TM255 Course Study Notes

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are three potential threats to hardware assets?

The three potential threats to hardware assets are theft, physical damage, and tampering.

How does tampering with hardware affect its accessibility?

Tampering with hardware can restrict or deny normal service and access to the asset.

In what way can physical damage pose a threat to hardware?

Physical damage can render hardware unusable, leading to loss of functionality and service interruptions.

What might be a consequence of stolen hardware for a business?

<p>Stolen hardware can lead to financial loss, data theft, and interruption of business operations.</p> Signup and view all the answers

Why is it important for organizations to understand the threats to their hardware assets?

<p>Understanding these threats allows organizations to implement effective security measures and mitigation strategies.</p> Signup and view all the answers

What does segmentation of data involve?

<p>Segmentation of data involves breaking a message into multiple small chunks and sending each segment separately.</p> Signup and view all the answers

What is one major benefit of data segmentation?

<p>One major benefit of data segmentation is improved transmission efficiency, allowing for quicker and more reliable transfer of large messages.</p> Signup and view all the answers

How does segmentation help maintain connection to an AP?

<p>Segmentation allows devices to connect to the access point (AP) with the strongest signal by efficiently managing data packets.</p> Signup and view all the answers

In terms of error handling, how does segmentation benefit data communication?

<p>Segmentation benefits data communication by allowing the retransmission of only the segments that encounter errors, rather than the entire message.</p> Signup and view all the answers

What happens if a segment is lost during transmission?

<p>If a segment is lost during transmission, only that specific segment needs to be resent, not the whole message.</p> Signup and view all the answers

What is the primary reason wireless networks are more vulnerable than wired networks?

<p>Wireless networks are more vulnerable due to the nature of their transmission channel, which is accessible remotely.</p> Signup and view all the answers

How does access restriction in a wired LAN contribute to network security?

<p>Access is limited to individuals with physical access to a network port, reducing unauthorized access risks.</p> Signup and view all the answers

What role does physical access play in securing a wired network?

<p>Physical access is crucial as it ensures that only authorized devices can connect to the network.</p> Signup and view all the answers

In what ways does the nature of wireless transmissions create security challenges?

<p>Wireless transmissions can be intercepted easily since they are broadcast over the air, making them more susceptible to eavesdropping.</p> Signup and view all the answers

What aspects of wired networking architecture enhance its stability against unauthorized access?

<p>Wired networking architecture relies on physical connections that require direct access, effectively limiting networking opportunities for unauthorized users.</p> Signup and view all the answers

What is a key risk associated with unauthorized use in wireless networks?

<p>Bandwidth theft is a key risk associated with unauthorized use in wireless networks.</p> Signup and view all the answers

How does eavesdropping pose a threat to wireless networks?

<p>Eavesdropping allows unauthorized users to intercept and access sensitive information being transmitted over the network.</p> Signup and view all the answers

What does threat to network availability refer to in the context of wireless networks?

<p>Threat to network availability refers to the potential disruptions that can affect the wireless network’s accessibility for legitimate users.</p> Signup and view all the answers

Why is unauthorized use of bandwidth a concern for network administrators?

<p>It's a concern because it can degrade service quality and limit the resources available to legitimate users.</p> Signup and view all the answers

What proactive measures can be taken to mitigate eavesdropping in wireless networks?

<p>Implementing encryption protocols can help mitigate eavesdropping in wireless networks.</p> Signup and view all the answers

What is a key advantage of WPA/WPA2-personal options compared to WPA/WPA2-enterprise?

<p>WPA/WPA2-personal options are easier to set up.</p> Signup and view all the answers

In what type of networks are WPA/WPA2-personal options most commonly used?

<p>They are used in most home or simple Wi-Fi networks.</p> Signup and view all the answers

How can the network name associated with WPA/WPA2-personal options be modified?

<p>The SSID can be changed.</p> Signup and view all the answers

Name one disadvantage of using WPA/WPA2-personal over WPA/WPA2-enterprise.

<p>WPA/WPA2-personal may lack the advanced security features found in enterprise options.</p> Signup and view all the answers

What security protocol do WPA/WPA2-personal options primarily utilize?

<p>They primarily utilize a pre-shared key (PSK) mechanism.</p> Signup and view all the answers

How does a GPS receiver determine its location using signals from satellites?

<p>A GPS receiver determines its location by calculating its distance from at least three satellites based on the time taken for the radio signals to reach it.</p> Signup and view all the answers

What role do radio signals play in GPS location determination?

<p>Radio signals from satellites are essential as they carry time-stamped information that allows the GPS receiver to calculate distance.</p> Signup and view all the answers

Why is it necessary for a GPS receiver to obtain signals from more than two satellites?

<p>A GPS receiver needs signals from at least three satellites to accurately triangulate its position on Earth.</p> Signup and view all the answers

What happens if the GPS receiver receives inaccurate signal timing from satellites?

<p>Inaccurate signal timing can lead to incorrect distance calculations, resulting in a faulty location determination.</p> Signup and view all the answers

Explain how the speed of radio signals is utilized in the GPS positioning process.

<p>The speed of radio signals, which is approximately the speed of light, is used to convert the time delay of received signals into distance measurements.</p> Signup and view all the answers

Flashcards

Hardware

The physical components of a computer system, including devices like the CPU, memory, and storage.

Theft

The act of taking something without permission.

Physical damage

Damage to hardware that prevents it from working properly.

Tampering

Unauthorized changes to a device that compromise its security or functionality.

Signup and view all the flashcards

Service denial

Making a service or access unavailable to users.

Signup and view all the flashcards

Data Segmentation

Dividing a large message into smaller, manageable chunks.

Signup and view all the flashcards

Segment

Each smaller chunk of data created during segmentation.

Signup and view all the flashcards

Reassembly

The process of combining multiple segments back into the original message.

Signup and view all the flashcards

Segment Transmission

Sending each segment separately over a network.

Signup and view all the flashcards

Benefit of Segmentation

Allows for efficient and reliable data transfer, especially over unreliable networks.

Signup and view all the flashcards

Transmission channel

The type of communication channel used to send data in a network.

Signup and view all the flashcards

Wired LAN

A wired network uses physical cables to connect devices, making unauthorized access harder.

Signup and view all the flashcards

Wireless LAN

A wireless network uses radio waves to transmit data, allowing access from anywhere within range.

Signup and view all the flashcards

Vulnerability of wireless networks

Wireless networks are more susceptible to security breaches because they rely on open transmission channels.

Signup and view all the flashcards

Physical access control in wired networks

Physical access to a network port is required to connect to a wired network, which limits unauthorized access.

Signup and view all the flashcards

Unauthorized Bandwidth Use

Accessing a wireless network without authorization. This can lead to data theft, network performance issues, and security breaches.

Signup and view all the flashcards

Eavesdropping

Intercepting data transmitted over a wireless network. This allows attackers to gain access to sensitive information like passwords, emails, and financial details.

Signup and view all the flashcards

Threats to Network Availability

Actions that disrupt or prevent access to a wireless network. This can be caused by attacks like denial-of-service (DoS) attacks or accidental configuration errors.

Signup and view all the flashcards

Rogue Access Points

Unidentified wireless networks. These are often created by attackers to lure unsuspecting users into connecting to malicious networks.

Signup and view all the flashcards

Evil Twin Attack

A type of wireless network attack that broadcasts a fake Wi-Fi network with a similar name to a legitimate one. Users connecting unknowingly to this network can have their data intercepted and stolen.

Signup and view all the flashcards

GPS Location Determination

GPS receivers determine their location by calculating the distance to multiple satellites using the time it takes radio signals to travel.

Signup and view all the flashcards

Radio Signal Speed

The speed of radio signals from satellites is used to calculate the distance between the GPS receiver and each satellite.

Signup and view all the flashcards

Signal Travel Time

GPS receivers measure the time it takes for radio signals from each satellite to reach them.

Signup and view all the flashcards

Distance and Time Relationship

The time it takes radio signals to travel from satellites to a GPS receiver is influenced by the distance between them.

Signup and view all the flashcards

Distance Calculation

By knowing the speed of radio signals and the time it takes them to reach the receiver, GPS receivers can calculate the distance to each satellite.

Signup and view all the flashcards

WPA/WPA2-Personal Setup

WPA/WPA2-Personal is easier to set up than WPA2-Enterprise because it uses a pre-shared key (PSK) instead of a complex authentication server. This means the user sets up the network using a password, making it a simpler configuration for home users.

Signup and view all the flashcards

WPA/WPA2-Personal Use

WPA/WPA2-Personal is commonly used in home networks and smaller businesses because of its ease of use. It's a more accessible option for users who don't need the advanced security features of WPA2-Enterprise.

Signup and view all the flashcards

SSID

The SSID (Service Set Identifier) is the name of your Wi-Fi network that appears on your devices' list of available networks. It's what you see when you search for Wi-Fi.

Signup and view all the flashcards

Changing the SSID

You can customize the name of your Wi-Fi network, which allows you to distinguish it from other networks. The name you choose will be displayed on devices searching for Wi-Fi networks.

Signup and view all the flashcards

WPA2-Enterprise Security

WPA2-Enterprise is more secure than WPA/WPA2-Personal because it uses an authentication server to verify user credentials. This makes it a better choice for businesses and organizations that have stricter security requirements.

Signup and view all the flashcards

Study Notes

TM255 Study Notes

  • Course title: TM255
  • Lecturer: Mohammed Musa
  • Institution: Mahmoud's institute of quality
  • Course description: Study notes for TM255

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

TM255 Lecture Notes PDF

More Like This

Use Quizgecko on...
Browser
Browser