0% found this document useful (0 votes)
6 views

Revision Mat 1 Network Fundamentals

Uploaded by

Kian Zadeh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Revision Mat 1 Network Fundamentals

Uploaded by

Kian Zadeh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Network Fundamentals | Revision Mat

Shoulder Surfing SQL Injection DoS Attack Password-based IP Address Spoofing Social Engineering

- This type of attack uses direct - This is a technique where malicious - This is a technique where malicious
5. Application Layer - The following types of password - IP address spoofing involves an - Social engineering involves tricking
observation to get information from users can inject SQL commands into users can inject SQL commands into attacks can be carried out by an attacker changing the IP address of a user into giving out sensitive
a user. existing SQL statements. existing SQL statements. individual / computer program: a website so that a visitor who types information such as a password by
in the URL of a website is taken to a posing as a system administrator.
- It is relatively simple to perform as
it can involve standing next to
someone and watching them as
- Injected SQL commands can alter
SQL statements and compromise
the security of information held in
- Injected SQL commands can alter
SQL statements and compromise
the security of information held in
4. Transport Layer - Dictionary Attack
- Brute Force Attack
fraudulent website.

- The attacker can then use this


- This type of attack is normally
carried out through phishing emails.
they fill out a form, or enter a PIN database systems. database systems. - Guess website to steal sensitive data.
number.

3. Network Layer
Forms of Cyberattack Types of Malware Methods of Identifying
Typical Contents of TCP/IP Packet Vulnerabilities in Computer Systems Typical Protocol Rules
In Mathematics 4 x 2 is-the.
The source address
- The destination address
Trojan
Virus
Worm 2. Data Link Layer - The process of how the two devices will establish their readiness to communicate with
one another
- Information which enables the data to be reassembled into its original form - How the sending device will determine that it has finished sending a message.
Keylogger
- The data compression method to be used
- Other tracking information Adware
- How the receiving device will indicate that a message has been received
- The data itself
- A checksum that checks that the data has not been corrupted
Spyware
1. Physical Layer

A computer network is a group of computer systems and other computing hardware devices that are linked together.
Through the use of communication channels, networks enable communication and resource-sharing to take place among
users. In simple terms a computer network can be defined as two or more computers which are connected together.
Network Fundamentals | Glossary
Network Network Interface Card LAN WAN Switch Hub Router Gateway
• A computer network is a group of • A NIC (Network Interface Card) • A network can be set up as a local • A wide area network is created • A switch is used to network multiple • A network hub is a device that • A router is a hardware device that • A gateway is a hardware device that
computer systems and other enables desktop and laptop area network which means it when multiple LANs are connected computers together. allows multiple computers to routes data from a LAN to another acts as a “gate” between two
computing hardware devices that computers to connect to a network. operates over a relatively small area together. communicate with each other over a network connection. computer networks.
are linked together. e.g. a single building. network.

Bridge Access Point PAN MAN VPN Ring Bus Star


• A bridge connects two or more local • An access point is a device, such as a • A personal area network refers to • A metropolitan area network is • A virtual private network is an • A ring topology is where each • A bus topology is where each • A star topology is where each
area networks (LANs) together. wireless router, that allows wireless the interconnection of devices similar to a local area network, encrypted connection from a device workstation, server, printer etc. is workstation is connected to a single workstation has its own cable that
devices to connect to a network. within the environment of an however unlike a LAN it can span an to a network which takes place over connected together in a ring so each cable known as a backbone which connects to a switch or a hub.
individual user. entire city or campus. the Internet. one is connected to two other links all of them together.
devices.

Mesh Packet Circuit Switching Packet Switching Protocol Ethernet protocol Wi-Fi TCP/IP
• In this type of network topology • A packet is a small amount of • Circuit switching provides a • The process of sending and receiving • A protocol is an agreed set of rules, • Wired connectivity. • Wireless connectivity. • Transmission Control Protocol /
each workstation is interconnected computer data sent over a network. dedicated temporary link between packets is known as “packet- which enables two devices to Internet Protocol is the name given
with each other.. two nodes which allows data to be switching”. Packet switching works communicate together. to the protocol stack which the
transmitted. by delivering packets of data from Internet is built upon.
one node to another using a
designated device such as a switch
or router.

HTTP HTTPS POP3 SMTP IMAP Routing Node Domain Name System
• Allows web pages to be shared • A secure version of HTTP and it • Post Office Protocol 3 is a protocol • Simple Mail Transfer Protocol, • Internet Message Access Protocol • Routing determines the path which • Any system or device connected to a • The Domain Name System (DNS)
across different computers and works together with another for receiving emails, in which emails within this protocol mail servers use transfers emails between computer data packets take in order to reach network is known as a node. converts Internet domain and host
browsers. protocol known as Secure Sockets are received and stored by an email this protocol to send and receive systems via the Internet and is also their intended destination. names like those in URLs from a web
Layer (SSL), to transport data server with a client downloading mail messages, mail applications generally used for email retrieval browser into IP addresses.
securely. messages when ready. typically only use SMTP for sending and storage as an alternative to
messages to a mail server. POP.

IP Address Physical Layer Data Link Layer Network Layer Transport Layer Application Layer Protocol Stack
• Every device on a network needs a • In the TCP/IP model the physical • In the TCP/IP model the data link • In the TCP/IP model the network • In the TCP/IP model the transport • In the TCP/IP model the application • A protocol stack is a set of protocols
unique identifier to ensure that data layer transmits the raw data. It layer sends data from the network layer is responsible for the layer ensures data is transferred layer provides interfaces to the that work together to provide
is sent to the specific computer that consists of hardware such as layer to the physical layer. It divides addressing and routing of data. from one destination to another, software to allow it to use the networking capabilities.
requests it. This unique identifier for switches and routers. the data to be sent into data reliably and without errors. network. Examples of software
a computer system on a network is frames. include email, file transfer protocol
known as the IP address. (FTP) and the World Wide Web
(WWW).

You might also like