Level 1 Level 3
103 words 0 ignored
Ready to learn Ready to review
Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.
active attack (networks)
A network attack where the hacker attempts to change data or introduce malware.
Software designed to stop malware from damaging a computer or network.
A vulnerability in a computer or network's security that a hacker could exploit.
The amount of data that can be transferred on a network in a given time.
brute force attack
A network attack which uses software to crack security passwords through trial and error.
A network topology in which all devices are connected to a single backbone cable.
cat 5e/cat 6 cable
Standards for copper Ethernet cables used on LANs.
A small range of Wi-Fi frequencies.
A number used to check if a packet of data sent between network s has been received correctly.
A device which requests data from a server.
A type of network managed by a server, which takes requests from client devices.
The use of the Internet to store files and provide software. Also known as the cloud.
A network attack which stops users from accessing a part of a network or website.
domain name server (DNS)
A server which stores website domain names and their IP addresses.
A small piece of hardware which allow devices to connect to a network wirelessly.
dynamic IP address
An IP address which is automatically assigned to a device before it accesses a network.
Coding ('encrypting') data so that it can only be decoded ('decrypted') with the correct key.
Network protocol used on LANs.
fibre optic cable
A high performance cable that uses light to carry data.
Copying files between devices on a network.
The unit used to send data via Ethernet over a LAN.
A protocol used to access, edit and move files on another device, like a server.
File Transfer Protocol
A person who tries to illegally access or attack a computer network or device.
The physical parts of a computer system.
When a business uses its servers to store the files of another organisation.
A location where people can access a wireless access point.
Used by web browsers to access websites and communicate with web servers.
Hyper Text Transfer Protocol
an encrypted version of HTTP
Hyper Text Transfer Protocol (Secure)
A protocol used to retrieve emaiIs from a server.
Internet Message Access Protocol
Checking that an input meets certain criteria.
A network attack where someone within an organisation exploits their network access to steal information.
The ultimate/biggest/best WAN in the world, based around the TCP/IP protocol.
The protocol responsible for packet switching.
A unique identifier given to a device when it accesses an IP network.
A network which only covers a single site.
Local Area Network
Checking data on a network for cyber security purposes.
Groups of protocols that have similar functions.
media access code
A unique identifier assigned to a device that cannot be changed.
Malicious software created to damage or gain illegal access to computer systems.
A network topology where every device is directly or indirectly connected to every other without a central switch or server.
The main circuit board in a computer that other hardware connects to.
Investigations that organisations undertake to find the cause of attacks on their network.
A set of rules and procedures an organisation will follow to ensure their network is protected against attacks.
Protection against network attacks.
An internal piece of hardware that allows a device to connect to a network.
network interface controller
A network in which all devices are equal and connect directly to each other.
The process of directing data packets on a network using routers and the IP protocol.
Small, equal-sized units of data used to transfer files over networks.
passive attack (networks)
Where a hacker monitors data travelling on a network.
A string of characters that allows access to certain parts of a computer or program.
payload (network packets)
The part of a packet with the actual data.
pentesting (penetration testing)
The process of simulating attacks on a network to identify weaknesses.
When criminals send emails or texts to someone claiming to be a well-known business.
A protocol used to retrieve emails from a server.
post office protocol 3
A set of rules for how devices communicate over a network.
A type of malware that uses encryption to lock a user out of their files.
A network topology where the devices are connected in a ring, with data moving in one direction.
A piece of hardware responsible for transmitting data between networks.
A type of malware that creates false messages to trick the user into following malicious links.
A device which provides services for other devices (clients), e.g. file storage/web pages/printer access.
Used to send emails and transfer emails between servers.
Simple Mail Transfer Protocol
A way of gaining illegal access to data or networks by influencing people.
A legal agreement that states how software can be used and distributed.
A fake website that tricks users into thinking it's another well-known website.
A type of malware which secretly monitors and records user actions.
sometimes referred to known as SEE-QUIL or ES-QUE-ELLE
Structured Query Language
A piece of SQL code which can be typed into an input box to try and attack the SQL database.
A type of network topology where all devices are connected to a central switch or server which controls the network.
static IP address
A permanent IP address.
Connects devices together on a LAN and directs frames of data to the correct device.
A set of protocols which dictate how data is sent over the Internet
Transmission Control Protocol (TCP) & Internet Protocol (IP)
How the devices in a network are connected together.
The amount of data travelling on a network.
A type of malware which is disguised as legitimate software.
An address used to access web servers and resources on them.
Uniform Resource Locator
user access levels
Controls which files or areas of the network different groups of users can access.
Checking that an input meets certain criteria.
A software-based network that exists between devices on a physical network.
A type of malware which spreads by attaching itself to files.
A network which connects networks in different geographical locations.
Wide Area Network
A piece of hardware that allows devices to connect wirelessly.
wireless access point
The standard used for wireless connections between devices.
Computers or networks which are connected using physical cables to allow the transmission of information
Computers or networks which are connected using radio or infra-red signals to allow the transmission of information
A type of malware which replicates itself.
The collection of websites hosted on the Internet.
WORLD Wide Web