1.3.3 network Flashcards

missing network hardware (53 cards)

1
Q

standalone machine

A

computer that is not connected to anything

stopping the spread of a virus on hardwares(unknown memory sticks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

network

A

a group of devices connected to each other and can communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

internet

A

inter connected networks- global network of computers connected together (network of networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

www

A

collection of webpages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

protocol

A

RULES that govern how devices COMMUNICATION with each other(standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

use of protocol layering

A

(the concept of having the different layers)

DECOMPOSITION-Reducing a complex problem into smaller sub-problems.

ABSTRACTION FOR SPECIFIC FUNCTION-Devices can be manufactured to operate at a particular layer.

COMPATABILITY-Products from different vendors will work together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP/IP Stack

A

used in the routing of packets through networks

how it works:
Data is split into chunks called packets by TCP(1 – AO1.1)
which have labels by IP(1 –AO1.1)
including their destination address and order (2 – AO1.1).
Each packet is sent on the most convenient / avoidable route (1 –AO1.2)
meaning they may arrive in a different order to which they were sent(1 – AO1.2).
Once packets arrive at receiver they are reordered (1 - AO1.2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP

A

Transmission Control Protocol – used with IP to ensure ERROR FREE transmission and package switching

  • establish an end-to-end connection between the source and recipient computer
  • splits the data packets and add a sequence of numbers to them
  • check the number of packets and resemble the data packets at the other end ends
  • acknowledgement of success transmission (hence error free)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IP

A

Internet Protocol – used to transfer all packets across the internet between routers

add IP address, check IP address, remove IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IP address

A

A numerical address made of 4 numbers each between 0 and 255 / 32
hexadecimal digits (1)
That uniquely identifies a device on a
network. (1)
It is a logical identifier (i.e. can change
on a physical device) (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS

A

use of system: name and organise internet resources

TLD: org/uk/com
SLD: google/edgbarrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNS server

A

stores a list of domain names and translate them into associated IP addresses (ISP)

how it works:
-domain name entered and sent to dns servers
-dns servers map the domain to an ip address
-if the domain name cannot be fetched, a request is sent to another dns server
-dns server sends the ip address to the browser
-the ip address than retrieved the website from the web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

LAN

A

group of computers
in a small geographical area
network and hardware owned by the organisation/network owner

link: UTP cable, fiber optic , wifi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WAN

A

size of area: larger geographical area (>1 sq mile)

ownership of hardware: connect to LANs, telecommunication companies who own and manage it.

link: telephone lines, fiber optics cables, satellite links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

UTP

A

link layer- one less layer of shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

STP

A

twisted pair-link layer
- one more layer of shield than UTP
- low bandwidth
- used for telephones networks, data networks
- relatively affordable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

packet switching

A

Splitting data into packets that can be sends individually across different routes across a network
(the routes can be most convenient/ to avoid traffic)
Once all packets are received, they are reordered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

circuit switching

A

Reserving a particular network route to transfer data between two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SMTP

A

outbound:
simple mail transfer protocol-
FORWARD the mail to the appropriate mail server

(the SMTP server has the database of email address)for the recipient’s email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IMAP

A

inbound:
internet message access protocol - keep emails on mail server

(allow flagging and searching, can sync devices, less privacy )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

POP

A

inbound:
post office protocol- deletes email from mail server once it is downloaded

(removes the mail from other devices, cannot do complex searches and flagging mail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

switch

A

Network device that connects multiple devices together, sending the data that it receives to the intended recipient device only

23
Q

hub

A

Network device that connects multiple devices together, sending the data that it receives to all connected devices

24
Q

router

A

Network device that directs data from one network to another

25
MAC vs IP address
MAC: individual device (in link layer, changed at each server hop) IP: the location/general area for destination
26
TLD
top level domain - e.g. .org, .uk, .com, .edu, .gov
27
SLD
second level domain - e.g. google
28
FTP
file transmission protocol- handles file uploads and downloads (works at the back end), normally on WAN
29
HTTP, HTTPS
hypertext transfer protocol (secure) for client and server to send and receive requests and deliver HTML web pages (s): secure - encryption and authentication
30
UDP
user datagram protocol- simple connectionless transmission model
31
protocol layering
application transport network link
32
the area/purposes of protocol
email(SMTP,IMAP,POP) webpage request(HTTP,HTTPS) file transfer (FTP) LAN/WAN (TCP/IP, UDP)
33
client to server model
one device (the client) requests services from another device (the server).
34
peer to peer model
all terminals have equal status and there is no powerful central server, each computer acts as both a client and a server.
35
switch(vs hub) vs router
a switch connects multiple devices to create a network, a router connects multiple switches, and their respective networks, to form an even larger network
36
(links) Fibre Optic Cables
newer, faster and high-capacity
37
firewall
Security measure that controls incoming and outgoing network traffic using a set of rules (ports) act as filter mechanism of firewall: -proxy -inspection and packet filtering
38
proxies
A proxy ensures there is no direct physical connection between a single user and a remote source.
39
encryption
A method of transforming data into an unintelligible way so that it cannot be read by unauthorised individuals.
40
malware
malicious software - software that annoys users or damages their data. For example, Worms, Viruses, Trojans and Spyware.
41
worm
standalone copies itself
42
virus
copies itself by attaching itself to another program
43
trojan
looks innocent but has ill intent open up back doors
44
social engineering
involves with “social” and human interaction -smishing : fake text messages -vishing: fake voice call -pharming : fake websites
45
phishing
use of email to take the user to a fake website to take their personal information
46
SQL injections
code enter to input text boxes prevention: sanitisation and by blocking certain characters
47
ransomeware
blackmail(scare users) into making a payment
48
most vulnerable with social engineering
the elderly the youngs people not familiar with technology
49
spyware
designed to collect information about what you are doing on the computer e.g. keylogger there are also hackers that hack cameras and mics
50
anti-malware vs anti-virus
COVERAGE anti-malware: designed to log keys(keylogger) and target adverts(adware) + virus anti-virus: ‘quarantine’ the file so it cannot be used to spread the virus; does not cover malware
51
hackers
black hat grey hat white hat
52
DOS and DDOS
sending requests after requests to affect server performance denial of service- one attacker using one/ more devices distributed denial of service- uses botnet
53
network security methods
-username and password -acceptance usage policy -penetration testing -physical security -user access levels cards included: -firewalls -encryption