Acct Tech Final Study Guide

Mac media access controls address wans wide area

Info icon This preview shows pages 3–5. Sign up to view the full content.

MAC- Media access controls address WANs- Wide area networks link different sites together such as LANs from different locations. The purpose of WANS -Providing remote access to employees or customers -Link two or more sites within the firm -Providing corporate access to the internet A router- connects different LANs by choosing the most efficient path through a network to a desired location. Sends packets through most efficient communication path thru the IP address. Can divide & interconnect network segments or links physically separate network segments. Internet protocol (IP) address Firewall- a security system comprised using hardware and software that is built using routers, servers, and a variety of software. When packet arrives, it examines each in/outgoing packet to determine whether a packet should be allowed to continue in transmission process. Also allows on a corporate network to send and receive a packet from the internet. VPN- Virtual private network, securely connects a firms WANs by send/receive packets via virtual connections over the internet to different parties. Uses internet w/encryption and authentication technology to create a virtual private network that allows users to access their firm’s network securely using the internet. Wireless networks
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Wireless technologies- use radio frequency transmissions and electromagnetic signals as the means for transmitting data, enable to communicate w/o physical connection. Access point- Connects stations to a firm’s network and can also connect wireless stations w/each other in an Ad Hoc wireless network. Station- a wireless endpoint device equipped w/a wireless Network Interface Card. (NIC) Benefits of wireless networks Mobility Rapid development Flexibility and scalability Security objectives of all networks -Confidentiality -Integrity -Availability -Access control Security threats for wireless networks Eavesdropping Man-in-the middle Masquerading Message mod Message replay Misappropriation Traffic analysis Security controls -Management controls focus on risk and IS security -Operational controls -Technical controls
Image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '10
  • LyleSchmardebeck
  • Accounting, Wireless Networks, Computer network, Virtual private network, control activities, network vulnerability controls, opportunity w/o risk

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern