Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
41 Cards in this Set
- Front
- Back
WAN
|
Wide area network.
|
|
LAN
|
Local Area network
|
|
Router
|
hardware device that "routes" or connects the user to a network
|
|
WEP
|
"wired equivilent privacy" it helps with security by encryption
|
|
802.11
|
wifi standards used to transmit data over a network
|
|
WPA
|
WiFi protected access. better than WEP because it is custom to user
|
|
Firewall
|
limits data that can be shared for security
|
|
Phising
|
a Con where users send emails in order to collect information.
|
|
Worm
|
these duplicate in your system which slows it down
|
|
VPN
|
"Virtual Private Network" sets up a tunnel on a network for protection of sending data to different places
|
|
PGP
|
"pretty good privacy" used on emails
|
|
Audit Log
|
Track of all the events that happen on a network. Helps backtrack to the problem
|
|
Wireless G
|
standard for wireless networks
|
|
Switch
|
used to network multiple computers together. more advanced than hub
|
|
Internet 2
|
network used for education
|
|
Hub
|
Hardware used to network multiple computers
|
|
FTP
|
"File Transfer Protocol" method of transferring files over the internet
|
|
Packet Jam
|
files are broken into packets and sent. When recieved if a packet is late then there is a packet jam causing error
|
|
Buffer Overflow
|
processes store data in a buffer which will delete data
|
|
Logic Bomb
|
malacious code intentionally left into a software that will happen if certain things are met
|
|
Social Engineering
|
tricking somebody into giving you their information
|
|
confidentiality
|
making sure information is only accesible to authorized people
|
|
authentication
|
used to make sure unauthorized people can't use the the information on certain networks
|
|
NLR
|
National Lamda Rail System. First transcontinental internet system
|
|
TCP/IP
|
set of communication protocol for the internet
|
|
IP adress
|
"internet protocol" adress. used to identify the host or computer
|
|
Spam
|
undesirable electronic messsges like emails
|
|
PKI
|
"Public Key Infracture" used to ban users and stuff
|
|
Encryption
|
transforming information using a algorith to make it unreadable
|
|
DNS
|
"Domain Name system" used to give an ip adress to a name.
|
|
NLR
|
National Lamda Rail System. First transcontinental internet system
|
|
TCP/IP
|
set of communication protocol for the internet
|
|
IP adress
|
"internet protocol" adress. used to identify the host or computer
|
|
Spam
|
undesirable electronic messsges like emails
|
|
PKI
|
"Public Key Infracture" used to ban users and stuff
|
|
Encryption
|
transforming information using a algorith to make it unreadable
|
|
DNS
|
"Domain Name system" used to give an ip adress to a name.
|
|
backbone
|
provides a path of information for users on a LAN
|
|
bit torrent
|
manages downloads and uploads
|
|
cookie
|
small text saved by the internet through the user navigation
|
|
P2P
|
Peer to peer network
|