• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/91

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

91 Cards in this Set

  • Front
  • Back

Internet

A group of inter connected networks

World wide web

A service that makes use of the internet

Wide area network(WAN)

Any network in which the computers communicate using resources supplied by a “third party carrier” such as BT or sky

How do WANs connect to networks

Cables, phone lines, satellites, radiowaves

What is the largest WAN in the world

The internet

IP addresses

Four 8-bit numbers(0-255) seperated by dots

Packet switching

File broken into packets of 512 bytes and each packet is given a header

Headers which can be given to packets during packet switching

IP address it is going to, sequence number of the packet, number of packets in the whole communication

Packets can flow through different routes T/F

T

How is each packet marked

With the packet number so the packets can be put back together by the receiver

Each data packet has a different number of bytes T/F

F

What reorders the packets into the correct order

The recipient computer

What happens to corrupt packets

They are requested to be resent

Nodes

Points on a network diagram

Routers

Any node that can route packets from one place to another

Network interface card

Built into every networked device

How are NICs connected

Wireless or with a network cable socket

MAC address

Address assigned to each NIC by the manufacturer

Why internet doesn’t use MAC instead of an IP address

IP address can change when devices are on the network

What happens when you request a web page

Each router along the way uses the MAC address of the next router to send the data packet on the next day of its journey

Router

Looks at destination of packets of data and sends them to the network that is closer towards their destination

What happens when you request a web page

Each router along the way uses the MAC address of the next router to send the data packet on the next day of its journey

Router

Looks at destination of packets of data and sends them to the network that is closer towards their destination

Switch

Connects each node in a network


know the MAC address of all connected computers and devices.


Send packets to the correct computer

Hubs

Send the data to all connected computers

Pros of wired networks

No need to lay cables


Easy to connect to new devices


Devices can be portable within the range of the access point

Pros and cons of wired networks

No need to lay cables


Easy to connect to new devices


Devices can be portable within the range of the access point

Cons of networks

Purchasing network hardware is expensive


Managing a large network is complicated


Viruses may be able to infiltrate the network and infect every computer

Topology

The way in which parts of a system are connected

2 types of topology

Star, bus

Star toplogy

Back (Definition)

Bus toplogy

Back (Definition)

Pros of networks

Computers can share resources such as printers


Files can be accessed through any computer in the network


Data is easy to back up as it is stored centrally on the server

Cons of networks

Purchasing network hardware is expensive


Managing a large network is complicated


Viruses may be able to infiltrate the network and infect every computer

bus topology

computers and other devices are all connected to a central coaxialcable

star topologydef

alldevices(nodes)are connectedto a central switch

terminators

placed at each end of the cable


absorb signals and prevent them reflecting down the cable

star topology pros

faster data transfer to hub as eachwire ismt shared


if one cable fails the other computers are notaffected

star topology cons

required additional hardware suchasthecentral switch andnetwqork cables


if the central switch fails

bus topology pros

less cable so cheaper to install the network


easier to add more devices as they only need to connect to a central cable

Pros of bus toplogies

Less cables needed to cheaper to install the network


Easier to add more devices as they only need to connect to a central cable

layer

group of protocols with a similar function

are layers contained or self contaiuned

self contained

4 layers and their names

application, transport, internet, link

what do protocols in the application layer cover

providing network services to applications

what do protocols in the transport layer cover

setting up communications between 2 devices


splitting data into packets


checking packets are correctly sent and delivered

what do protocols in the internet layer cover


adding IP addresses to data packets


directing packets between devices


handling traffic

what do protocols in the link layer cover

passing data over the physical network


are responsible for how data is sent as electrical signals over hardware.


protocol examples in the application layer

http, https, smtp, imap, ftp

protocol examples in the transport layer

tcp, udp

protocol examples in the internet layer

ip

protocol examples in the link layer

wifi, internet

pros of using layers

1.breaks network communication into manageable pieces


2.as layers are self contained they can be changed without other layers being affected


3.having set rules for each layer forces companies to make compatible, universal hardware and software, so different brands work with each other and always in a similar way

http

used by web browsers to access websites and commiunicate with web servers

https

a more secure version of http which encrypts all information sent and recieved

ftp

used to access, edit and move files between devices on a network

imap

used to retrieve emails from a server

smtp

sends emails


transfers emails between servers

which 2 protocols control the packaging of data

tcp and udp

tcp

establishes a connection between the sending and recieving devices and then splits the data into packets

udp(user datagram protocol)

breaks data down into packets without numbering them

what does cyber security aim to do

protect networks, data, programs and computers against damage, cyber attacks and unauthorised access

what can cyber attacks target

individuals, organisations, governements

malware

code designed to cause harm or gain unauthorised access to a compute system often installed without consent

typical actions which malware does

deleting files


locking files


altering permissions

how can malware spread

viruses


worms


trojans

worms

like viruses but self replicate without the help of the user

viruses

attach to certain files and harm the device

trojans

malware disguised as legitimate software which are installed without the user knowing what they are

pharming

where a user is directed to a fake version of a website which looks like the real version, when the use inputs their personal information into the website they are handing it over to criminals

how pharming can be prevented

internet browsers using web filters


ensuring anti malware software is up to date

social engineering

a way of gaining sensitive information or illegal access by influencing people

forms of social engineering

phishing, shouldering, blagging

phishing

criminals use emails or texts with links to send a victim to a fake website where pharming takes place

shouldering/shoulder surfing

watching or observing a persons activity to get their details

blagging/pretexting

when someone makes up a story or pretends to be someone they are not to persuade the victim to chare information they do not want to share

how to reduce risk of shouldering

being discreet


covering keypad when typing

reduce risks of physhing

look at signals of physhing suchc as bad english and bad grammer

reduce risks of blagging

use security measures which cannot be shared such as biometrics

penetration testing

when organisations employ specialists to stimulate potential attacks to their system so they can identify weaknesses

2 forms of penetration testing

white box, black box

white box

stimulates a malicious insider who has knowledge of the current system, the person hacking will be given credentials to help them

black box

stimulates an external hack where the hacker has no assistance from the inside

encryption

when data is translated to code which only someone with the correct key can access

anti malware software

designed to prevent malware from damaging a network

firewalls

examine all data when entering or leaving a network and identify potential threats

automatic software updates

used to patch security holes in software

user access levels

controls which pats of the network different groups of users can access

MAC address filtering

way to ensure only the people on a network are trusted users by checking the MAC address of every device before letting them join the network

biometric measures

use scanners to identify the correct user

CAPTCHA

completely automated turing test to tell computers and humans apart




prevents computers from logging into accounts if not under human control