Cybersecurity Fundamentals

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is NOT a major type of computer network classification based on connecting media?

  • Metropolitan Area Network (MAN)
  • Local Area Network (LAN)
  • Personal Area Network (PAN)
  • Virtual Private Network (VPN) (correct)

In a computer network, which of the following best describes what a 'host' does?

  • Manages network traffic by directing data packets to their intended destinations.
  • Serves as a connection point for devices in a particular network segment.
  • Regulates access to the network based on predefined security rules.
  • Acts as a physical or virtual endpoint capable of both sending and receiving data. (correct)

Which of the following is the primary function of a firewall in network security?

  • To provide wireless connectivity to devices within a local network.
  • To forward data packets between different networks.
  • To filter network traffic and block unauthorized access to a network. (correct)
  • To assign IP addresses to devices connected to the network.

Which of the following best describes the function of a network switch?

<p>To direct data packets between devices within the same network. (B)</p> Signup and view all the answers

What hardware component is essential for connecting multiple networks and determining the best data path?

<p>Router (C)</p> Signup and view all the answers

Which network topology connects each device to a central hub or switch??

<p>Star (A)</p> Signup and view all the answers

Which of the following is a defining characteristic of fifth-generation computers?

<p>Powered by artificial intelligence (AI) (D)</p> Signup and view all the answers

What technology primarily characterized the second generation of computers?

<p>Transistors (C)</p> Signup and view all the answers

Which technology is most closely associated with the third generation of computers?

<p>Integrated Circuits (ICs) (D)</p> Signup and view all the answers

What advancement facilitated the rise in popularity of fourth-generation computers?

<p>The development of Very Large Scale Integration (VLSI) microprocessors. (B)</p> Signup and view all the answers

Which of the following best describes 'quantum computing'?

<p>A computing approach that uses quantum mechanics to solve complex problems. (A)</p> Signup and view all the answers

What is the primary focus of nanotechnology?

<p>Developing and using structures at the atomic and molecular scale. (D)</p> Signup and view all the answers

Which of the following represents a core principle of parallel processing?

<p>Utilizing multiple processing units to perform calculations simultaneously. (A)</p> Signup and view all the answers

Which term accurately describes the branch of computer science focused on creating machines that can simulate human thought processes and make decisions?

<p>Artificial Intelligence (AI) (A)</p> Signup and view all the answers

Which of these is a common service provided through the internet?

<p>All of the above (D)</p> Signup and view all the answers

Which of the following best describes the role of 'protocols' in computer networks?

<p>Established rules for data formatting and transmission. (C)</p> Signup and view all the answers

Consider a scenario where a computer needs to access services outside its immediate network. Which element is primarily responsible for facilitating this connection?

<p>Router (D)</p> Signup and view all the answers

What distinguishes an 'edge router' from a 'core router'?

<p>An edge router is the first point of contact between a network and the Internet, while a core router manages internal network traffic. (A)</p> Signup and view all the answers

Switches use _ to forward data to destination.

<p>MAC address (C)</p> Signup and view all the answers

What role does a server play in a computer network?

<p>It provides and manages resources and services for other devices on the network. (C)</p> Signup and view all the answers

Which of the following actions are performed by a computer?

<p>All of the above (D)</p> Signup and view all the answers

A computer system is classified into hardware and software components, which are..?

<p>Complementary parts of a single unit. (A)</p> Signup and view all the answers

What technology was UNIVAC 1 based on?

<p>Transsitor (C)</p> Signup and view all the answers

What is the function of network protocols?

<p>Format, send and receive data (D)</p> Signup and view all the answers

Which layer is the "end user layer"?

<p>Application (D)</p> Signup and view all the answers

End to end connection happen in which transport layer?

<p>TCP and UDP (D)</p> Signup and view all the answers

What is a key characteristic of twisted pair cable screening?

<p>Shielding helps to reduce electromagnetic interference. (A)</p> Signup and view all the answers

In the context of network connectivity, what does bandwidth refer to?

<p>The amount of data that can be transmitted per unit of time. (A)</p> Signup and view all the answers

What is the primary function of a hub in a computer network?

<p>To connect multiple devices in a network, repeating all incoming traffic to all connected devices. (B)</p> Signup and view all the answers

How does a firewall protect a network connected to the Internet?

<p>By blocking unauthorized access and malicious content from entering the network. (D)</p> Signup and view all the answers

What is the role of the Internet cloud in the context of Internet services?

<p>It is a general term for the entire infrastructure of the Internet. (D)</p> Signup and view all the answers

Which item is typically used for undersea for the backbone of the internet?

<p>Fiber cables (C)</p> Signup and view all the answers

In an IPv4 packet structure, what is a typical role of the TTL (Time To Live) field?

<p>Sets a limit on the number of hops a packet can take to prevent indefinite looping. (B)</p> Signup and view all the answers

In network communications, what is the difference between TCP and UDP and their applicability?

<p>TCP is connection-oriented and ensures reliable delivery, while UDP is connectionless and faster, ideal for applications like video streaming. (B)</p> Signup and view all the answers

What is a common attribute shared by both hosts and servers on a computer network?

<p>Ability to connect to a network. (C)</p> Signup and view all the answers

A network that covers a large geographical area, such as a country or continent, is known as what type of network?

<p>Wide Area Network (WAN) (B)</p> Signup and view all the answers

Which type of network is commonly used to connect computers and devices within a limited area such as a home, school, or office building?

<p>Local Area Network (LAN) (B)</p> Signup and view all the answers

Which cable type can effectively prevent signal interference and support higher bandwidths.

<p>Coaxial Cable (A)</p> Signup and view all the answers

Flashcards

What is a Computer

An electronic device that processes raw data into meaningful information.

Computer System Components

The components are divided into two major categories: Hardware and Software.

First Generation Computers

Based on vacuum tubes. Invented by J P Eckert and J W Mauchy between 1943 and 1945.

Second Generation Computers

Based on transistor technology.

Signup and view all the flashcards

Third Generation Computers

Based on integrated circuits or ICs, which miniaturized transistors.

Signup and view all the flashcards

Fourth Generation Computers

Very large-scale integration (VLSI) microprocessors became popular.

Signup and view all the flashcards

Fifth Generation Computers

Powered by artificial intelligence (AI) and ultra-large-scale integration (ULSI).

Signup and view all the flashcards

Artificial Intelligence (AI)

Simulation of human intelligence processes by machines, especially computer systems.

Signup and view all the flashcards

Quantum Computing (QC)

A multidisciplinary field using quantum mechanics to solve complex problems faster than classical computers.

Signup and view all the flashcards

Nanotechnology

Designing and using structures, devices, and systems by manipulating atoms and molecules at nanoscale.

Signup and view all the flashcards

Parallel Processing

A computing technique using multiple central processing units (CPUs) to concurrently execute tasks.

Signup and view all the flashcards

Types of Networks

Classified into Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN).

Signup and view all the flashcards

Internet Services

Voice and Video calls, Chats, Fax, Email, Social Media, Instant messaging, Financial Services, Bill Payments, Online shopping ,Video conferencing

Signup and view all the flashcards

Network Topologies

The networks' arrangement of nodes and connections, including Ring, Mesh, Star, Line, Tree, and Bus.

Signup and view all the flashcards

Elements of a Computer Network

Hosts, Routers, Switches, Hubs, Firewalls, Servers, Protocols, and Connectivity.

Signup and view all the flashcards

Host in a Network

A computer or device connected to a network that can share and consume resources.

Signup and view all the flashcards

Server

Software or hardware that provides services to other programs or devices on the network.

Signup and view all the flashcards

Routers

Forwards data packets between networks.

Signup and view all the flashcards

Edge Router

The router that acts as the first bridge between the Internet and a local network.

Signup and view all the flashcards

Core Router

A central router within a network maintaining info of the entire network.

Signup and view all the flashcards

Switches

Separate data packets within a corporate network, distributing them based on MAC addresses.

Signup and view all the flashcards

Firewalls Purpose

Firewalls are the defense wall of corporate network connected to the Internet.

Signup and view all the flashcards

Hosts(End-Point)

End terminals, such as computers, mobile devices, tablets, printers, etc., that use Internet services.

Signup and view all the flashcards

Servers End-Point

Caters to requests from hosts.

Signup and view all the flashcards

Internet Cloud

General name of the entire infrastructure of the Internet; consists of small networks.

Signup and view all the flashcards

Network Protocols

A set of established rules that governs how data are formatted, sent, and received in a network.

Signup and view all the flashcards

Connectivity

All devices are connected to the network through different media, topologies, and strategies.

Signup and view all the flashcards

Study Notes

Course Evaluation

  • 7th Grade exam has a 30% practical work weighting, equivalent to 30 marks.
  • 12th Grade exam has a 20% practical work weighting, equivalent to 20 marks.
  • Year work is assessed with a project, weighted at 10%, equivalent to 10 marks.
  • Final exams are weighted at 40%, equivalent to 40 marks.

Reference Textbook

  • "Cybersecurity Fundamentals: A Real-World Perspective" by Kutub Thakur and Al-Sakib Khan Pathan, published by CRC Press.

Course Outline

  • Course Introduction is the first topic.
  • Second topic is the Network Model and Top Layered HTTP Application.
  • Third topic is Cybersecurity Basics.
  • Cyberattacks and Vulnerabilities is the fourth topic.
  • Fifth topic is Computer Malware and classification.
  • Cryptography basics – Part I.
  • Cryptography basics – Part II.
  • Countermeasures for Cyberattacks – Part I.
  • Countermeasures for Cyberattacks – Part II.
  • Wireless Network Security basics.
  • E-commerce Security basics.
  • Cybersecurity Risk Management basics.

Introduction

  • A computer is an electronic device that processes raw data through input components, transforms it into meaningful information, and produces that information through output components for use.
  • A modern computer system unit consists of software and hardware components.

History of Computers

First Generation (1937–1946)

  • The first-generation computers were based on vacuum tubes.
  • The first machine was invented by J P Eckert and J W Mauchy between 1943 and 1945.

Second Generation (1947–1962)

  • Second-generation computers used transistor technology.
  • The first commercial computer, UNIVAC 1, was based on transistor technology.

Third Generation (1963–1971)

  • Third-generation computers used integrated circuits (ICs).
  • The advent of silicon miniaturized transistors, enabling ICs for electronic circuitries.

Fourth Generation (1971–2010)

  • Fourth-generation computers became popular and relied on very large-scale integration (VLSI) microprocessors.

Fifth Generation (2010–Present)

  • Fifth-generation computers are powered by artificial intelligence (AI), ultra-large-scale integration (ULSI), and robotic processes.

Future Machines

Artificial Intelligence (AI)

  • AI simulates human intelligence processes using machines, especially computer systems.
  • AI enables machines to learn from experience, adapt to new inputs, and perform human-like tasks.
  • Current AI applications, like chess-playing computers and self-driving cars, rely on deep learning and natural language processing.

Quantum Computing (QC)

  • Quantum computing is a multidisciplinary field involving computer science, physics, and mathematics.
  • It utilizes quantum mechanics to solve complex problems faster than classical computers.

Nanotechnology

  • Nanotechnology involves designing, producing, and using structures, devices, and systems by manipulating atoms and molecules at nanoscale.
  • Nanoscale is defined as dimensions on the order of 100 nanometers (100 millionth of a millimeter) or less.

Parallel Processing

  • Parallel processing is a computing technique where multiple streams of calculations or data processing tasks occur concurrently.
  • This is achieved through numerous central processing units (CPUs) working together.

Introduction to Computer Networks

Types of Networks

  • Networks are classified into three major types irrespective of whether they use wireless or wired connections.
  • Local Area Network (LAN).
  • Metropolitan Area Network (MAN).
  • Wide Area Network (WAN).

The Internet

Major Services Offered

  • Voice and Video calls.
  • TV Streaming.
  • Live movies.
  • Chats and Email.
  • Gaming and file sharing.
  • Faxing.
  • Data transfer.
  • Social media.
  • E-banking and data sotrage.
  • Instant Messaging.
  • Financial services.
  • Bills payments.
  • E-marketing.
  • Online shopping.
  • Remote healthcare and remote working.
  • Video conferencing.
  • E-learning.
  • Counting.

Introduction to Computer Networks

Network Topologies

  • Ring
  • Mesh
  • Star
  • Fully connected
  • Line
  • Tree
  • Bus

Elements of Computer Network

  • Basic network elements are hosts, connecting media, and connectors.
  • Modern networks include:
  • Hosts
  • Routers
  • Switches
  • Hubs
  • Firewalls
  • Servers
  • Protocols
  • Connectivity

Elements of Computer Network

Hosts vs. Servers

      - Host : A computer or device that can be connected to a network, it can share and consume resources and can be connected to other devices by means of the internet
      - Servers : A piece of software/hardware that carries out services for other programs/devices on the network, that can also share resources as well a s provide services and can be connected through LAN or internet

Elements of the Internet

  • The edge router is the first bridge between the Internet and a local network.
  • The core router is a central router within a network that maintains information for the entire network.
  • Switches separate data packets within corporate networks and isolate small business units.
  • Switches distribute data packets at the data link layer based on MAC addresses.
  • Firewalls are the defense wall of corporate networks connected to the Internet.
  • They are typically connected after the edge router to protect internal devices from unauthorized users.
  • Hosts are end terminals that use Internet services, including computers, mobile devices, tablets, watches, printers, and fax machines.
  • Hosts access the Internet through client applications like web browsers.
  • Servers are specific hosts configured to handle requests from within or from external networks (Internet cloud).
  • The Internet Cloud is the entire infrastructure of the Internet.
  • The cloud is an abstract representation of the Internet consisting of small networks.
  • Data is uploaded, downloaded, and saved in the cloud using Internet services.

Elements of the Internet

Protocols

  • Network protocols are established rules for formatting, sending, and receiving data across networks, ensuring communication despite differing infrastructures.
  • Successful communication requires devices to accept and follow protocol conventions.
  • Application Layer: End User Layer - HTTP, FTP, IRC, SSH, DNS
  • Presentation Layer: Syntax Layer - HSL, SSH, IMAP, FTP MPEG, JPEG
  • Session Layer: Synch & Send to Port - APIs Sockets, WinSock
  • Transport Layer: End-to-End Connections - TCP, UDP
  • Network Layer: Packets - IP, ICMP, IPSec, IGMP
  • Data Link Layer: Frames - Ethernet, PPP, Switch, Bridge
  • Physical Layer: Physical Structure - Coax, Fibre, Wireless, Repeaters

Connectivity

  • Hosts are typically connected to the local switch/router via cable or wirelessly.
  • Routers connect to edge routers through Gigabit Ethernet copper or fiber cables.
  • The connection between edge routers and the backbone depends on bandwidth volume.
  • Edge routers connect to the backbone via fiber or satellite links.
  • The Internet backbone consists of undersea fiber cables or satellite links across major regions.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Use Quizgecko on...
Browser
Browser