• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/28

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

28 Cards in this Set

  • Front
  • Back

Phishing

Sending fraudulent emails that seem to come from legitimate sources



Attempt to capture private information (Chico state emails)

Keystroke loggers

-Monitor and record key strokes


-can be both hardware and software


-companies use it to track employee emails

Sniffing

Capturing and recording network traffic and often used by hackers to intercept information

Spoofing

Attempts to gain access to a network by posing as an authorized user.

Black hat hacker

experienced hacker, purpose to break in or bypass internet security.

White hat hacker

Works for companies to make sure no one can break on or hack into the system

Script kiddy

A juvenile hacker that used scrips or programs developed by sophisticated hackers

Third level of security is?

Corporate network

What are three well known worms?

Code Red, Melissa, Sasser

Type of program used to release a Trojan hoarse

Logic Bomb

Ky size

Between 32 and 1168 bits

Main types of encryption

Asymmetric (public)


and symmetric


Three factors that are critical for security

Authentication


Confirmation


nonrepudiation



Client server model

When multiple computers are set up to one client server, for example: multiple computes can print to one printer or on email client server.

Attenuation

Loss of power or signal as it travels from the sending device to the receiver device.

Two types of architecture

Peer to peer and client/server network

What is a client?

A computer that is designed to request information from a server.

WAN

Wide area network


Deals with wide geographical area

MAN

Metropolitan area network


Usually spanning a city

BUS Typology

all computers connected to a single cable

all computers connected to a single cable

Star typology

All computers connected to a central device

All computers connected to a central device

RING Typology

All computers are connected on the shape of a ring and information always goes one direction

All computers are connected on the shape of a ring and information always goes one direction

Hybrid typology

Ethernet

Cable internet

Three most commonly used wire media

Twisted pair wiring


coaxial cable


fiber optic

Coaxial cable

Carries a wide range of frequencies with low signal loss

Fiber optics

Fastest internet: transmission of information as light passes through glass wire or fiber.

Starting date of the internet

1969