Technology in Action

Similar documents
Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

Networking. Prof. Abdul Hameed

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

2) A is any device connected to a network such as a computer, printer, or game console. A) packet B) node C) NOS D) NIC

It is the process of sharing data, programs, and information between two or more computers.

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

Chapter 5 Local Area Networks. Computer Concepts 2013

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Dr./ Ahmed Mohamed Rabie Sayed

Technology in Action 12/11/2014. Networking Fundamentals. Chapter Topics. Networking Fundamentals (cont.) Networking Fundamentals (cont.

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

INTRODUCTION TO ICT.

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS)

Networks. Computer Technology

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

Networks: Communicating and Sharing Resources

Discovering Computers Chapter 9 Communications and Networks

Children s Health System. Remote User Policy

Chapter 10: Security and Ethical Challenges of E-Business

A network is two or more computers, or other electronic devices, connected together so that they can exchange data.

MIS 300 Exam 2 Spring 2011

USER GUIDE. Wireless-G Broadband Router. Model No: WRT54G2 V1

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

Wireless technology Principles of Security

COPYRIGHTED MATERIAL. Index

Network Security Fundamentals

Online Security and Safety Protect Your Computer - and Yourself!

Cyber Security Practice Questions. Varying Difficulty

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

Wireless Attacks and Countermeasures

What is a network and what are the advantages of setting up one? (p. 262)

Chapter 9 Introduction to Networks

TYPES OF COMPUTER NETWORKS

Lesson-1 Computer Security

Computer Security. Assoc. Prof. Pannipa Phaiboonnimit. Adapted for English Section by Kittipitch Kuptavanich and Prakarn Unachak

Computer Networks and Internet

A Review Paper on Network Security Attacks and Defences

Chapter 11: Networks

e-commerce Study Guide Test 2. Security Chapter 10

Wireless LAN Security (RM12/2002)

Chapter 6 Network and Internet Security and Privacy

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Chapter 12. Network Organization and Architecture

AC Touch Screen Wi-Fi Gigabit Router. Highlights

Ethical Hacking and Prevention

NETGEAR Trek N300 Travel Router and Range Extender

AC 3150 Wireless MU-MIMO Gigabit Router

COMPUTER SKILLS COMP101

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

GLOSSARY OF CELLUAR TERMS

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

Naveen Kumar. 1 Wi-Fi Technology

Chapter 11: It s a Network. Introduction to Networking

Lecture 12. Application Layer. Application Layer 1

Internet protocols and network hardware

CompTIA A+ Accelerated course for & exams

Online Threats. This include human using them!

Objectives Overview. Chapter 9 Networks and Communications. Discovering Computers Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016

Wireless# Guide to Wireless Communications. Objectives

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

INVIGILATED BY MARKED BY MARKS TALLIED BY

MOTHER TERESA SR. SEC. CO-ED SCHOOL. CLASS VIII (Comp Sc.) CHAPTER-1 : ABOUT NETWORKING

Chapter 8 Networking and Digital Communication

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Introduction to Computers Chapter1

ECDL / ICDL IT Security. Syllabus Version 2.0

Digital Entertainment. Networking Made Easy

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Chapter 10: Wireless LAN & VLANs

CHAPTER 8 SECURING INFORMATION SYSTEMS

Networks. Unit 5 Terminology Study Assignment Review Computer Technology. S3 Obj 2 1-3

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

SECURE USE OF IT Syllabus Version 2.0

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Networking. Networking and Communication Trends Convergence (Accessibility) Speed Stability Simplicity* Embeddedness

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Security Awareness. Presented by OSU Institute of Technology

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 1 B: Exploring the Network

Network fundamentals IB Computer Science. Content developed by Dartford Grammar School Computer Science Department

COMPUTER NETWORKING. Terminology of Network:

Learn How to Configure EnGenius Wi-Fi Products for Popular Applications

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Communications and Networks

GCIH. GIAC Certified Incident Handler.

The Features and Uses of Computer Networking. Unit 11 Task 1

300Mbps Wi-Fi Router. Expand Wi-Fi Coverage. TL-WR820N 300Mbps Easy Setup IPTV IPv6

ITP 140 Mobile Applications Technologies. Networks

A Guide to Routers. Connectivity Type. ADSL (Telephone Type)

Configuring your Home Wireless Network

Discovering Computers Living in a Digital World

Introduction to Information Security Dr. Rick Jerz

The Security Problem

E-companion. Quiz for IT-knowledge

Transcription:

Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1

Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral devices Used in home and small office networks Poor Security 2

Client/Server Networks Client computers Users who make requests Server computers Provide resources to clients Central network control Internet A large, multiserver, multiclient network. 3

LANs and WANs Local area network (LAN) Nodes are within a small geographic region Less than a mile across Homes School Campus Commercial Campus Wide area network (WAN) LANs connected over long distances A few miles to thousands of miles Use telecommunications lines Use microwave towers, satellites 4

MANs Metropolitan area network (MAN) Nodes are within a specific geographic region, such as a city Sponsored by a government entity to provide access to city residents and/or visitors Usually Wi-Fi service 5

Network Components Transmission media Network communication devices Software 6

Transmission Media Provide communications channel between nodes Forms of media Twisted pair Coaxial cable Fiber-optic cable Radio waves (Bluetooth) Microwave (Wi-Fi) Bandwidth (frequencies) Data transfer rate Throughput 7

Network Adapters Devices connected to or installed in nodes Network interface cards (NICs)--Ethernet External or internal network adapters Enable communication between nodes 8

Network Navigation Devices Devices that help make data flow possible Routers Route data between networks Switches Receive data and retransmit it to nodes on the same network 9

Networking Software Peer-to-peer software Built into operating systems that support networking Windows Mac OS Client/server software Network operating system (NOS) software Windows Server 2008 SUSE Linux Enterprise 10

Types of Peer-to-Peer Networks Wired Ethernet networks Wireless Ethernet networks Power-line networks 11

Wired Ethernet Networks Ethernet network adapters are used to connect nodes NIC card PC card USB adapter Ethernet Computers are connected to each other using unshielded twisted pair cable RJ45 RJ11 Phone 12

Ethernet Switches Keep track of data packets Amplify and retransmit signals Keep the network running efficiently 13

Ethernet Routers Transfer packets from one network to another Home Internet routers transfer data from the Internet to the home network (Wi-Fi capable). Allows for network-ready devices such as network printers or NAS (network attached storage) Router 14

Wireless Ethernet Networks Use micro waves to connect nodes Basically Ethernet networks that use micro waves instead of wires Based on the IEEE 802.11 standard, also known as Wi-Fi (Wireless Fidelity) Each node requires a wireless network adapter Transceivers (dongle) WEP no security WPA no security WPA2 safe as of 2009 15

Wireless Challenges 802.11n standard not yet standardized 802.11g maximum range of 250 feet As distance increases, throughput decreases. 802.11g works on a bandwidth of 2.4 Ghz (the same as many cordless phones). Obstacles such as walls and metal objects cause interference. 16

Wireless Access Point (WAP) Device added to a wireless network to extend the range of the network Must connect to either a switch, a router, or a node on the network 17

Power-Line Networks Computers are connected to a house s electrical wiring to create a network. A power-line network adapter is used to connect nodes to electrical outlets. Security OK 18

Choosing a Peer-to-Peer Network Things to consider - Whether you want wireless communications - How fast you want your network connection to be - Whether existing wiring is available - How much money you can spend on your network - How much security needed Comparing the Major Types of Home Networks Wired Ethernet Wireless 802.11g Wireless Enhanced G Wireless 802.11n Maximum data Transfer rate (bandwidth) 100 Mbps to 1,000 bps (1 gigabit) 54 Mbps 108 Mbps 540 Mbps Relative installation and equipment costs for networking two computers $ $ $$ $$ 19

Windows Configuring Software for a Home Network Windows Vista Home versions Network Setup Wizard Wired or wireless Windows XP Network Setup Wizard Windows 98 Configure manually Help has a clear instruction 20

Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. 21

Hackers Anyone who unlawfully accesses a computer system Types of hackers White hat Black hat Script kiddies 22

What Hackers Do Steal information from computers Credit card numbers Bank account numbers Internet packet sniffing (eaves dropping) Commit identity theft 23

Identity Theft Thief steals your name, address, social security number, and/or bank account and credit card information Can result in credit problems and refusal of healthcare service if policy limits are exceeded Can be stolen using computer, theft of wallets and purses, mail, credit statements, or pretense of being a bank or credit company official 24

Preventing Identity Theft 1. Never reveal password or PIN. 2. Never reveal personal information without first verifying you are dealing with a legitimate representative. 3. Create hard-to-guess passwords. Use a combination of letters and numbers Avoid using obvious passwords 4. When shopping online, beware of unfamiliar merchants. 5. If you are a victim of identity theft, freeze credit history or place an extended fraud alert. 25

How Computers Are Attacked Trojan horse (game, screensaver) Backdoor program Zombies Denial of service attacks (DoS) Distributed denial of service attacks (DDoS) 26

How Hackers Gain Access Direct access (physically present) Install Hacking software Indirect access Internet connection Logical ports (router prevents) 27

Computer Safeguards: Firewalls Software programs or hardware designed to close logical ports to invaders A firewall is built into Windows Vista. More robust firewalls are available from other vendors. Firewalls are critical if you have an alwayson broadband connection. 28

Protecting a Wireless Network Wireless network range doesn t stop at the property line. Default device and network ID settings allow intruders to enter the network. Internet bandwidth can be stolen. Computers can be vulnerable to hacker intrusion and takeover. 29

Computer Threats: Viruses A virus is a program that attaches itself to another program and spreads itself to other computers. Viruses are hidden within the code of a host program. 30

How Does a Computer Viruses copy themselves Infect a file on your computer Spread by sharing disks or flash drives E-mail attachments are the most likely source of a virus Catch a Virus? 31

What Viruses Do Replicate themselves Slow down networks Secondary objectives Display annoying messages Delete files on the hard drive Change computer settings 32

Types of Viruses Boot-sector viruses Replicate themselves in the boot sector of the hard drive Logic bombs Activate when certain conditions are met Time bombs Triggered by the passage of time or on a certain date Worms Travel between systems through networks 33

Types of Viruses Script viruses Hidden on Web pages as mini programs Macro viruses Attached to Word documents or Excel spreadsheets Series of commands E-mail viruses Use e-mail address books to distribute the virus Encryption viruses Compress files using a complex encryption key User must pay to get the files unlocked 34

Virus Classifications Polymorphic viruses Periodically rewrite themselves to avoid detection Multipartite viruses Infect multiple file types Stealth viruses Erase their code from the hard drive and reside in the active memory 35

Antivirus Software Programs designed to detect viruses Scan files looking for virus signatures (unique code) Provide options for deleting or fixing infected files Inoculate files against further infection Detects known viruses Needs to be updated frequently Norton, McAfee, Eset AVG free at download.com l 36

Other Security Measures Keep operating system (OS) up to date. Load security patches as soon as they are available. Enable automatic updates. Use the latest version of your Web browser. 37