Software that is specifically designed to detect virsuses and protect a computer and files from harm.
Distributed Deniral of Service
An automated attack that is launched that is launched from more than one zombnie computer at the the same time.
Software program or hardare device designed to precent unauthorized access to computers or networks.
set of meausers intended to protect and defend information by ensuring their availability, integrity, authentication, confiendtaility, and nonrepudiation.
virtual commmunications gateway or path that enables a computer to organize requests for information.
A network that uses radio waves instead of wires or cable as its transmission medium.
Computer that is controlled by a hacker who uses it to launch attacks on other computer systems.
A hacker who breaks into systems just for the challenge of it (and who doesn't wish to steal or wreak havoc on the systems). Such hackers tout themselves as experts who are performing a needed service for society by helping companies realize the vulnerabilities that exist in their systems.
Computer Program that apprears to be something useful but at the same time does something malicios in the background.
a software program capable of reproducing itself that can spread from one computer to the next over a network
The process of assigning Internet Protocol (IP) addresses when users log on using their Internet service provider (ISP). The computer is assigned an address from an available pool of IP addresses.
In a wireless network, a device that translates the electronic data that needs to be sent along the network into radio waves and then broadcasts these radio waves to other network nodes.
A network, consisting of client and server computers, in which the clients make requests of the server and the server returns the response.
Data transfer rate
the maximum speed at which data can be transmitted between two nodes on a network
Simple amplications device that receives data packets and retransmits them to all nodes on the same network.
the process of connecting to a wireless network without the permission of the owner of the network
A single copper wire surrounded by layers of plastic insulation and sheathing; used mainly in cable television and cable Internet service.
A device (such as a printer or external hard drive) that can be attached directly to a network instead of needing to attach to a computer on the network.
A heavily secured server located on a special perimeter network between a company's secure internal network and its firewall.
A server that provides client computers with access to information stored in a database.
Someone who has training in computer and peripheral maintenance and repair, network design, and the installation of network software; installs new equipment, configures computers for users, repairs equipment, and assigns network access to users.
A process that involves examining incoming data packets to ensure they originated from, or are authorized by, valid users on the internal network.
a type of network that enables the easy addition of users without affecting the performance of the other network nodes (computers or peripherals)
The oldest type of network design, this topology consists of multiple nodes attached to a central hub, switch, or router.
Twisted Pair Cable
Cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire).
Wireless Access Point
device that will send and recieve wireless signal - connected by cable and positioned (similar to a switch in a Ethernet network) Take the place of a wireless netork adapter
Token ring topology
a network topology configured in a logical ring that complements the token passing protocol
A collaborative network that uses Internet technology to link businesses with their suppliers, customers, or other businesses.
a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange