Save
TLE 3rd Quarter Monthly exam
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Eshrhyl Piado
Visit profile
Cards (20)
Peer-to-Peer Network
:
Connected directly to each other
Equivalent capabilities and responsibilities
Has no
central point
Allows certain files to be shared
Common in small offices
Client
/
Server
Network
:
Requests information
Maintained by network administration
Data
stored on a
centralized file server
Shared printers are managed
Access requires proper
permission
, authorized username, and password
Administration
:
Implements data backup and
security measures
Controls user access
Network Security
:
Failure to implement can affect users,
computers
, and the general public
Helps keep data and equipment safe
Physical
: theft, damage, or destruction of equipment
Data
: unauthorized access, corruption, denial of access, or theft of information
Malicious Threats
:
Intend to cause damage
Accidental Threats
:
Unintentionally damage data
External Threats
:
Originate from outside the network
Unstructured
Attacks
:
Exploit available resources, use passwords and scripts
Structured
Attacks
:
Use code to breach security
Virus
:
Attaches to a small piece of software
When run, hides by
attaching itself
Exceptionally dangerous as it can execute, infect, alter, or destroy
Worm
:
Self-replicating, duplicates its code
Does not need to attach to other programs
Harms the network by consuming resources
Trojan Horse
:
Technically a worm
Hidden in
software
, disguised as useful
Can reproduce or
replicate
itself
Security
Procedure:
Utilizes a security plan
Antivirus
/
Virus Protection
Software:
Detects, disables, and removes viruses, worms, and Trojans
Security Policy
:
Established by many organizations
Data Encryption
:
Uses codes and ciphers to prevent unauthorized access
Port Protection
:
Ensures every communication using TCP/IP is secure
Firewall
:
Acts as a barrier to protect the network from unauthorized access