Podcast
Questions and Answers
What type of attack can lead to a denial of service by overwhelming a specific resource?
What type of attack can lead to a denial of service by overwhelming a specific resource?
Which threat is designed to collect user information for advertising and marketing purposes?
Which threat is designed to collect user information for advertising and marketing purposes?
What is the primary purpose of tracking cookies?
What is the primary purpose of tracking cookies?
Which type of program gathers personal information from a computer without the user's permission?
Which type of program gathers personal information from a computer without the user's permission?
Signup and view all the answers
What could be a consequence of spyware on a computer?
What could be a consequence of spyware on a computer?
Signup and view all the answers
How is adware different from spyware?
How is adware different from spyware?
Signup and view all the answers
Which protocol governs the way a web server and client interact?
Which protocol governs the way a web server and client interact?
Signup and view all the answers
Which protocol is responsible for managing the individual conversations between web servers and clients?
Which protocol is responsible for managing the individual conversations between web servers and clients?
Signup and view all the answers
What role does Internet Protocol (IP) play in the communication process?
What role does Internet Protocol (IP) play in the communication process?
Signup and view all the answers
Which model was developed by the International Organization for Standardization (ISO) in 1984?
Which model was developed by the International Organization for Standardization (ISO) in 1984?
Signup and view all the answers
Which protocol does not specify the interaction of any specific protocols?
Which protocol does not specify the interaction of any specific protocols?
Signup and view all the answers
What function does TCP perform on HTTP messages before sending them to the destination host?
What function does TCP perform on HTTP messages before sending them to the destination host?
Signup and view all the answers
What is the term used to refer to a person or organization that sends spam?
What is the term used to refer to a person or organization that sends spam?
Signup and view all the answers
How do spammers sometimes gain control of home computers to send spam?
How do spammers sometimes gain control of home computers to send spam?
Signup and view all the answers
What type of software has been used more recently by spammers to send spam?
What type of software has been used more recently by spammers to send spam?
Signup and view all the answers
Which of the following should be a part of a security policy?
Which of the following should be a part of a security policy?
Signup and view all the answers
What is the purpose of a security policy?
What is the purpose of a security policy?
Signup and view all the answers
Why is it important for all users of a network to support and follow a security policy?
Why is it important for all users of a network to support and follow a security policy?
Signup and view all the answers
What is Social Engineering in the context of computer and network security?
What is Social Engineering in the context of computer and network security?
Signup and view all the answers
How can an intruder gain access to a network, whether internal or external?
How can an intruder gain access to a network, whether internal or external?
Signup and view all the answers
What is one example of an unintentional internal threat mentioned in the text?
What is one example of an unintentional internal threat mentioned in the text?
Signup and view all the answers
What is a common method used by intruders to exploit human weaknesses?
What is a common method used by intruders to exploit human weaknesses?
Signup and view all the answers
How does an internal threat caused by a trustworthy employee usually occur?
How does an internal threat caused by a trustworthy employee usually occur?
Signup and view all the answers
What does Social Engineering aim to achieve in the context of computer and network security?
What does Social Engineering aim to achieve in the context of computer and network security?
Signup and view all the answers
Which type of network topology involves a direct connection between computers?
Which type of network topology involves a direct connection between computers?
Signup and view all the answers
What is a notable advantage of Bus Topology over other topologies?
What is a notable advantage of Bus Topology over other topologies?
Signup and view all the answers
In which topology does each user set their own permissions?
In which topology does each user set their own permissions?
Signup and view all the answers
Why is Point-to-Point Topology faster and highly reliable?
Why is Point-to-Point Topology faster and highly reliable?
Signup and view all the answers
What is a significant drawback of the Point-to-Point Topology?
What is a significant drawback of the Point-to-Point Topology?
Signup and view all the answers
Why is Bus Topology commonly used in building small networks?
Why is Bus Topology commonly used in building small networks?
Signup and view all the answers
Study Notes
Internal Attacks
- Not all internal attacks are intentional, some can come from trustworthy employees who unknowingly bring security threats into the internal network.
Social Engineering
- Social engineering is a term that refers to the ability of something or someone to influence the behavior of a group of people.
- In the context of computer and network security, social engineering refers to a collection of techniques used to deceive internal users into performing specific actions or revealing confidential information.
Computer Network Threat/Vulnerabilities
- One of the easiest ways for an intruder to gain access, whether internal or external, is by exploiting human behavior.
- A person or organization responsible for sending spam is called a spammer.
- Spammers often make use of unsecured email servers to forward email.
Computer Network Security Policy and Best Practice
- A security policy is a formal statement of the rules that users must adhere to when accessing technology and information assets.
- A security policy should be the central point for how a network is secured, monitored, tested, and improved upon.
- Some things to include in a security policy are: identification and authentication policies, password policies, acceptable use policies, remote access policies, and incident handling procedures.
TCP/IP Model
- The TCP/IP model is used for exchanging information between a web server and a web client.
- The protocols involved in the TCP/IP model are: application, transport, internetwork, and network access protocols.
- HTTP governs the way that a web server and a web client interact.
- TCP is the transport protocol that manages the individual conversations between web servers and web clients.
- IP is responsible for taking the formatted segments from TCP, assigning logical addressing, and encapsulating them into packets for routing to the destination host.
OSI Layer Model and Protocols
- The OSI model was developed by the International Organization for Standardization (ISO) in 1984.
- The OSI model does not specify the interaction of any specific protocols.
- Examples of network devices are: routers, bridges/switches, repeater/hubs.
- Examples of networking media are: cables (coaxial, copper twisted pair, fiber optics cable), or wireless technologies (radio wave, satellite).
Computer Network Topology
- Computer network topology refers to the way in which computers (nodes) are geometrically arranged and connected in a network.
- Types of computer network topologies include: P2P, Bus, Ring, Star, Tree, Mesh, and Hybrid.
Point-to-Point Network Topology
- Advantages: faster and highly reliable, no need for a network operating system, no need for an expensive server, no need for dedicated network technicians.
- Disadvantages: only suitable for small areas, no central backup of files and folders, no security besides permissions.
Bus Topology
- Advantages: low cost, widely used for building small networks, easy to install.
Methods of Attack
- Brute force attacks can cause a denial of service due to excessive traffic to a specific resource or by locking out user accounts.
- Some attacks are designed to collect information about users, which can be used for advertising, marketing, and research purposes.
- Examples of these types of attacks include: Spyware, Tracking Cookies, Adware, and Pop-ups.
Spyware
- Spyware is any program that gathers personal information from a computer without permission or knowledge.
- Spyware can slow down a computer and make changes to internal settings, creating more vulnerabilities for other threats.
Tracking Cookies
- Cookies are a form of spyware, but are not always bad.
- Cookies are used to record information about an Internet user when they visit websites.
Adware
- Adware is a form of spyware used to collect information about a user based on websites they visit.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on different types of computer network topologies including P2P, Bus, Ring, and Star. Learn about how computers are arranged and connected in a network.