involves policies, procedures, and controls that determine
who can access the operating system, which resources (files, programs, printers, etc.)
they can use, and what actions they can take.
Operating system security
is the computer’s control program. It allows users and their
applications to share and access common computer resources, such as processors, main
memory, databases, and printers.
operating system
is a program whose purpose is to capture IDs and passwords from unsus-
pecting users. These programs are designed to mimic the normal log-on procedures of the
operating system.
Trojan horse
is a software program that allows unauthorized
access to a system without going through the normal (front door) log-on procedure. Pro-
grammers who want to provide themselves with unrestricted access to a system that they
are developing for users may create a log-on procedure that will accept either the user’s
private password or their own secret password, thus this to the system.
The purpose of this may be to provide easy access to perform program main-
tenance, or it may be to perpetrate a fraud or insert a virus into the system.
A back door (also called a trap door)
is a destructive program, such as a virus, that some predetermined event
triggers. Often a date (such as Friday the 13th, April Fool’s Day, or the 4th of July) will
be the logic bomb’s trigger. Events of less public prominence, such as the dismissal of an
employee, have also triggered these bombs.
logic bomb
is used interchangeably with virus. It is a software program that
virtually burrows into the computer’s memory and replicates itself into areas of idle
memory. This systematically occupies idle memory until the memory is exhausted
and the system fails.
worm
is a program (usually destructive) that attaches itself to a legitimate program
to penetrate the operating system and destroy application programs, data files, and
the operating system itself. An insidious aspect of this is its ability to spread
throughout the host system and on to other systems before perpetrating its destruc-
tive acts.
virus
is a random access technique that detects collisions when they occur.
This technique, which is formally labeled carrier-sensed multiple access with collision
detection (CSMA/CD), is used with the bus topology.
Carrier sensing
involves transmitting a special signal—the token—around the network
from node to node in a specific sequence. Each node on the network receives the
token, regenerates it, and passes it to the next node. Only the node possessing the
token is allowed to transmit data.
Token passing
is the most popular technique for establishing a communication session in
WANs. One site, designated the master, polls the other slave sites to determine if they
have data to transmit. If a slave responds in the affirmative, the master site locks the
network while the data are transmitted.
Polling
Two or more signals transmitted simultaneously will
result in a _________, which destroys both messages.
data collision
is the most popular LAN topology. It is so
named because the nodes are all connected to a common cable—the bus. One or more
servers centrally control communications and file transfers between workstations. As
with the ring topology, each node on the bus has a unique address, and only one node
may transmit at a time. The technique, which has been used for over two decades, is
simple, reliable, and generally less costly to install than the ring topology.
bus topology
The term client-server is often misused to describe any type of network arrangement. In
fact, the _____ has specific characteristics that distinguish it from the
other topologies.
client-server topology
eliminates the central site. This is a
peer-to-peer arrangement in which all nodes are of equal status; thus, responsibility for
managing communications is distributed among the nodes.
ring topology
is one in which a host computer is connected to several levels of
subordinate, smaller computers in a master–slave relationship. This structure is applicable
to firms with many organizational levels that must be controlled from a central location.
hierarchical topology
describes a network of computers with a large
central computer (the host) at the hub that has direct connections to a periphery of smaller computers. Communications between the nodes in the star are managed and
controlled from the host site.
star topology
LAN nodes often share common resources such as programs, data, and printers,
which are managed through special-purpose computers called
servers
The physical connection of workstations to the LAN is achieved through a ________, which fits into one of the expansion slots in the microcomputer.
This device provides the electronic circuitry needed for internode communications. The
_______ works with the network control program to send and receive messages, programs,
and files across the network.
network
interface card (NIC)
is the physical arrangement of the components (e.g., nodes, servers,
communications links, etc.) of the network.
network topology
The computers connected to a LAN are called
nodes
is the document format used to produce Web pages.
It defines the page layout, fonts, and graphic elements as well as hypertext links to
other documents on the Web. It is used to lay out information for display in an
appealing manner such as one sees in magazines and newspapers.
Hypertext markup language (HTML)
is used to connect to Usenet groups on the
Internet. Usenet newsreader software supports the NNTP protocol
Network news transfer protocol (NNTP)
is a private network within a public network. For years,
common carriers have built VPNs, which are private from the client’s perspective, but
physically share backbone trunks with other users.
A virtual private network (VPN)
This is a password-controlled
network for private users rather than the general public. Extranets are used to provide
access between trading partner internal databases. Internet sites containing information
intended for private consumption frequently use an extranet configuration.
Extranet