-
cyber threats
denial of service attacks, viruses, trojan horses, worms, rootkits, zombies and bots, ransomware and keylogger attacks
-
viruses
a virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. deviant program that can cause unexpected and often undesirable effects such as destroying or corrupting data
-
digital signals
communications signals or info represented in a discontinous two-state (binary) way using electronic or electromagnetic signals. the basis of computer based communications
-
peer to peer networks
type of network in which all computers on the network communicate directly with one another rather than relying on a server, as client/server network do.
-
protocols
also called communications protocol; set of conventions governing the exchange of data between hardware and/or software components in a communications network
-
routers
devices that joins multipe wired and wireless networks. routers have specific software and hardware designed for routing and forwarding info
-
file servers
a computer that acts like a disk drive, storing the programs and data files shared by users on LAN; data depository
-
MAN
metropolitan area network; communications network covering a city or suburb
-
network
also called communications network; system of interconnected computers, telephones, or other communications devices that can communicate with one another and share applications data
|
|