Connection Types and Their Function Flashcards

1
Q

Wired Connections

A

Ethernet is the most widespread and commonly used wired connection type. It provides a secure, high-speed data transmission between devices, such as computers, routers, and switches, using Category 5 (Cat5) or higher cables. Ethernet connections are generally considered more reliable and secure compared to wireless connections because they are less vulnerable to interference and unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

USB (Universal Serial Bus)

A

USB is a popular connection type, primarily used for connecting peripheral devices such as keyboards, mice, and storage devices to computers. While USB provides a convenient way of expanding a computer’s functionality, it also poses security risks. Using untrusted USB devices can lead to the spread of malware, making it essential to ensure that only trusted devices are connected to your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless Connections

A

Wi-Fi is the most prevalent wireless connection type, allowing devices to connect to the internet and each other without the need for physical cables. Although Wi-Fi provides greater flexibility and mobility, it introduces additional security risks. To minimize these risks, always use encryption (preferably WPA3 or WPA2), strong passwords, and update your router’s firmware regularly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluetooth

A

Bluetooth is another widely used wireless connection type, primarily designed for short-range communication between devices such as smartphones, speakers, and headsets. While Bluetooth offers convenience, it can also be susceptible to attacks, such as Bluesnarfing and Bluejacking. To mitigate these risks, keep your devices updated, use Bluetooth 4.0 or higher, and disable Bluetooth when not in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Connections

A

A VPN is a secure tunnel that creates a private network connection over a public network (such as the internet) by encrypting data transfers between devices. VPNs help protect sensitive information from being intercepted by unauthorized parties and are especially useful when accessing public Wi-Fi hotspots. Always use trusted VPN providers to ensure your data remains encrypted and private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Peer-to-Peer (P2P)

A

P2P is a decentralized connection type where devices connect directly with each other, without the need for a central server. P2P is commonly used for file-sharing services and can pose significant security risks if utilized without adequate security measures in place. To minimize risks, avoid using untrusted P2P services and refrain from sharing sensitive information on such networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NFC

A

Near Field Communication, orNFC, is a short-range wireless communication technology that enables devices to interact with each other within a close proximity, typically within a few centimeters. It operates at a frequency of 13.56 MHz and can be used for various applications, such as contactless payment systems, secure access control, and data sharing between devices like smartphones, tablets, and other compatible gadgets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How NFC Works

A

When two NFC-enabled devices are brought close to each other, a connection is established, and they can exchange data with each other. This communication is enabled throughNFC TagsandNFC Readers. NFC Tags are small integrated circuits that store and transmit data, while NFC Readers are devices capable of reading the data stored in NFC Tags.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NFC Modes

A

NFC operates primarily in three modes:
Reader/Writer Mode
Peer-to-Peer Mode
Card Emulation Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Reader/Writer Mode (NFC)

A

This mode enables the NFC device to read or write data from or to NFC Tags. For example, you can scan an NFC Tag on a poster to access more information about a product or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Peer-to-Peer Model (NFC)

A

This mode allows two NFC-enabled devices to exchange information directly. Examples include sharing data such as contact information, photos, or connecting devices for multiplayer gaming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Card Emulation Mode (NFC)

A

This mode allows an NFC device to act like a smart card or access card, enabling contactless payment and secure access control applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NFC Security Concerns

A

Eavesdropping: Attackers can potentially intercept data exchange between NFC devices if they manage to get into the communication range.

Data manipulation: Attackers might alter or manipulate the data exchanged between the devices.

Unauthorized access: An attacker can potentially exploit a vulnerability in your device, and gain unauthorized access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NFC Best Practices

A

To minimize the risks associated with NFC, follow these best practices:

Keep your device’s firmware and applications updated to minimize known vulnerabilities.

Use strong and unique passwords for secure NFC applications and services.

Turn off NFC when not in use to prevent unauthorized access.

Be cautious when scanning unknown NFC Tags and interacting with unfamiliar devices.

Ensure you’re using trusted and secure apps to handle your NFC transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WIFI

A

WiFistands for “wireless fidelity” and is a popular way to connect to the internet without the need for physical cables. It uses radio frequency (RF) technology to communicate between devices, such as routers, computers, tablets, smartphones, and other hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advantages of WiFi

A

Convenience: Users can access the internet from anywhere within the WiFi signal’s range, providing flexibility and mobility.

Easy Setup: WiFi devices connect to the internet simply by entering a password once, without the need for any additional cables or adapters.

Scalability: WiFi networks can easily expand to accommodate additional devices without the need for significant infrastructure changes.

17
Q

Security Risks and WiFi Threats

A

Despite its numerous benefits, WiFi also brings potential security risks. Some common threats include:

Eavesdropping
Rogue access points
Man-in-the-middle attacks

18
Q

Eavesdropping (WIFI)

A

Hackers can intercept data transmitted over a WiFi connection, potentially accessing sensitive information such as personal or financial details.
injecting malware.

19
Q

Rogue access points (WIFI)

A

An unauthorized user could set up a fake WiFi network that appears legitimate, tricking users into connecting and providing access to their devices.

20
Q

Man-in-the-middle attacks (WIFI)

A

An attacker intercepts data transmission between your device and the WiFi network, potentially altering data or injecting malware.

21
Q

Best Practices for Secure WiFi Connections

A

To protect yourself and your devices, follow these best practices:

Use strong encryption: Ensure your WiFi network uses the latest available encryption standards, such as WPA3 or, at minimum, WPA2.

Change default credentials: Change the default username and password for your WiFi router to prevent unauthorized access and configuration.

Keep your router firmware up to date: Regularly check for and install any available firmware updates to prevent potential security vulnerabilities.

Create a guest network: If you have visitors or clients, set up a separate guest network for them to use. This ensures your primary network remains secure.

Disable WiFi Protected Setup (WPS): Although WPS can simplify the connection process, it may also create security vulnerabilities. Disabling it forces users to connect via the more secure password method.

Use a Virtual Private Network (VPN): Connect to the internet using a VPN, which provides a secure, encrypted tunnel for data transmission.

22
Q

Bluetooth

A

Bluetooth is a wireless technology used to transfer data between devices over short distances. It operates in the 2.4 GHz frequency band and offers a reasonably secure means of communication between devices like smart phones, computers, headphones, and more.