0% found this document useful (0 votes)
137 views3 pages

Networking CyberSecurity Notes

The document discusses computer networking, detailing types of networks (LAN, MAN, WAN, PAN) and devices (router, switch, modem, hub). It explains internet terminology, including IP addresses, URLs, and common cyber threats like malware and phishing. Additionally, it outlines cyber security goals and best practices to protect systems and data from attacks.

Uploaded by

nayakarpita82
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
137 views3 pages

Networking CyberSecurity Notes

The document discusses computer networking, detailing types of networks (LAN, MAN, WAN, PAN) and devices (router, switch, modem, hub). It explains internet terminology, including IP addresses, URLs, and common cyber threats like malware and phishing. Additionally, it outlines cyber security goals and best practices to protect systems and data from attacks.

Uploaded by

nayakarpita82
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Relational Database Model in DBMS

Computer Networking

Computer Networking is the practice of connecting two or more computers and devices to share data,

resources, and communication.

Types of Networks:

- LAN: Local Area Network (e.g., home or office)

- MAN: Metropolitan Area Network (e.g., city-wide)

- WAN: Wide Area Network (e.g., the Internet)

- PAN: Personal Area Network (e.g., Bluetooth)

Network Devices:

- Router: Connects different networks

- Switch: Connects devices in a LAN

- Modem: Converts digital and analog signals

- Hub: Basic device to connect multiple systems

Internet and Terminology

The Internet is a global network of interconnected computers using standard protocols.

Basic Terms:

- IP Address: Unique ID for devices (e.g., 192.168.1.1)

- URL: Uniform Resource Locator (web address)

- HTTP/HTTPS: Web communication protocols (S = Secure)

- ISP: Internet Service Provider (e.g., Jio, Airtel)

- Bandwidth: Data transfer rate

- Domain Name: Human-friendly website address

- DNS: Translates domain names into IP addresses

- Firewall: Blocks unauthorized access

Cyber Threats
Relational Database Model in DBMS

Cyber Threats are dangers that can harm computers, networks, or data.

Common Threats:

- Malware: Harmful software like viruses, trojans

- Phishing: Fake websites/emails to steal data

- Ransomware: Locks data, demands payment

- Spyware: Secretly records user activities

- DoS: Overloads system to crash it

- Man-in-the-Middle: Intercepts communication

- SQL Injection: Attacks via malicious database queries

Cyber Security

Cyber Security protects systems, networks, and data from attacks.

Goals of Cyber Security:

- Confidentiality: Keep data private

- Integrity: Ensure data is accurate

- Availability: Ensure data is accessible

Types of Security:

- Network Security: Protects network connections

- Application Security: Safeguards software

- Information Security: Protects data

- Cloud Security: Protects cloud systems

- Endpoint Security: Protects individual devices

Best Practices:

- Use strong passwords

- Enable antivirus/firewall

- Regular software updates


Relational Database Model in DBMS

- Avoid suspicious links

- Use two-factor authentication

- Backup data regularly

Summary

- Networking connects devices for communication.

- The Internet is a global network using standard protocols.

- Cyber threats are malicious activities harming data or systems.

- Cyber security protects against these threats with tools and best practices.

You might also like