TLE 3rd Quarter Monthly exam

Cards (20)

  • Peer-to-Peer Network:
    • Connected directly to each other
    • Equivalent capabilities and responsibilities
    • Has no central point
    • Allows certain files to be shared
    • Common in small offices
  • Client/Server Network:
    • Requests information
    • Maintained by network administration
    • Data stored on a centralized file server
    • Shared printers are managed
    • Access requires proper permission, authorized username, and password
  • Administration:
    • Implements data backup and security measures
    • Controls user access
  • Network Security:
    • Failure to implement can affect users, computers, and the general public
    • Helps keep data and equipment safe
  • Physical: theft, damage, or destruction of equipment
  • Data: unauthorized access, corruption, denial of access, or theft of information
  • Malicious Threats:
    • Intend to cause damage
  • Accidental Threats:
    • Unintentionally damage data
  • External Threats:
    • Originate from outside the network
  • Unstructured Attacks:
    • Exploit available resources, use passwords and scripts
  • Structured Attacks:
    • Use code to breach security
  • Virus:
    • Attaches to a small piece of software
    • When run, hides by attaching itself
    • Exceptionally dangerous as it can execute, infect, alter, or destroy
  • Worm:
    • Self-replicating, duplicates its code
    • Does not need to attach to other programs
    • Harms the network by consuming resources
  • Trojan Horse:
    • Technically a worm
    • Hidden in software, disguised as useful
    • Can reproduce or replicate itself
  • Security Procedure:
    • Utilizes a security plan
  • Antivirus/Virus Protection Software:
    • Detects, disables, and removes viruses, worms, and Trojans
  • Security Policy:
    • Established by many organizations
  • Data Encryption:
    • Uses codes and ciphers to prevent unauthorized access
  • Port Protection:
    • Ensures every communication using TCP/IP is secure
  • Firewall:
    • Acts as a barrier to protect the network from unauthorized access