Acct Tech Final Study Guide

Mac media access controls address wans wide area

Info icon This preview shows pages 3–5. Sign up to view the full content.

View Full Document Right Arrow Icon
MAC- Media access controls address WANs- Wide area networks link different sites together such as LANs from different locations. The purpose of WANS -Providing remote access to employees or customers -Link two or more sites within the firm -Providing corporate access to the internet A router- connects different LANs by choosing the most efficient path through a network to a desired location. Sends packets through most efficient communication path thru the IP address. Can divide & interconnect network segments or links physically separate network segments. Internet protocol (IP) address Firewall- a security system comprised using hardware and software that is built using routers, servers, and a variety of software. When packet arrives, it examines each in/outgoing packet to determine whether a packet should be allowed to continue in transmission process. Also allows on a corporate network to send and receive a packet from the internet. VPN- Virtual private network, securely connects a firms WANs by send/receive packets via virtual connections over the internet to different parties. Uses internet w/encryption and authentication technology to create a virtual private network that allows users to access their firm’s network securely using the internet. Wireless networks
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Wireless technologies- use radio frequency transmissions and electromagnetic signals as the means for transmitting data, enable to communicate w/o physical connection. Access point- Connects stations to a firm’s network and can also connect wireless stations w/each other in an Ad Hoc wireless network. Station- a wireless endpoint device equipped w/a wireless Network Interface Card. (NIC) Benefits of wireless networks Mobility Rapid development Flexibility and scalability Security objectives of all networks -Confidentiality -Integrity -Availability -Access control Security threats for wireless networks Eavesdropping Man-in-the middle Masquerading Message mod Message replay Misappropriation Traffic analysis Security controls -Management controls focus on risk and IS security -Operational controls -Technical controls
Image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern