-
WiFi
- 802.11
- standard, wireless fidelity
-
Computer
virus
- program
- that attaches itself to another program and attempts to spread itself to other
- computers when files are exchanged
-
Firewalls
- software
- or hardware designed to keep computer systems safe from hackers by closing off
- logical ports and making the computer invisible on the network
-
Multipartite
virus
- designed
- to infect multiple file types in an effort to fool AV software that is looking
- for them
-
P2P
networks
- locally
- controlled,each node can communicate with other nodes directly
-
Anti-virus
software
- designed
- to detect viruses and protect your computer and files from harm
-
Bandwidth
- data
- transfer rate, the maximum speed at which data can be transmitted between two nodes
- on a network
-
Hacker
- anyone
- who breaks into a computer system unlawfully
-
Network
adapters
- devices
- connected to or installed in network nodes that enable the nodes to communicate
- with each other and access the network
-
Polymorphic
virus
- change
- their own code to avoid detection. Most
- infect one certain type of file.
-
Boot-sector
virus
- infects
- the master boot record so that it is loaded into memory as soon as the computer
- is booted up, before some anti-virus software is loaded
-
DoS
attack
- Denial
- of Service attack, legitimate users are denied access to a computer system
- because a hacker is repeatedly making requests of that computer system through
- a computer he has taken over as a zombie
-
Identity
theft
- someone
- using your personal information to assume your identity for the purposes of
- defrauding others.
-
NICs
- network
- interface cards, expansion cards installed in a PC to allow it to use the
- network
-
Routers
- transfers
- packets of data between two or more networks
-
Client
- computers
- on which users accomplish specific tasks
-
DSL
/ cable routers
- controls
- network traffic and allows sharing of internet access
-
IP
address
- set
- of 4 numbers separated by dots, means by which all computers on the internet
- locate each other.
-
Network
navigation devices
- and
- switches, enable the flow of data over networks.
-
Server
- computer
- that provides information or resources to the clients
-
Client
/ server network
- centrally
- controlled, usually have 10 or more nodes. Contains clients and servers
-
E-mail
virus
- uses
- the address book in the victim’s e-mail system to distribute the virus
-
LANs
- local
- area networks in which nodes are located in a small geographical area
-
NOS
- network
- operating system, handles requests for information, internet access, and use of
- peripherals for the rest of the network nodes
-
Stealth
virus
- –
- temporarily erase their code from where they reside and hide in the active
- memory
-
Coaxial
cable
- TV
- cable, single copper wire surrounded by layers of plastic
-
Ethernet
network
- networks
- that use the Ethernet protocol as a means or standard by which nodes on the
- network communicate
-
Logic
bombs
- viruses
- that are triggered when certain logical conditions are met
-
Nodes
- devices
- connected to a network are called nodes
-
Throughput
- the
- actual speed of data transfer that is actually achieved and is usually less
- than the data transfer rate. Measured in Mbps
-
Computer
network
- two
- or more computers connected via software or hardware so they can communicate
- with each other
-
Fiber-optic
cable
- made
- up of plastic or glass fibers that transmit data at very fast speeds
-
Macro
viruses
- attached
- to documents that use macros.
-
Packets
- Data
- is sent over transmission media in bundles called packets.
-
Time
bombs
- viruses
- that are triggered by passage of time or on a certain date
-
Twisted-pair
cable
- – telephone
- wire, made up of copper wires that are twisted around each other and surrounded
- by a plastic jacket
-
WAN
- wide
- area networks are made up of LANs connected over long distances
-
Wireless
network
- uses
- radio waves to transmit data instead of wires.
-
Gateways
- wireless
- router, combines the ability of a wired router with the capability to receive
- wireless signals.
-
Worms
- attempt
- to travel between systems through network connections
-
ARPANET
- Origin
- of the internet, early networking project funded by the US government for the
- military in the late 1960s. Four node network between UCLA, Stanford research
- institute, UC Santa Barbara, and University of Utah at Salt Lake
-
A
network allows users to
- 1.)
- share peripherals, (2) transfer files easily, and (3) share an internet
- connection.
-
P2P
networks allow
- each
- node to communicate with other nodes without going through a server. P2P most common in homes. Most networks with 10 or more computers are
- client / server networks
-
Four
components of every network are
- (1)
- transmission media, (2) network adapters, (3) network navigation devices such
- as routers and hubs, and (4) software that allows the network to run
-
Why would someone want to break into my computer?
- (1)
- steal personal or other important info, (2) damage and destroy data (3)
- use the
- computer to attack other computers
-
What do firewalls do?
- Firewalls
- close off logical ports so that hackers can’t use them to gain access to a
- computer
-
Why are wired networks more secure than wireless?
- Wireless
- networks are more vulnerable to hackers because the data is sent out over the
- air waves. To secure them, change the
- default password on the router, use a SSID that is hard to guess, and turn off
- SSID broadcasting, and enable security protocols
-
Six categories of viruses
- (1)
- boot sector viruses, (2) logic bombs, (3) worms (4) scripts and macros, (5)
- encryption viruses, (6) Trojan horses
|
|