Revision Mat 1 Network Fundamentals
Revision Mat 1 Network Fundamentals
Shoulder Surfing SQL Injection DoS Attack Password-based IP Address Spoofing Social Engineering
- This type of attack uses direct - This is a technique where malicious - This is a technique where malicious
5. Application Layer - The following types of password - IP address spoofing involves an - Social engineering involves tricking
observation to get information from users can inject SQL commands into users can inject SQL commands into attacks can be carried out by an attacker changing the IP address of a user into giving out sensitive
a user. existing SQL statements. existing SQL statements. individual / computer program: a website so that a visitor who types information such as a password by
in the URL of a website is taken to a posing as a system administrator.
- It is relatively simple to perform as
it can involve standing next to
someone and watching them as
- Injected SQL commands can alter
SQL statements and compromise
the security of information held in
- Injected SQL commands can alter
SQL statements and compromise
the security of information held in
4. Transport Layer - Dictionary Attack
- Brute Force Attack
fraudulent website.
3. Network Layer
Forms of Cyberattack Types of Malware Methods of Identifying
Typical Contents of TCP/IP Packet Vulnerabilities in Computer Systems Typical Protocol Rules
In Mathematics 4 x 2 is-the.
The source address
- The destination address
Trojan
Virus
Worm 2. Data Link Layer - The process of how the two devices will establish their readiness to communicate with
one another
- Information which enables the data to be reassembled into its original form - How the sending device will determine that it has finished sending a message.
Keylogger
- The data compression method to be used
- Other tracking information Adware
- How the receiving device will indicate that a message has been received
- The data itself
- A checksum that checks that the data has not been corrupted
Spyware
1. Physical Layer
A computer network is a group of computer systems and other computing hardware devices that are linked together.
Through the use of communication channels, networks enable communication and resource-sharing to take place among
users. In simple terms a computer network can be defined as two or more computers which are connected together.
Network Fundamentals | Glossary
Network Network Interface Card LAN WAN Switch Hub Router Gateway
• A computer network is a group of • A NIC (Network Interface Card) • A network can be set up as a local • A wide area network is created • A switch is used to network multiple • A network hub is a device that • A router is a hardware device that • A gateway is a hardware device that
computer systems and other enables desktop and laptop area network which means it when multiple LANs are connected computers together. allows multiple computers to routes data from a LAN to another acts as a “gate” between two
computing hardware devices that computers to connect to a network. operates over a relatively small area together. communicate with each other over a network connection. computer networks.
are linked together. e.g. a single building. network.
Mesh Packet Circuit Switching Packet Switching Protocol Ethernet protocol Wi-Fi TCP/IP
• In this type of network topology • A packet is a small amount of • Circuit switching provides a • The process of sending and receiving • A protocol is an agreed set of rules, • Wired connectivity. • Wireless connectivity. • Transmission Control Protocol /
each workstation is interconnected computer data sent over a network. dedicated temporary link between packets is known as “packet- which enables two devices to Internet Protocol is the name given
with each other.. two nodes which allows data to be switching”. Packet switching works communicate together. to the protocol stack which the
transmitted. by delivering packets of data from Internet is built upon.
one node to another using a
designated device such as a switch
or router.
HTTP HTTPS POP3 SMTP IMAP Routing Node Domain Name System
• Allows web pages to be shared • A secure version of HTTP and it • Post Office Protocol 3 is a protocol • Simple Mail Transfer Protocol, • Internet Message Access Protocol • Routing determines the path which • Any system or device connected to a • The Domain Name System (DNS)
across different computers and works together with another for receiving emails, in which emails within this protocol mail servers use transfers emails between computer data packets take in order to reach network is known as a node. converts Internet domain and host
browsers. protocol known as Secure Sockets are received and stored by an email this protocol to send and receive systems via the Internet and is also their intended destination. names like those in URLs from a web
Layer (SSL), to transport data server with a client downloading mail messages, mail applications generally used for email retrieval browser into IP addresses.
securely. messages when ready. typically only use SMTP for sending and storage as an alternative to
messages to a mail server. POP.
IP Address Physical Layer Data Link Layer Network Layer Transport Layer Application Layer Protocol Stack
• Every device on a network needs a • In the TCP/IP model the physical • In the TCP/IP model the data link • In the TCP/IP model the network • In the TCP/IP model the transport • In the TCP/IP model the application • A protocol stack is a set of protocols
unique identifier to ensure that data layer transmits the raw data. It layer sends data from the network layer is responsible for the layer ensures data is transferred layer provides interfaces to the that work together to provide
is sent to the specific computer that consists of hardware such as layer to the physical layer. It divides addressing and routing of data. from one destination to another, software to allow it to use the networking capabilities.
requests it. This unique identifier for switches and routers. the data to be sent into data reliably and without errors. network. Examples of software
a computer system on a network is frames. include email, file transfer protocol
known as the IP address. (FTP) and the World Wide Web
(WWW).