File Transfer Protocol (FTP) - Transfers large files between computers or servers., FileZilla, Cyberduck, WinSCP - Examples of FTP services, Grid Computing - A distributed system where multiple computers work together on a shared task., Cloud Computing - Provides on-demand computing resources over the Internet., Streaming - A technology that allows users to access and play audio, video, or other media in real time over the internet without downloading the entire file., ADSL - Uses telephone lines to transmit data., Fiber Optic - Uses light signals transmitted through glass or plastic fibres., ISP (Internet Service Provider) - A company that provides the infrastructure for connecting to the internet, Broadband - High-speed, always-on internet access., Bandwidth - The amount of data that can be transmitted over a network in a given time., Throttling - The intentional slowing down or limiting of data transfer speeds by an ISP, usually done to manage network congestion or to enforce fair usage policies., Shaping/Traffic shaping - The process of controlling the flow of data packets into the network to optimize or guarantee performance., Fair Use Policy (FUP) - A set of guidelines or rules imposed by Internet Service Providers (ISPs) to manage and control how users consume data on their networks., Distributed Denial-of-Service (DDoS) Attack - It involves overwhelming a network, server, or website with a flood of internet traffic, making it unavailable to users., Botnet/Zombies - A network of computers infected with malware that allows cybercriminals to control them remotely., Malware - Software designed to damage, disrupt, or gain unauthorized access to a system. E.g. viruses, worms, and trojans., Spyware - A type of malicious software that secretly monitors and collects user data, often for malicious purposes like identity theft., Adware - Software that automatically displays or downloads advertising material, often in the form of pop-ups., Keylogging - A type of software that records the keystrokes of a user, often for stealing sensitive information like usernames, passwords, or credit card details., Clickjacking - A malicious technique where an attacker tricks a user into clicking on something different from what they intended, often leading to unintended actions., Ransomware - A type of malware that locks or encrypts files on a victim's system and demands payment (ransom) to restore access to the files., Firewall - A security system that monitors and controls incoming and outgoing network traffic based on specific security rules., Virtual Private Network (VPN) - A technology that creates a secure, encrypted connection between your device and the internet, Two-Factor Authentication (2FA) - A security process that requires two forms of identification before granting access to an account or system (e.g., a password + a one-time code sent via text or an authentication app)., Antivirus software - Software that protects your device from malicious programs like viruses, worms, and trojans.,
0%
Network and internet technologies
Share
Share
Share
by
Dsibanda
Gr 12
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?