• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/80

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

80 Cards in this Set

  • Front
  • Back
Packet switching
A method of slicing messages into packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destination.
First book on packet switching was written by ______ in ______.
Leonard Kleinrock in 1964
Router
interconnects the different computer networks that make up the internet and routes packets along to their ultimate destination as they travel
Routing algorithm
computer program used by the router to ensure packets take the best available path towards their destination
Circuit switching
expensive and wasted telecommunication capacity as 70% of the time a dedicated voice circuit is not being fully used because of pauses between words and delays in assembling the circuit segments, both of which increase the length of time required to find and connect circuits.
IPv4
Internet address expressed as a 32-bit number that appears as a series of four separate numbers marked off by periods, such as 64.49.254.91
IPv6
Internet address expressed as a 128-bit number.
-In 2011, only 76 million IPv4 addresses left and diminishing by 1 million per week. IPv6 introduced to address the problem providing many more IP addresses available
IP addresses and domain names
Domain names are IP addresses expressed in natural language such as www.amazon.com which is done by the Domain Name System (DNS); this link is connected to an IP address which is the server computer.
Protocols
-SMTP
-FTP
-HTTP
-HTTPS
-TCP
-IP
-VOIP
SMTP
-(Simple Mail Transfer Protocol)
-the internet protocol used to send mail to a server
-Handles only the sending of e-mail which must be received by either POP3 or IMAP protocols
IMAP
is the most current e-mail protocol allowing users to on all browsers to search, organize, and filter e-mail prior to downloading from the server
FTP
-(File Transfer Protocol)
-one of the original internet services. Part of the TCP/IP protocol that permits users to transfer files from the server to the client computer, and vice versa.
-Files can be documents, programs, or large database files.
Fastest and most convenient way to transfer files larger than 1 MB?
FTP (File Transfer Protocol)
-most email servers do not allow
HTTP
-(HyperText Transfer Protocol)
-the internet protocol used for transferring web pages.
-Developed by the World Wide Web Consortium (W3C) and the internet engineering task force (IETF)
-Runs on application layer of TCP/IP on page 129
How does HTTP begin?
-Begins when a (clients personal computer) browser requests a resource, such as a Web page, from a remote internet server. Sever responds by sending page requested, the HTTP session for that object then ends.
HTTPS
-ensures the page you are visiting is secured and the actual website you are intending to access, avoiding fake pages which aim to steal the personal information you input into the website; usernames, passwords, credit card info, address, etc.
HTTPS
-Ensures the page you are visiting is secured and the actual website you are intending to access, avoiding fake pages which aim to steal the personal information you input into the website; Usernames, passwords, credit card info, address, etc.
TCP
-(Transmission Control Protocol)
-which establishes the connections among sending and receiving Web computers and handles the assembly of packets at the point of transmission, and their reassembly at the receiving end.
Foundation of TCP was laid out by________ and ________ in ______.
Vint Cerf and Bob Kahn in 1974
TCP (Transmission Control Protocol) is divided into what 4 layers?
1.) Application layer (HTTP, Telnet, FTP, SMTP)
2.) Host-to-host transport layer (TCP)
3.) Internet layer (IP)
4.) Network interface layer (Ethernet, token ring, frame relay, ATM)
IP
-(Internet Protocol)
-provides the internets addressing scheme and is responsible for the actual delivery of the packets
-Like a house address for each computer, routing communication to and from that IP (address)
-two versions of IP in use-IPv4 and IPv6
VOIP
-(Voice Over Internet Protocol)
-allows for transmission of voice and other forms of audio communication over the internet.
-Vonage and Skype and more recently Facetime on IPhone
Types of computing:
-Mainframe computing
-Client/server computing
-Cloud computing
-Mobile computing
Mainframe computing
Old school computing
Client/Server Computing
-A model of computing in which powerful personal computers (clients) are connected in a network together with one or more servers
Client
-Personal computing device such as a laptop, tablet, smartphone.
Server
-Networked computers dedicated to common functions that the clients computer on the network needs, such as file storage, software applications, utility programs, and printers
Cloud Computing
-model of computing in which firms and individuals obtain computing power and software over the internet.
-Radically reduces the cost of building and operating web sites
-essentially huge server farms
IXP's
-(Internet Exchange Points)
-hub where the backbone intersects with local and regional networks and where backbone owners connect with one another.
-Think of connecting points of a spider web, connecting different segments to one another
-Major IXP's-Miami, New York, Chicago, Dallas, Atlanta, Los Angeles, Seattle
NSP's
-(Network Service Providers)
-owns and controls one of the major networks comprising the internet's backbone
-Referred to as "backbones"
-backbone is like a giant pipeline transporting data around the world in milliseconds in bandwidths from 125 Mbps to 2.5 Gbps
-Major backbone owners: Verizon, Sprint, AT&T, CenturyLink, and Verio
ISP's
-(Internet Service Providers)
-firm that provides the lowest level of service in the multi-tiered internet architecture by leasing internet access to home owners, small businesses and some large institutions.
-ISP's connect to IXP's with high speed telephone or cable lines
-Major ISP's: AOL, AT&T, Sprint, Verizon, EarthLink, CenturyLink
-types of service: Narrowband and Broadband
Narrowband
-old dial-up through traditional telephone modem connections 56.6 Kbps
-dial up
Broadband
-any communication technology that permits clients to streaming audio and video files at acceptable speeds above 100 Kbps
-DSL (Digital Subscriber Line), Cable modem, T1 and T3, and Satellite
MAP's
-(Metropolitan Access Points)
-(find more info)
3G
-(3rd Generation)
-High-speed, mobile, always on for e-mail, browsing, instant messaging;
-Nearly as fast as Wi-Fi
4G
-(4th Generation)
-Long-Term Evolution LTE, WiMax (high speed, medium range broadband wireless metropolitan area network), true broadband on cell phone;
-AT&T, Verizon and Sprint
How is the SDLC (System Development Life Cycle) used in building and maintaining websites?
-it is a methodology for understanding the business objectives of any system and designing an appropriate solution (definition)
-also helps in creating documents that communicate objectives, important milestones, and the uses of resources to managment
What is involved in the SDLC?
5 major steps:
1.) Systems analysis/planning
2.) Systems design
3.) building the system
4.) testing
5.) implementation
Steps of the SDLC:
1.) Systems analysis/planning
-"What do we want this e-commerce site to do for our business?"
-business objectives: capabilities you want your site to have.
-System Functionalities: types of information systems capabilities you will need to achieve your business objectives
-Information requirements: the information elements that the system must produce in order to achieve the business objectives
Steps of the SDLC:
2.) Systems design
-description of the main components in a system and their relationship to one another.
-logical design, and physical design.
Logical design
-how the various components will interact with one another
Physical design
-translates the logical design to physical components.
Steps of the SDLC:
3.) Building the System
-building the website in house or outsourcing
-Outsource unless you have the skillsets in house to create an effective and attractive website, usually the cheaper option.
-Build from scratch, use packaged site building tools, or use pre built templates
Steps of the SDLC:
4.) Testing
-making sure the website functions in its entirety and has no dead ends or non-functioning elements in the website
-Unit testing, system testing, acceptance testing
Unit testing
-involves testing the sites program modules one at a time
System testing
-involves testing the site as a whole, in a way the typical user will use the site.
Acceptance testing
-verifies that the business objectives of the system as originally conceived are in fact working
Steps of the SDLC:
5.) Implementation service delivery
-maintenance and upkeep that is required to keep website functioning properly.
-benchmarking, annual budget, and site management tools
Benchmarking
-process in which the site is compared with those of competitors in terms of response speed, quality of layout, and design.
Site management tools
-verify that links on pages are still valid and also identifies orphan files.
Servers involved in the World Wide Web:
-web servers
-application servers
-mail servers
-proxy servers
Web servers
-server that provides the website itself on the internet
Application servers
-software programs that provide specific business functionality required of a website.
-separates the business and content side of the website
-middleware software that connects corporate systems to the customer
Mail servers
-servers that provide and manage e-mail messages
Proxy servers
-monitors and controls access to main web server; implements firewall protection
Firewalls
-are rule sets that determine whether packets are allowed through or not, preventing un-granted access to the server and its information
6 key dimensions to e-commerce security:
1.) Integrity
2.) Nonrepudiation
3.) Authenticity
4.) Confidentiality
5.) Privacy
6.) Availability
Integrity
-the ability to ensure that information displayed on a web site that is transmitted or received over the internet has not been altered in any way by an unauthorized party
Nonrepudiation
-the ability to ensure that e-commerce participants do not deny their online actions
Authenticity
-the ability to identify the identity of a person or entity with whom you are dealing on the internet
Confidentiality
-the ability to ensure that messages and data are available only to those who are authorized to view them
Privacy
-the ability to control the use of information about oneself
Availability
-the ability to ensure that an e-commerce site continues to function as intended
3 key points of vulnerability on the internet:
-the client
-the server
-the communications pipeline
Security threats in the E-commerce environment:
-malicious code (malware), unwanted programs, social engineering, phishing, hacking, cybervandalism, data breach, credit card fraud/theft, spoofing, pharming, spam/junk web sites, denial of service (DoS) attack, distributed denial of service (DDoS) attack, sniffing, insider jobs, poorly designed server and client software, social network security, mobile platform threats.
Malicious code (malware)
-variety of threats such as Trojan horse, virus, worms, bots
Drive-by download
-malware that comes with a download file that a user requests
Virus
-a computer program that has the ability to replicate or make copies of itself, and spread to other files.
Worm
-malware that is designed to spread from computer to computer
Trojan horse
-appears to be benign, but then does something other than expected. Often a way for viruses of other malicious code to be introduced to a computer system.
Bot
-type of malicious code that can be overtly installed on computer when attached to the internet. Once installed, the bot responds to external commands sent by the hacker
Botnet
-collection of captured bot computers
Unwanted programs
-browser parasites
-adware
-spyware
Phishing
-deceptive online attempt to obtain confidential information
-email scams, spoofing legitimate web sites, fraudulent acts (access checking accounts, steal identity
Cybervandalism
-intentionally disrupting, defacing, destroying web site
data breach
-when organizations lose control over corporate information to outsiders
Credit card fraud/theft
-hackers target merchant servers; use data to establish credit under false identity
Denial of service (DoS) attack
-hackers flood site with useless traffic to overwhelm network
Sniffing
-eavesdropping program that monitors information traveling over a network
Mobile platform threats
-same risks as any internet device
-malware, botnets, vishing/smishing