IS 2101 Spring 2009 Chapter 12 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Slides:



Advertisements
Similar presentations
Chapter 7 Networking: Connecting Computing Devices
Advertisements

LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Networking Basics lesson 17. This lesson includes the following sections: The Uses of a Network How Networks are Structured Network Topologies for LANs.
Unit 9 Network Fundamentals. Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Nasca Internet Networking and Security viruses.
© 2008 Prentice-Hall, Inc. 1 Technology in Action 1.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
Computer Networks & Security
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
© 2009 Prentice-Hall, Inc. 1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
Computer Networks IGCSE ICT Section 4.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Unit 8 Network Fundamentals Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Copyright © 2010 Pearson.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
CSCI 1101 Intro to Computers 6. Local Area Networks.
Chapter 5 Networks Communicating and Sharing Resources
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
Chapter 9A Network Basics.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Chapter 1 Intro to Routing & Switching.  Networks have changed how we communicate  Everyone can connect & share  How have networks changed the way…
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Networking Basics lesson 4 essential concepts. This lesson includes the following sections: The Uses of a Network How Networks are Structured Network.
Unit 1—Computer Basics Lesson 7 Networks.
Module 2: Information Technology Infrastructure
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc.
NETWORKS.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Computer Networks – an overview 1. 2 Computer Networks Advantages of a network Advantages of a network Client/server and peer-to-peer networks Client/server.
1 Technology in Action Chapter 12 Behind the Scenes: Networking and Security Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer.
Living Online Module Lesson 23 — Networks and Telecommunication
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Technology in Action © 2007 Prentice-Hall, Inc. 1.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them.
Computers Are Your Future Eleventh Edition
Introduction to Computing Lecture # 11 Introduction to Computing Lecture # 11.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Chapter 11 Local Area Networks Information Technology in Theory By Pelin Aksoy and Laura DeNardis.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
HI150 – Automation of Health Information Unit 2 Seminar.
Computer Networks CSC September 23,
Technology in Action 1 © 2008 Prentice-Hall, Inc..
Chapter Objectives In this chapter, you will learn:
Chapter 7 - Networking Fundamentals
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
© 2009 Prentice-Hall, Inc. 1.
King Saud University- College OF Applied Studies
King Saud University- College OF Applied Studies
© 2009 Prentice-Hall, Inc. 1.
Securing your system, protecting your digital data and devices.
Presentation transcript:

IS 2101 Spring 2009 Chapter 12 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Chapter Topics Networking fundamentals Network architecture Network components Peer-to-peer networks Ethernet networks Power line networks Computer threats Computer safeguards Computer viruses

Networking Fundamentals Computer network:  Two or more computers connected together  Devices connected to networks: nodes Benefits of a network:  Sharing resources and peripherals  Transferring files  Sharing of broadband connection with use of a router

Network Architecture Network designs:  Locally administered: Peer-to-peer (P2P)  Centrally administered: Client/server

Peer-to-Peer Networks Nodes communicate with each other:  Peers Share peripheral devices Used in home and small office networks

Client/Server Networks Client computers:  Users who make requests Server computers:  Provide resources to clients  Central network control Internet  A large, multiserver, multiclient network.

LANs and WANs Local area network (LAN):  Nodes are within a small geographic region: Homes Schools Small businesses Wide area network (WAN):  LANs connected over long distances: A few miles to thousands of miles Use telecommunications lines

MANs Metropolitan area network (MAN)  Nodes are within a specific geographic region, such as a city  Sponsored by a government entity to provide access to city residents and/or visitors

Network Components Transmission media Network communication devices Software

Transmission Media Provides communications channel between nodes Forms of media:  Twisted pair  Coaxial cable  Fiber-optic cable  Radio waves: Wireless Bandwidth:  Data transfer rate  Throughput

Network Adapters Devices connected to or installed in nodes:  Network interface cards (NICs)  External network adapters Enable communication between nodes

Network Navigation Devices Devices that help make data flow possible Routers:  Route data between networks Switches:  Receive data and retransmit it to nodes on the same network

Networking Software Peer-to-Peer Software Built into operating systems that support networking –Windows –Mac OS Client/Server Software Network operating system (NOS) software –Windows XP Professional –Windows Server 2008 –Novell Netware –Windows Vista Enterprise –SUSE Linux Enterprise

Types of Peer-to-Peer Networks Wired Ethernet networks Wireless Ethernet networks Power-line networks

Wired Ethernet Networks Ethernet network adapters are used to connect nodes  NIC card  PC Card  USB adapter Computers are connected to each other using unshielded twisted pair cable Ethernet Phone

Ethernet Switches Keep track of data packets Amplify and retransmit signals Keep the network running efficiently

Ethernet Routers Transfer packets from one network to another Home Internet routers transfer data from the Internet to the home network. Allows for network-ready devices such as network printers or NAS (network attached storage) Router

18 Wireless Ethernet Networks Use radio waves to connect nodes Basically Ethernet networks that use radio waves instead of wires Based on the IEEE standard, also known as Wi-Fi (Wireless Fidelity) Each node requires a wireless network adapter  Transceivers

Wireless Challenges n standard not yet standardized g maximum range of 250 feet As distance increases, throughput decreases g works on a bandwidth of 2.4 Ghz (the same as many cordless phones). Obstacles such as walls and metal objects cause interference.

Wireless Access Point (WAP) Device added to a wireless network to extend the range of the network Must connect to either a switch, a router, or a node on the network

Power-Line Networks Computers are connected to a house’s electrical wiring to create a network A power-line network adapter is used to connect nodes to electrical outlets

Choosing a Peer-to-Peer Network Things to consider: - Whether you want wireless communications - How fast you want your network connection to be - Whether existing wiring is available -How much money you can spend on your network Comparing the Major Types of Home Networks Wired Ethernet Wireless g Wireless Enhanced G Wireless n Maximum data Transfer rate (bandwidth) 100 Mbps to 1,000 Mbps (1 gigabit) 54 Mbps108 Mbps540 Mbps Relative installation and equipment costs for networking two computers $$$$$$$

Configuring Software for a Home Network Windows  Windows 7 home versions Network setup wizard –Wired or wireless  Windows XP Network setup wizard  Windows 98 Configure manually –Help has a clear instruction

Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals.

Hackers Anyone who unlawfully accesses a computer system Types of hackers:  White-hat  Black-hat  Script kiddies

What Hackers Do Steal information from computers:  Credit card numbers  Bank account numbers Internet packet sniffing Commit identity theft

Identity Theft Thief steals your name, address, social security number, and/or bank account and credit card information Can result in credit problems and refusal of healthcare service if policy limits are exceeded Can be stolen using computer, theft of wallets and purses, mail, credit statements, or pretense of being a bank or credit company official

Preventing Identity Theft 1.Never reveal password or PIN. 2.Never reveal personal information without first verifying you are dealing with a legitimate representative. 3.Create hard-to-guess passwords. Use a combination of letters and numbers Avoid using obvious passwords 4.When shopping online, beware of unfamiliar merchants. 5.If you are a victim of identity theft, freeze credit history or place an extended fraud alert.

How Computers Are Attacked Trojan horse Backdoor program  Zombies Denial of service attacks Distributed denial of service attacks (DDoS)

How Hackers Gain Access Direct access:  Hacking software Indirect access:  Internet connection  Logical ports

Computer Safeguards: Firewalls Software programs or hardware designed to close logical ports to invaders  A firewall is built into Windows 7  More robust firewalls are available from other vendors  Firewalls are critical if you have an always-on broadband connection

Protecting a Wireless Network Wireless network range doesn’t stop at the property line Default device and network ID settings allow intruders to enter the network Internet bandwidth can be stolen Computers can be vulnerable to hacker intrusion and takeover

Computer Threats: Viruses A program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host program

How Does a Computer Catch a Virus? Viruses copy themselves Infect a file on your computer Spread by sharing disks or flash drives attachments are the most likely source of a virus

What Viruses Do Replicate themselves:  Slow down networks Secondary objectives:  Display annoying messages  Delete files on the hard drive  Change computer settings

Types of Viruses Boot-sector viruses  Replicate themselves in the boot sector of the hard drive Logic bombs  Activate when certain conditions are met Time bombs  Viruses that are triggered by the passage of time or on a certain date Worms  Travel between systems through networks

Types of Viruses Script viruses:  Hidden on Web pages as mini programs Macro viruses:  Attached to documents  Series of commands virus  Use address book to distribute the virus Encryption viruses  Compresses files using a complex encryption key  User must pay to get the files unlocked

Virus Classifications Polymorphic viruses:  Periodically rewrite themselves to avoid detection Multipartite viruses:  Infect multiple file types Stealth viruses:  Erase their code from the hard drive and reside in the active memory

Antivirus Software Programs designed to detect viruses:  Scan files looking for virus signatures (unique code)  Provide options for deleting or fixing infected files  Inoculate files against further infection Detect known viruses Antivirus programs need to be updated frequently