Y12 Networking Flashcards
(35 cards)
router
- forwards packets between networks
switch
- connects devices within a lan
- receives messages from devices and transmits it to other devices
patch panels
- organises network cables
firewalls
what do they filter
key functions
- controls incoming and outgoing network traffic by analysing data packets
- hardware firewalls protects you from outside world
- software firewalls protects a specific device from other internal systems
filter
- ports, packets, ip addresses, domain names, protocols, keywords
key functions
- packet filtering, access control, network traffic monitoring, protection against threats
modem
- modulates analogue systems into digital signals and back
- produces signals that can be transmitted easily and decoded easily
network interface card
- connects a computer to the network
wireless access points
- devices that allows wireless devices to connect to a wired network
- usually connects to or is part of a router
bridge
- repeaters that send data from one network to another
- inspects incoming traffic and decides whether to forward or discard it
802.11
characteristics
troubleshooting steps
- wifi
- characteristics
1. uses radio frequencies - troubleshooting steps
1. relocate WAP
2. change wifi channel
3. update firmware & network adapter drivers
802.3
characteristics
troubleshooting steps
- ethernet
- transmits up to 10 Megabits per second
Characteristics
- wired connection, high reliability & speed
Trouble shooting steps
1. check physical connections
2. inspect cables
3. restart devices
4. check link lights
5. update drivers
6. test with different ports/device
network protocols
- set of rules followed by a network
- define communications between two or more deivces
TCP
- transmission control protocol
- provides reliable, ordered and error-checked delivery of data
- uses ‘three way handshake’
1. TCP assigns sequence number (SYN)
2. server acknowledges SYN, called SYN-ACK
3. client acknowledges SYN-ACK, called ACK
IP
- internet protocol
- used to transmit data across a network
TCP/IP
- set of communication protocols on the internet to interconnect devices
HTTPS
- hypertext transfer protocol secure
- combination of HTTP with SSL (secure socket layer)
- means all communications between your browser and website are encrypted, through digital certificates and signatures
public key
- every one can access it, used to encrypt and decrypt messages
private keys
- only user can access it and encrypt/decrypt with it
digital certificates
- electronic files that authenticate the identity of websites, individuals, organisations or devices
- uses a system of public and private keys to encrypt message, whilst owner keeps private key secret
- certificate contains public key used to encrypt message, whilst owner keeps private key secret
- issued by Certificate authorities (CA)
digital signatures
- when you sign a document digitally, your encrypting a hash value of the document with the private key, which creates a digital signature that can be verified using public key (stored in digital certificate)
authentication factors
- used to sign in to a network
knowledge factor - something user knows
possession factor - something user has
inherence factor/biometric factor - something inherent in user’s physical self
location factor - uses IP addresses or GPS data to prevent unauthorised access
authentication: passwords
- the more complex a password is, the harder it is to guess
- create passwords that are long, contain upper and lowercase, numbers + special characters
authentication: two-factor
- requires users to provide two forms of authentication to get access to an account/system
secure router settings
- make complex router passwords, change router’s admin credentials, non-identifiable network name, hide SSID, keep router firmware up to date, use firewall etc
setting access permissions
- they determine who can access what data and resources on a network
1. identify users and groups that need access to specific networks
2. assign appropriate permissions
3. use principles of least privilege - common access permissions include read, write, execute and full control