Computer Science

Descripción

(bit of digital tech)
Mikey Plummer
Fichas por Mikey Plummer, actualizado hace más de 1 año
Mikey Plummer
Creado por Mikey Plummer hace casi 5 años
1
0

Resumen del Recurso

Pregunta Respuesta
User Access Rights Not all users on a network should be able to access all of the data that is stored. Access to files should be monitored and users should only have access to documents and data that they need. Different users may have different levels of permissions set up e.g. Teacher and Student accounts.
Physical security Security to protect the physical network property and the buildings containing the network devices. This could include CCTV to monitor access, biometrics or key card access requirements
Network level security These are security methods that operate on the communications between devices on the network. Firewalls are an example of network level security that monitors communication on the network for threats and prevents connections to and from untrusted web servers.
System level security These are security methods that will operate on the systems used in the network and devices connecting to the network. This could include encryption of data stored on devices, or using anti-virus to scan for threats.
Evil Twin An evil twin is a type of network attack that attempts to deceive device users into connecting to a fake network device such as a WAP set up by the attacker. The fake device will mirror the network name of the existing service so that people do not suspect it to be different to the original. This “evil twin” could then spread viruses onto devices, eavesdropping on the data you are transmitting and begin message tampering with data that you are sending or block the data you should be receiving from web servers.
Man in the Middle A man in the middle attack is where your connection to a server is being intercepted. This person could be attempting to manipulate or copy the data that you are sending and receiving from this web server. This could include private or sensitive data such as banking records or passwords.
Denial of Service A denial of service attack is where a web server is sent too many requests for data from clients than it is able to process. The server will start to slow down and then crash as it is overwhelmed by the number of requests for data that it receives. When these requests come from a range of devices around the world then it is known as a DDoS attack, Distributed Denial of Service.
Brute Force Attack A brute force attack is a method of attack designed to find passwords to online services by trying all possible combinations of letters, numbers and symbols. The shorter and fewer types of symbols that are used in a password, the quicker that it will be to find.
Phishing Phishing is an example of social engineering. Social engineering are types of attacks that seek to exploit humans using the networks rather than attack the networks directly. Phishing is an attack that attempts to deceive people into thinking they are communicating with someone that they should trust to give information to. Phishing attacks are usually sent through emails that appear to have been sent from your bank, or a website that you use asking you to confirm details such as passwords or other sensitive information.
Malware Malware is short for malicious software. It is a general term for hostile or disruptive software. It may be a virus that disrupts operations, or spyware that monitors what the user is doing such as a keylogger.
Transmission Control Protocol (TCP) Establishes connections between devices that allow other protocols to operate and data to be shared. TCP is responsible for dividing data into smaller messages that Internet Protocol will use to create packets.
Internet Protocol (IP) Assembles data into packets that can be transmitted over a network to allow communication. Adds the source and destination IP addresses onto the packets.
Hypertext Transfer Protocol (HTTP) Data used for webpages are sent and received using the HTTP protocol. A web page is made up of a collection of individual files - text, images, styling, JavaScript and so on. The http protocol allows a browser to request these individual files from a web server in an orderly way. Once received, they are rendered into a web page by your browser.
HTTP Secure This protocol works like HTTP, but also encrypts web page data before it is sent out of the browser or server, to make sure that nobody can intercept the data and read it themselves.
File Transfer Protocol (FTP) FTP is a standard network protocol used to transfer (upload and download) files between a client and a server on a network. You can specify if the data will be transmitted securely using encryption or not.
Post Office Protocol (POP) POP allows emails to be downloaded and deleted from a mail server and then viewed offline using an email client. When a message is downloaded it is deleted from the mail server and can’t be accessed later on other devices. POP does not support complex searches of emails stored on the mail server.
Internet Message Access Protocol (IMAP) IMAP allows you to download emails from a mail server, but the email will also remain on the mail server, it is not deleted when it is downloaded. This allows you to access your emails using multiple devices and see all the mail. IMAP allows more complex commands to manage emails stored on the server.
Simple Mail Transfer Protocol (SMTP) SMTP is a protocol used between mail servers to send and receive emails from other mail servers across the internet.
Domain Name System (DNS) Websites are hosted on servers. A server is simply a computer and every computer or device on the internet has its own unique IP address. DNS is a system that converts the names of websites e.g. www.youtube.com into an IP address where your device can then communicate with to download the data for that website using HTTP or HTTPS most likely. This means that you do not need to remember the IP addresses of websites, just the domain name of the site.
Voice over Internet Protocol (VoIP) VOIP is a type of program that can convert voice recordings from a microphone into a format that can be sent over a network connection. VOIP programs can be set to encrypt the data that is transmitted to enable secure communication. VOIP software can compress the recordings to lower quality to reduce the latency (delay) in communication.
Network Interface Cards (NIC) A NIC is a component inside devices that allow them to transmit data through a data link connection that the device uses such as Ethernet or Wi-Fi.
Wireless Access Point (WAP) A WAP will allow wireless devices to connect to a network using Wi-Fi and will transfer data between other devices on the network and the wireless devices.
Switch A switch will connect devices together inside a network and transfer data between devices. The switch will look at the source and destination device MAC addresses from the frames that it receives and transmit the data to the correct devices inside the network. If the data is going to leave the network, then it will go via the router.
Router A router will connect networks together and transfer data between networks. The router will examine a packet’s source and destination IP addresses to route the packet to the next network that it needs to go to. The router will store a routing table which is a list of destination IP addresses ranges, and the connection that it will send packets out from to reach each destination IP address.
WAN WAN is a Wide Area Network. A WAN may cover buildings spread out over a city, country or around the world. A WAN will usually rely on external network equipment that you are unable to manage and do not have full control over.
LAN LAN is a Local Area Network. A LAN will cover a small area such as an office, a single building or even a single room. A small scale network is much easier to manage and all of the devices will be owned and managed by the owners.
Peer to Peer In a peer to peer network each user maintains their own files. In the peer-to-peer model, many users on the network could store the same file. Each peer can then send sections of the file, sharing the workload. Each peer can download and share files with other users. Each user is responsible for updating their own copies of files, this can lead to errors with different users sharing out of date copies of documents. If you want to access a file from another peer who has disconnected from the network you will be unable to access those files.
Client Server It is the relationship between two computers in which one, the client, makes a request from another, the server. Clients are dependent on the server to provide and manage the information.
Mostrar resumen completo Ocultar resumen completo

Similar

Abstraction
Shannon Anderson-Rush
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
LAN and WAN
Nathan Roberts
Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Common Technology Terms
Julio Aldine Branch-HCPL
Software Processes
Nurul Aiman Abdu
Project Communications Management
farzanajeffri
Design Patterns
Erica Solum