Get Started. It's Free
or sign up with your email address
Computer Networks by Mind Map: Computer Networks

1. Adware

2. Securing a System

2.1. Authorisation Permissions

2.1.1. Access Control Lists

2.2. Backing Up & Restoring

2.3. Encrypting

2.4. Others

2.4.1. Biometrics

2.4.2. Physical Security

2.4.2.1. CCTV

2.4.2.2. Locks

2.5. Firewalls

2.6. Security Risk Levels

2.7. Software Protection

2.7.1. Anti-Virus

2.7.2. Intrusion Detection Systems

3. Business risks

3.1. Loss of service

3.2. loss of business or income eg through loss of customer records;

3.3. Loss of Service

3.4. Loss of Confidentiality

3.5. Compromised data integrity

3.6. Security Issues

3.6.1. Malware

3.6.2. Viruses

3.6.3. Trojans

3.6.4. Worms

3.6.5. Spyware

4. Directory services

4.1. account management

4.2. authentication management

4.3. active directory

4.4. DNS

5. Telecommunication services

5.1. communication

5.1.1. email

5.1.2. internet relay chat (IRC)

5.1.3. discussion boards

5.2. remote access

5.2.1. via mobiles

5.2.2. remote desktop

5.2.3. social networking

6. File services

6.1. File transfer

6.2. file sharing

7. Application Services

7.1. Application software

7.1.1. Database

7.1.2. Web

7.2. Proxy

7.3. Shared Resources

7.3.1. Printing

7.3.2. Storage Space

7.4. Voice Over IP (VoIP)

7.5. Authentication

7.5.1. Users

7.5.2. Hardware

7.6. Mobile Working

8. Leased line

9. Types of Network

9.1. local area network (LAN)

9.2. wide area network (WAN)

9.3. internet

9.4. WAN technologies

9.4.1. frame relay

9.4.2. MPLS

9.4.3. ATM

9.5. Personal Area Network (PAN)

9.6. logical and physical topologies

9.6.1. Star

9.6.2. Bus

9.6.3. Ring

9.6.4. Mesh

9.6.5. Tree

9.7. network access methods

9.7.1. CSMA

9.7.2. Token Passing

9.8. network models

9.8.1. OSI 7 Layer

9.8.2. TCP/IP

10. Network Protocols and Standards Technologies

10.1. TCP/IP

10.2. AppleTalk

10.3. UDP

10.4. 802.2

10.5. 802.3

10.6. FDDI

10.7. 802.5

10.8. wireless technologies

10.8.1. 802.11

10.8.2. Infrared

10.8.3. BlueTooth

10.8.4. 3G

10.8.5. factors affecting range and speed of wireless

11. Application Layer Protocols

11.1. DNS

11.2. DHCP

11.3. HTTP

11.4. FTP

11.5. SMTP

12. Key components

12.1. network devices

12.1.1. workstations

12.1.2. Servers

12.1.2.1. Print

12.1.2.2. Mail

12.1.2.3. File

12.1.2.4. Web

12.1.2.5. Proxy

12.1.3. NIC (Network Interface Card)

12.2. Interconnection Devices

12.2.1. Wireless Access Points

12.2.2. Switch

12.2.3. Wireless Access Point

12.2.4. Router

12.3. connectors and cabling

12.3.1. Dedicated line

12.3.2. Media Types

12.3.2.1. STP

12.3.2.2. UTP

12.3.2.2.1. Category 5

12.3.2.3. Coaxil

12.3.2.4. Fibre Optic

12.3.3. Wireless

12.3.4. Mobile technology

12.3.5. Cable/Connection Standards

12.4. Software

12.4.1. network operating system

12.4.2. Virus Checker

12.4.3. Firewall

12.4.4. Email Clients

12.5. Commercial systems

12.5.1. MAC OSX

12.5.2. Linux

12.5.3. Windows