CIST 1001 - Chapter 12 - Behind the Scenes: Networking and Security in the Business World
Terms in this set (55)
access card reader
A device that reads information from a magnetic strip on the back of a credit card-like access card.
A method to control which
computer is allowed to use transmission
media at a certain time.
In a network, a type of
topology where the nodes participate in
moving data through the network.
A server that acts as a repository for application software.
The process of identifying
a computer user, based on a login or
username and password. The computer
system determines whether the computer
user is authorized and what level of access is
to be granted on the network.
A server that keeps track of who's logging on to the network and which services on the network are available to each user.
A heavily secured server
located on a special perimeter network
between the company's secure internal
network and its firewall.
biometric authentication device
A device that uses some unique characteristic of
human biology to identify authorized users.
A device that's used to send data
between different collision domains in a
network, depending on where the recipient
device is located.
brute force attack
An attempt to access an account by repeatedly trying different passwords.
bus (linear bus) topology
A system of networking connections in which all devices
are connected in sequence on a single
A characteristic of client/
server networks where the server, not
the individual user, coordinates data
client/server network (server-based
A type of network that uses
servers to deliver services to computers that
are requesting them (clients).
A server that is maintained by
a hosting company and that is connected to
networks via the Internet.
A server that handles all communications between the
network and other networks, including
managing Internet connectivity.
The method used on Ethernet
networks to avoid data collisions; short for
carrier sense multiple access with collision
detection. A node connected to the network
uses carrier sense to verify that no other
nodes are currently transmitting data signals.
When two computers send
data at the same time and the sets of data
collide somewhere in the connection media.
A server that provides client computers with access to information stored in databases.
A characteristic of peer-to-peer networks where the individual user coordinates data security.
A server used to fulfill one
specific function, such as handling e-mail.
electronic data interchange(EDI)
The exchange of large amounts of data in a
standardized electronic format.
A server whose sole function
is to process and deliver incoming and
An area of an intranet that only
certain corporations or individuals can
access; the owner of the extranet decides
who will be permitted to access it.
A server that stores and manages
files for network users or that acts as a
storehouse for files that users can download
Groups of data packets that are sent together in a package.
A computer system that's set up
to attract unauthorized users by appearing to
be a key part of a network or a system that
contains something of great value.
Combining multiple topologies into one network.
Ensuring that information systems contain accurate
information and are adequately secured
A private network set up by a
business or an organization that's used
exclusively by a select group of employees,
customers, suppliers, volunteers, or
A special signal sent to network
nodes alerting them that a data collision has
media access control (MAC)
The physical address, similar to a serial
number, of each network adapter.
A device that enables
the computer (or peripheral) to communicate
with the network using a common data
communication language, or protocol.
The physical or logical arrangement of computers, transmission media (cable), and other network components.
Open Systems Interconnection (OSI)
A networking protocol established by
the Institute of Electrical and Electronics
Engineers (IEEE) that provides guidelines for
Having an external screening router examine incoming data packets to ensure they originated from or
are authorized by valid users on the internal
In a network, a type of topology where the nodes do nothing to move data along the network.
Any object that users carry to identify themselves and that grants them access to a computer system or facility.
A software holding area for print jobs. Also called a print spooler.
A server that manages all client-requested printing jobs for all printers on a network.
A set of rules for exchanging communications.
A server that acts as a
go-between, connecting computers on
the internal network with those on the
external network (the Internet).
ring (loop) topology
A type of network topology where computers and peripherals are laid out in a configuration resembling a
A characteristic of client/server
networks where more users can be easily
added without affecting the performance of
other network nodes.
shielded twisted-pair (STP)
Twisted-pair cable that contains a
layer of foil shielded to reduce interference.
The most widely deployed
client/server network topology, where the nodes
connect to a central communications device
called a switch in a pattern resembling a star.
A device that absorbs a signal
so that it's not reflected back onto parts of
the network that have already received it.
A special data packet used to pass
data in a ring topology network.
The access method used by
ring networks to avoid data collisions.
The radio waves or the physical system (cable) that transports data on a network.
The main technology for achieving
a virtual private network; the placement of
data packets inside other data packets.
virtual private network (VPN)
A network that uses the public Internet communications infrastructure to build a secure, private network among various locations.
Using specialized software
to make individual physical servers behave
as though they are more than one physical
A computer running a
specialized operating system that enables it
to host web pages (and other information)
and to provide requested web pages to
wireless access point (WAP)
Gives wireless devices a sending and receiving
connection point to the network.