Threats
Phishing- Obtaining someone's sensitive personal data for malicious reasons, masquerading as a trustworthy entity.
Plagiarism- Stealing someone else's thoughts and ideas, and represents them as your own.
Trojan horse- Malicious code that gets attached to the computer pretending to be useful software.
Worms- Designed to grow itself without any interference by user and spread to other computers also.
Spyware- Malicious software for system monitoring, tracking cookies etc.
Keyloggers- Software program or a hardware that designed to secretly monitor and login to all the keystrokes.
Bots- Self propagating malware. Eg: DOS attacks.
Logic Bomb- Malicious code which harms to a network when the programmed conditions are met.
Theories you should know:
Packet Switching:
When a message is generated at the source it is getting broken down into smaller size chunks called packets. Therefore, those packets are getting shared through the communication medium. Each packet is having two parts called, header and body. Source IP and destination IP is mentioned in the header while the data is consisted in the body.
Path determination:
Refers to the process of finding the most efficient path to send data from a source to a given destination through a network. This is what we call routing done by the router. Router uses routing tables to perform this task.
Multiplexing and Demultiplexing:
Sometimes known as muxing and demuxing also.
Muxing means sharing a common communication medium to send data, comes from different streams simultaneously.
Demuxing is the opposite thing of muxing. Which means, sending data only to the given destinations, comes from a shared communication medium.
Words you should know:
NIC- Network Interface Card
ISP- Internet Service Provider
DSL- Digital Subscriber Line
ADSL- Asymmetric Digital Subscriber Line
URL- Uniform Resource Locator
DOS Attacks- Daniel Of Services
YOU ARE READING
Networking Fundamentals
Short StoryThis book can be read by anyone, even without any knowledge about networking or IT. Describes all the basic theories of computer networks.
