Please enable JavaScript.
Coggle requires JavaScript to display documents.
COMMUNICATION & THE INTERNET (Network Security (Access controls (Fire…
COMMUNICATION & THE INTERNET
Networks
Protocols
Email
IMAP (
Internet Message Access Protocol
)
Allows emails to be accessed using multiple email clients. Example: access email using email client on computer, tablet o mobile phone.
SMTP (
Simple Mail Transfer Protocol
)
Used when sending email throught internet. It details the fomrat that messages are sent in, what commands email servers should understand and how to respond.
POP3 (
Post Office Protocol
)
Used for retrieving email from an email server. Normally used to connect to email server, download any messages and then delete them from server.
Network
Enthernet
Family of protocols that are used in wired LANs . They cover everything from the physical parts of network to the logical parts.
WiFi
TCP/IP (
Transmission Control Protocol/Internet Protocol
)
A collection of protocols that works together. Works in layers (
Application, Transport, Internet, Link
) that pass information up and down protocol stack as it is processed
TCP
Topologies
Ring
Star
Bus
Mesh
Wired vs Wireless
Network Data Speed
allows you to determine whether an equpment upgrade is necessary
;
estimate how long it takes to download a file
;
determine whether actual performance lives up to the prmises made by the service provider.
Calculating time needed to transmit a file
Wired
Wired connection methods involve a physical connection between the computer and the form of network
Networks
LAN
Network that covers a small geographical area such as home, a hospital or factory
WAN
Covers large geographical area across several sites of an organisation
Client-server
a network that has at least one server to provide services to the client computers
Peer-to-Peer
a network that doesn't have any centralised servers. Each computer can act as client and server.
Network Security
Cyber attacks
Phishing
Denial of service
Importance
Access controls
Validation
authentication
Access controls
Fire walls
Physical security
Cloud storage + security
Technical Weaknesses
Unpatched software
Eavesdropping
Modular testing
audit trail
Penetration testing
Internet + WWW
ISP
HTML
How it works
access to internet
Router