- standard, wireless fidelity
- that attaches itself to another program and attempts to spread itself to other
- computers when files are exchanged
- or hardware designed to keep computer systems safe from hackers by closing off
- logical ports and making the computer invisible on the network
- to infect multiple file types in an effort to fool AV software that is looking
- for them
- controlled,each node can communicate with other nodes directly
- to detect viruses and protect your computer and files from harm
- transfer rate, the maximum speed at which data can be transmitted between two nodes
- on a network
- who breaks into a computer system unlawfully
- connected to or installed in network nodes that enable the nodes to communicate
- with each other and access the network
- their own code to avoid detection. Most
- infect one certain type of file.
- the master boot record so that it is loaded into memory as soon as the computer
- is booted up, before some anti-virus software is loaded
- of Service attack, legitimate users are denied access to a computer system
- because a hacker is repeatedly making requests of that computer system through
- a computer he has taken over as a zombie
- using your personal information to assume your identity for the purposes of
- defrauding others.
- interface cards, expansion cards installed in a PC to allow it to use the
- packets of data between two or more networks
- on which users accomplish specific tasks
/ cable routers
- network traffic and allows sharing of internet access
- of 4 numbers separated by dots, means by which all computers on the internet
- locate each other.
- switches, enable the flow of data over networks.
- that provides information or resources to the clients
/ server network
- controlled, usually have 10 or more nodes. Contains clients and servers
- the address book in the victim’s e-mail system to distribute the virus
- area networks in which nodes are located in a small geographical area
- operating system, handles requests for information, internet access, and use of
- peripherals for the rest of the network nodes
- temporarily erase their code from where they reside and hide in the active
- cable, single copper wire surrounded by layers of plastic
- that use the Ethernet protocol as a means or standard by which nodes on the
- network communicate
- that are triggered when certain logical conditions are met
- connected to a network are called nodes
- actual speed of data transfer that is actually achieved and is usually less
- than the data transfer rate. Measured in Mbps
- or more computers connected via software or hardware so they can communicate
- with each other
- up of plastic or glass fibers that transmit data at very fast speeds
- to documents that use macros.
- is sent over transmission media in bundles called packets.
- that are triggered by passage of time or on a certain date
- – telephone
- wire, made up of copper wires that are twisted around each other and surrounded
- by a plastic jacket
- area networks are made up of LANs connected over long distances
- radio waves to transmit data instead of wires.
- router, combines the ability of a wired router with the capability to receive
- wireless signals.
- to travel between systems through network connections
- of the internet, early networking project funded by the US government for the
- military in the late 1960s. Four node network between UCLA, Stanford research
- institute, UC Santa Barbara, and University of Utah at Salt Lake
network allows users to
- share peripherals, (2) transfer files easily, and (3) share an internet
- node to communicate with other nodes without going through a server. P2P most common in homes. Most networks with 10 or more computers are
- client / server networks
components of every network are
- transmission media, (2) network adapters, (3) network navigation devices such
- as routers and hubs, and (4) software that allows the network to run
Why would someone want to break into my computer?
- steal personal or other important info, (2) damage and destroy data (3)
- use the
- computer to attack other computers
What do firewalls do?
- close off logical ports so that hackers can’t use them to gain access to a
Why are wired networks more secure than wireless?
- networks are more vulnerable to hackers because the data is sent out over the
- air waves. To secure them, change the
- default password on the router, use a SSID that is hard to guess, and turn off
- SSID broadcasting, and enable security protocols
Six categories of viruses
- boot sector viruses, (2) logic bombs, (3) worms (4) scripts and macros, (5)
- encryption viruses, (6) Trojan horses