeware
Trojan
Anti-virus
Input Sanitization
software that restricts access to a computer of files for
purposes of blackmail
A type of virus hidden inside of a legitimate program
Software that detects hidden malicious software
Checking and removing malicious data inputs to prevent
SQL Injection
Switch
Router
Server
Web Server
A network device design to forward packets on to their
correct location within a network using the device's MAC
address.
A network device design to act as an interface between 2
different types of network. Often also contains a firewall.
A computer that manages access to centralised resources
within a network, such as printer and internet access.
A computer that hosts an externally accessible website.
When you load a website on your computer, your web
page request is served by the server.
File Server
Authentication Server
Ethernet
WIFI
A computer that hosts centrally managed files and folders.
This allows users to access their files from any networked
computer.
A computer that is responsible for controlling network
resources access for users.
A fast wired networking cable technology that is the
industry standard in most offices.
A wireless networking technology that transmits data using
radio waves.
Wireless Access Point
Bluetooth
WPA / WPA2
WEP
A networking devices that provides an interface between
wired and wireless networks. Allows devices to connect
wirelessly to a wired network.
A wireless networking technology that is usually used to
connect peripheral to devices wirelessly.
Wireless encryption standard used to protect data
transmitted wirelessly. More secure than WEP.
Older wireless encryption standard used to protect data
transmitted wirelessly. Less secure than WPA/WPA2
DNS
ISP
Fibre Optics
Bridge
Domain Name Server. Used to translate website URLS
(e.g. www.google.co.uk) to IP addresses (e.g.
203.101.101.90)
Internet Service Provider. All networks connect to the
internet via an Internet Service Provider
Network transmission media that uses light to transmit
data along glass fiber strands. Very high speed and large
bandwidth.
A device used to connect 2 similar networks together.
Usually used to connect 2 separate LANs into a WAN
Packet
Packet Switching
Latency
Protocol
Data sent from one computer to another is broken down
into pieces, known as packets. Packets contain data, sender
and receiver ip, data type information etc.
Breaking a large packet down into smaller packets and
sending each packet individually across the internet.
Packets are then reassembled at the other end.
The time it takes to receive a response from a web server
after a packet has been sent. Lower latency is better
An agreed set of rules that hardware or software follow
when preparing, encrypting or transmitting data across a
network.
HTTP
HTTPS
FTP
SMTP
Hypertext Transfer Protocol. The set of the rules
computers using when transmitting and receiving web
page data
Hypertext Transfer Protocol Secure. A secure version of
HTTP, used for displaying webpage content securely.
File Transfer Protocol. The set of rules computers using
when sending or uploading files.
Simple Mail Transfer Protocol. The set of rules computers
use when sending emails.
IMAP
TCP/IP
Layers
Domain Name
Internet Message Access Protocol. The set of rules
computers use when accessing email accounts.
Transmission Control Protocol / Internet Protocol. The 2
main protocols used to control the sending over packets of
data across a network
The Open Systems Interconnect model breaks down
network communication into a number of layers. Each
layer has its own protocols and devices that function at that
layer.
The Human Readable address for a website, such as
Google.com. Needs to be matched with an IP address for a
packet to be sent.
MAC Address
SSL
LAN
WAN
Machine Address Code. A fixed unique hexadecimal code
issued to every piece of network hardware. Used by
switches when forwarding packets.
Secure Socket Layer. Encryption Protocol used in
conjunction with HTTPS to establish a secure connection
to a website.
Local Area Network. A wired/wireless collection of
connected machines, located in one physical location,such
as an office building
Wide Area Network. A number of linked LANs, using
over a wide area, such as a university campus.
Internet
World Wide Web
Client - Server
Peer to Peer
An international network of interconnected LANs and
WANs
The global collection of HTML web pages, linked together
by Anchor links and accessed using a Web Browsers
A centralised network where access to resources is
controlled by the server.
A decentralized network where all connected devices have
equal access to resources. Less secure than a Client-Server
Network but easier and cheaper to setup.
Wifi Frequency
Wifi Channel
Star Network
Mesh Network
The wavelength used by a particular wifi device.
Wifi devices can choose which channel to operate on (e.g.
from 1 to 11). Multiple networks operating on the same
channel will result in a slow connection
The topology used by Client-Server networks
The topology used to Peer to peer networks. Each device
acts a node on the network and forwards on packets to
other devices in range
Packet Switching
Network Performance
The cloud
Transmission Media
Breaking a large packet down into smaller packets before
sending them across a network. Packet travel
independently and then are reassembled at the receiving
end.
How fast and reliably data is sent around a network.
Affected by technology used (wired / wireless), number of
clients, type of data being sent (email vs video)
Offsite storage, only accessible when the computer has
access to the internet. Often not stored in a single
locations.
The physical hardware along which data is sent. Includes
Ethernet, FIber Optics, WIFI
NIC
WAP
Virtual Network
Network Interface Controller. The networking device in a
computer into which an ethernet cable is plugged in,
allowing wired to the network.
Wireless Access Point. Allows wireless access to a wired
network. Home routes usually include an in-built WAP
Applies a logical structure to a network, regardless of the
physical network. You can change the physical setup but
the network will still work the same.