Familiar Terms
Essay Preview: Familiar Terms
Report this essay
Familiar Terms
Cloud data and synchronization service provider is one the term Im familiar with in this chapter. In my EIS 3304, we are required to do several tasks that involve uploading and synchronizing files to Microsoft SkyDrive. Im also familiar with terms such as Service Set Identifiers (SSID) and Access Point. I usually check the SSID of various wireless networks I try to connect to by clicking the wireless networking icon in the Notification area of the task bar of my pc. Also most routers I use have access points on them.
Another term Im familiar with is Social Media Application – I use social media applications such as Facebook to facilitate relationships.
What I learned in this chapter
This chapter exposed me to terms such as Packet Switching and how it addresses and provides solution to inefficiencies of paying by the minute transmission for busty data transmission. As illustrated by Panko and Panko (2013, p. 16 – 17), packet switching addresses this wastefulness by separating application messages into segments and sending each segment in an individual packet. Packets of many conversations can now be mixed on long distance and costly circuits, thus eliminating waste by using capacity efficiently.
Although packet switched networking solved initial problems, others arose. There was a need to connect individual packet switched network together. Panko and Panko (2013, p.24) stated that different types of network organize packets in different ways and have disparate and mismatched addressing systems, therefore, a Second layer of Networking (Internet Layer) was created over all individual incompatible networks. This layer functions by making connection across the internet and defines packet formats and router. Furthermore, a transport layer and application layers were also created and together with the Physical and data link, make up the five networking layers. The transport layer is above the internet layer. It functions by fragmenting and defragmenting on the source and destination host. It also provides error correction by retransmitting packets that are damaged or lost in transmission. The application layer controls communication between the two application programs that are communicating. For example, web browsers and webservers that want to communicate requires an application layer standard Hypertext transfer protocol (HTTP)
From reading this chapter, I also became more knowledgeable about terms such as Switches, Routers, Packets and Frame and the relationships between them. Panko and Panko (2013, p.26 -27) illustrates that packets switches are needed at both the network and internet levels. The distinction between them is that packet switches at network level are called switches and packet switches at the internet layers are called routers. In addition to this, Panko and panko (2013) specified that packets usually travel from source to destination in frames.
Chapter 2
What I learn from this chapter
From this chapter, I learnt about network standards and why they are important to networking. Panko and panko (2013, p. 47) defines network standards as the rules of operation that govern the exchange of messages between two hardware or software processes. In addition, I gained knowledge of the various network standard characteristics. These characteristics as listed by panko and panko (2013, 51) that network standard govern are Message ordering, Semantics Syntax, Reliability and Connection. For example, message ordering for HTTP involves the client sending and HTTP request message and the server sends back an HTTP response message. At the Transport control protocol (TCP), communication begins with the three step handshake opening and ends with the four step handshaking closing. Semantics on the other hand, involve defining few message types and few options for message types while Syntax, is the organization of the messages.
Chapter 3
Familiar Terms
Some of the terms familiar to me from this chapter are listed below:
Antivirus Programs
Hacking
Biometrics
Password
Firewalls
Spyware
Viruses
Identity Theft
Malware
Risk Analysis
What I learnt from this chapter
From this chapter, I learnt about the Plan-Protect-Respond cycle that companies use and follow to deal with the threat environment. Panko and Panko (2013, p.92 – 93) illustrates that the plan-protect-respond cycle starts with planning to defend against threats. After planning, then comes the protect phase in which companies implement the protection they have planned. A response stage is required if protections fail and attacks succeed.
Additionally, I gained knowledge of various principles companies should use when planning for security. Panko and panko (2013, p.109) list them as Risk analysis, comprehensive security, defense in depth and minimal permission. Companies must attempt to close off all vectors of attack so as to achieve Comprehensive security. Companies should have continuous line of defense that must be penetrated before attacks could be successful, that is, have defense in depth. Companies must also control access by limiting access to resources and restricting permission when users use resources.
Furthermore, I learnt about Egress filtering. Panko