CIS 105

Technology in Action Chapter 7, 12 and 13
Anitivirus software
Software that is specifically designed to detect virsuses and protect a computer and files from harm.
Distributed Deniral of Service
An automated attack that is launched that is launched from more than one zombnie computer at the the same time.
Software program or hardare device designed to precent unauthorized access to computers or networks.
anyone who unlawfully breaks into a computer systems
Idenity Theft
process by which someone uses personal information about someone else.
Information Assurance
set of meausers intended to protect and defend information by ensuring their availability, integrity, authentication, confiendtaility, and nonrepudiation.
Logical Port
virtual commmunications gateway or path that enables a computer to organize requests for information.
Network Adapter
Device that enables the computer to communciate with the network using protcol.
Peer 2 Peer network
Packet Sniffer
Program that looks at each data packet as it travels on the internet
Device that is installed on a long cable run to amplify a signal.
Device that routes packets of data between two or more networks
Device for transmitting data on a network
The acutual speed of data transfrer that is achieved
Computer program that attches itself to another computer program.
Wireless Network
A network that uses radio waves instead of wires or cable as its transmission medium.
Wireless Markup Language
Computer that is controlled by a hacker who uses it to launch attacks on other computer systems.
White-Hat Hacker
A hacker who breaks into systems just for the challenge of it (and who doesn't wish to steal or wreak havoc on the systems). Such hackers tout themselves as experts who are performing a needed service for society by helping companies realize the vulnerabilities that exist in their systems.
Trojon Horse
Computer Program that apprears to be something useful but at the same time does something malicios in the background.
Time Bomb
Virus that is triggered by the passage of time or on a certain date.
a software program capable of reproducing itself that can spread from one computer to the next over a network
Black-hat hacker
A hacker who uses his knowledge to destroy information or for illegal gain.
Dynamic Addressing
The process of assigning Internet Protocol (IP) addresses when users log on using their Internet service provider (ISP). The computer is assigned an address from an available pool of IP addresses.
network operating system
In a wireless network, a device that translates the electronic data that needs to be sent along the network into radio waves and then broadcasts these radio waves to other network nodes.
Cat 6 Cable
A UTP cable type that provides more than 1 GB of throughput
Client/Server Network
A network, consisting of client and server computers, in which the clients make requests of the server and the server returns the response.
Data transfer rate
the maximum speed at which data can be transmitted between two nodes on a network
Simple amplications device that receives data packets and retransmits them to all nodes on the same network.
Local Area Network
the process of connecting to a wireless network without the permission of the owner of the network
Coaxial Cable
A single copper wire surrounded by layers of plastic insulation and sheathing; used mainly in cable television and cable Internet service.
Network-ready device
A device (such as a printer or external hard drive) that can be attached directly to a network instead of needing to attach to a computer on the network.
Network based on the 802.11 standard
Wide area network
application server
a server that acts as a repository for application software
Bastion host
A heavily secured server located on a special perimeter network between a company's secure internal network and its firewall.
Netwrok decice that is used to send data between two different local area networks (LANS)
Groups of electrical pathways that provide communications between various parts of a computer.
Database server
A server that provides client computers with access to information stored in a database.
Fiber Optic Service
Local Area Network
Network Administrator
Someone who has training in computer and peripheral maintenance and repair, network design, and the installation of network software; installs new equipment, configures computers for users, repairs equipment, and assigns network access to users.
Packet screening
A process that involves examining incoming data packets to ensure they originated from, or are authorized by, valid users on the internal network.
small pieces of information passed between computers
Scalable Network
a type of network that enables the easy addition of users without affecting the performance of the other network nodes (computers or peripherals)
Star topology
The oldest type of network design, this topology consists of multiple nodes attached to a central hub, switch, or router.
Twisted Pair Cable
Cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire).
Wireless Access Point
device that will send and recieve wireless signal - connected by cable and positioned (similar to a switch in a Ethernet network) Take the place of a wireless netork adapter
Token ring topology
a network topology configured in a logical ring that complements the token passing protocol
Wireless Access Point
Virtual Private Network
A collaborative network that uses Internet technology to link businesses with their suppliers, customers, or other businesses.
a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
the rules that must be observed for two electronic devices to communicate with each other