Save
Computer science
Networks
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
foxy
Visit profile
Cards (84)
Issues of
Wi-Fi
Security
as broadcast can be intercepted
Limited
range - affceted by
walls
View source
Rules of Ethernet are
Make sure data is
unused
Make sure data takes turns to
transfer
(handshaking)
View source
Benefits
of
layers
The products can
work together even
if one layer is
not in use
View source
A
standard
is a
A set of procedures that defines how networks
interact
and allows
hardware
and software to interact
View source
A
protocol
is
Used to define how devices on networks
interact
View source
Peer to peer advantages and disadvantages
Advantages -
don't
have to log in
Easier
to set up
Disadvantages -
backups
are made from
individual work station
If printer running from one peer no one can
print work
View source
Peer to peer characteristics
In small office or house
Share
parts of files
View source
Hub v switch
*in switch data transmitted to specific node but hub data transmitted to every node
*In switch
less
data collisions
*Switch more
expensive
*switch better
security
View source
Router v
switch
Router uses zip address but
switch
uses MAC address
Router connects network but switch connects
nodes
View source
Role of
cables
Joins individual
nodes
to form
lans
View source
Switches pros and cons
PROS:
High
security
Low
data collisions
CONS:
Expensive
Only in
high bandwidth
networks
View source
NIC
(Network Interface Card) is used to
Converts data from
nodes
into a suitable
format
View source
Wi-Fi
v
cables
Cables are wired
Wi-Fi wireless
Cables less
interference
Cables are
faster
Cables have
longer
range before lost
Wi-Fi
not very
secure
View source
Hub pros and cons
PROS:
Straight
from one node to another
Extends
space
of network
Cheap
CONS:
Not
secure
High data
collisions
View source
Characteristics of client server networks
Have to
log in
Use
authentication
Request files
on server
View source
Network architecture
The way the
components
of a computer are arranged
View source
Wans advantages and disadvantages
PROS:
Connects companies in
far geographical proximity
Workers can
collaborate
CONS:
expensive
Have to hire lots of
bandwidth
Have to rely on
external supplier
if network fails
View source
Lans advantages and disadvantages
PROS:
Files
can be shared
User can log onto any workstation
CONS:
Costly
Support staff needed
If problem no one can access files
View source
Client server advantages and disadvantages
PROS
:
Can
log
onto any computer on network
Backups
made centrally
Software
updates made from central server
CONS
:
Need
specialist
staff
More
expensive
If central file
unavailable
no one can access files
View source
A router is
Device that
transfer data
from one
network
to another
View source
Pros and cons of star topology
PROS:
Fast
data transfer
Rare
data collisions
Good
security
Reliable
CONS:
expensive
Need
technical knowledge
If
central device down
no one can access network
View source
Pro and cons external hosting.
PROS:
Hosts
maintain
server
Won't
run
out of
bandwidth
Hosts perform
backups
CONS:
Expensive
If company server
offline
website
unavailable
View source
Malware
is
Software
designed to cause
harm
View source
Viruses infect computers by
Replicating
code in other progrmas and comps and
delete
, corrupt files
View source
Worms infect by
Replicating
and
slow down
computer
View source
Trojan horse
works by
Disguising as a
program
that the user wants but once inside ,
hidden code
takes control and causes damage to comp
View source
Ransomware
is
Holds computer hostsge by locking or
encrypting
access, once paid access
restored
View source
Unpatched
software
Software
and
security
updates not installed so vulnrable
View source
Out
of date
antiware
Antivirus not
regularly updated
so virus not
detected
View source
Social engineering
Obtain information by
deceiving
people
View source
The
Cloud
is
Software and
devices
that run on
comp
View source
Shoulder surfing
Obtain info by
observing
as they input either over their
shoulder
or cctv camera
View source
Phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into
surrendering private information
View source
Brute force attack
Tries
every combo of
password
till correct
View source
Antimalware
Detects and eliminates
malicious
software
View source
Signature is a
Unqiue
code for a
virus
View source
Pros and cons local hosting
PROS:
Run
faster
Less
expensive
Full control of website
Full control
CONS:
Need
knowledge
Bandwidth
issue
Responsible for
backups
View source
Passwords rules
Lower
cse
Upper
case
Symbol
Number
View source
Physical security
Prevented by physicsl methods e.g guard ,
locks
,
fences
View source
Penetration
testing
Emply
poeple
to hack systems to find
security holes
View source
See all 84 cards