1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

Slides:



Advertisements
Similar presentations
Web Page Design Chapter 1 Introducing Networks and the Internet.
Advertisements

Chapter 7 Networking: Connecting Computing Devices
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Networking Basics lesson 17. This lesson includes the following sections: The Uses of a Network How Networks are Structured Network Topologies for LANs.
Unit 9 Network Fundamentals. Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Networks Adapting Computers to Telecommunications Media.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Nasca Internet Networking and Security viruses.
© 2008 Prentice-Hall, Inc. 1 Technology in Action 1.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
Computer Networks & Security
© 2009 Prentice-Hall, Inc. 1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Unit 8 Network Fundamentals Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
IS 2101 Spring 2009 Chapter 12 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Copyright © 2010 Pearson.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
CSCI 1101 Intro to Computers 6. Local Area Networks.
Chapter 5 Networks Communicating and Sharing Resources
Networking and Operating Systems. Networking What is it? Things that are hooked together. Computer Network- Computers that are connected together.
Chapter 9A Network Basics.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Networking Basics lesson 4 essential concepts. This lesson includes the following sections: The Uses of a Network How Networks are Structured Network.
Unit 1—Computer Basics Lesson 7 Networks.
Module 2: Information Technology Infrastructure
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
NETWORKS.
Computer Networks – an overview 1. 2 Computer Networks Advantages of a network Advantages of a network Client/server and peer-to-peer networks Client/server.
1 Technology in Action Chapter 12 Behind the Scenes: Networking and Security Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.
Networking By Nachiket Agrawal 10DD Contents Network Stand Alone LAN Advantages and Disadvantages of LAN Advantages and Disadvantages of LAN Cabled LAN.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer.
Living Online Module Lesson 23 — Networks and Telecommunication
1 Technology in Action © 2007 Prentice-Hall, Inc. 1.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them.
$100 $200 $300 $400 $500 Network topologies Client Architecture Physical Transmission Media Uses of Tele communications Misc. Network Misc. Network.
Computer network  A network consists of multiple computers connected to each other to share data and resources.
Networks.
Computers Are Your Future Eleventh Edition
What is a Network? Living Online Lesson 1 Mrs. Elzey.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.
Computer Networks and Internet. 2 Objectives Computer Networks Computer Networks Internet Internet.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
HI150 – Automation of Health Information Unit 2 Seminar.
Computer Networks CSC September 23,
Technology in Action 1 © 2008 Prentice-Hall, Inc..
Chapter Objectives In this chapter, you will learn:
Chapter 7 - Networking Fundamentals
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Computer Technology Notes #4
Network Basics Extended Learning Module E
© 2009 Prentice-Hall, Inc. 1.
Computer Networks.
EUT 122 Skills and Technology in Communication
© 2009 Prentice-Hall, Inc. 1.
Securing your system, protecting your digital data and devices.
Presentation transcript:

1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components Peer-to-peer networks Computer threats Computer safeguards Computer viruses NEXT SLIDE NEXT SLIDE

2 Networking Fundamentals Computer network: –Two or more computers connected together –Nodes Benefits of a network: –Sharing resources –Transferring files NEXT SLIDE

3 Network Architecture Network designs: –Locally controlled: Peer-to-peer (P2P) –Centrally controlled: Client/server Peer-to-peer Client/ server NEXT SLIDE

4 Peer-to-Peer Networks Nodes communicate with each other: –Peers Share peripheral devices: –Printers –Scanners Home and small office networks NEXT SLIDE

5 Client/Server Networks Client computers: –Users Server computers: –Provide resources to clients –Central control unit Internet NEXT SLIDE

6 LANs and WANs Local area network (LAN): –Nodes are within a small geographic region: Homes Schools Small businesses Wide area network (WAN): –LANs connected over long distances: A few miles to thousands of miles Use telecommunications lines NEXT SLIDE

7 Network Components Transmission media Network adapters Navigation devices Network software NEXT SLIDE

8 Transmission Media Provides communications channel between nodes Forms of media: –Telephone wire: Twisted pair –Coaxial cable –Fiber-optic cable –Radio waves: Wireless Bandwidth: –Data transfer rate NEXT SLIDE

9 Network Adapters Devices connected to or installed in nodes: –Network interface cards (NIC) –External network adapter Enable communication between nodes NIC External adapter NEXT SLIDE

10 Network Navigation Devices Devices that help make data flow possible Routers: –Route data between networks Hubs: –Receive data and retransmit it to nodes on the network Hub Router NEXT SLIDE

11 Networking Software Software needed: –Peer-to-peer: Operating systems that support networking Windows Mac OS –Client/server: Network operating system (NOS) software Windows XP Professional Windows Server 2003 Novell Netware

12 Types of Peer-to-Peer Networks Power line Phone line Ethernet Wireless

13 Power Line Networks Computers are connected to a house’s electrical wiring to create a network Power line network adapter is used to connect nodes to electrical outlets NEXT SLIDE

14 Phone Line Networks Computers are connected to a house’s telephone wiring to create a network Home phone line network adapter is used to connect nodes to phone jacks NEXT SLIDE

15 Ethernet Networks Computers are connected to each other using unshielded twisted pair cable Ethernet network adapters are used to connect nodes –NIC –PC card –USB adapter NEXT SLIDE RJ-45 connector PC card NIC card USB adapter

16 Ethernet Hubs Keep track of data packets Amplify and retransmit signals Keep the network running efficiently NEXT SLIDE

17 Ethernet Routers Route packets of data between networks Router needed to send data between the network and the Internet NEXT SLIDE

18 Wireless Networks Use radio waves to connect nodes Basically an Ethernet network that uses radio waves instead of wires Each node requires a wireless network adapter: –Transceiver NEXT SLIDE

19 Choosing a Peer-to-Peer Network Things to consider: –Existing wiring –Wireless or wired –Speed of the network –Cost of the network NEXT SLIDE

20 Configuring Software for a Home Network Windows operating system: –Windows XP: Network setup wizard –Windows ME: Network setup wizard –Windows 98: Configure manually NEXT SLIDE

21 Computer Threats Cyber-crime Hackers: –Who they are –What they do –How they gain access NEXT SLIDE

22 Cyber-crimes and Cyber-criminals Cyber-crimes are criminal acts conducted through the use of a computer: –Fraud –Identity theft Cyber-criminals are individuals who use a computer to commit a crime NEXT SLIDE

23 Hackers Anyone who unlawfully accesses a computer system Types of hackers: –Cracker –White-hat –Black-hat –Script kiddies NEXT SLIDE

24 What Hackers Do Steal information from computers: –Credit card numbers –Bank account numbers Internet packet sniffing Commit identity theft Create widespread computer attacks: –Backdoor programs (Trojan horse) –Zombies Denial of service attacks NEXT SLIDE

25 How Hackers Gain Access Direct access: –Hacking software Indirect access: –Internet connection –Logical ports NEXT SLIDE

26 Computer Safeguards Firewalls Viruses and antivirus software NEXT SLIDE

27 Firewalls Software programs or hardware designed to close logical ports to invaders Types of firewalls: –Norton Personal Firewall –McAfee Firewall –Zone Alarm –BlackICE PC Protection –Network routers NEXT SLIDE

28 Computer Viruses A program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host program Norton AntiVirus Response Center Web Page NEXT SLIDE

29 What Viruses Do Replicate themselves: –Slow down networks Secondary objectives: –Annoying messages –Delete files on the hard drive –Change computer settings Love Letter – Fastest spreading virus Melissa – Caused $80 million damage Nimda – Affected more than 1 million computers NEXT SLIDE

30 Types of Viruses Boot-sector viruses: –Replicate themselves in the boot sector of the hard drive Logic bombs: –Activate when certain conditions are met Worms: –Travel between systems through networks March 6 NEXT SLIDE

31 Types of Viruses Script viruses: –Hidden on Web pages –Mini programs Macro viruses: –Attached to documents –Series of commands Trojan horses: –Backdoor programs –Control remote computers NEXT SLIDE

32 Virus Classifications Polymorphic viruses: –Periodically rewrite themselves to avoid detection Multipartite viruses: –Infect multiple file types Stealth viruses: –Erase their code from the hard drive and reside in the active memory Polymorphic viruses: –Periodically rewrite themselves to avoid detection Multipartite viruses: –Infect multiple file types Stealth viruses: –Erase their code from the hard drive and reside in the active memory NEXT SLIDE

33 Antivirus Software Programs designed to detect viruses: –Scan files looking for virus signatures (unique code) –Provides options for deleting or fixing infected files Detect known viruses Antivirus programs need to be updated frequently NEXT SLIDE