GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 12 Networks, Security, and Privacy Copyright © 2015 Pearson Education, Inc.

Slides:



Advertisements
Similar presentations
Object-Oriented Analysis and Design: Activity Diagrams
Advertisements

1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson,
1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson,
1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson,
Skills for Success with Microsoft Office 2013 Volume 1
Organizational Structure and Design Chapter Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Getting Started with Microsoft SQL Server 2012 Express Edition Appendix A DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 6 th Edition.
Chapter One Customer Focus and Managing Customer Loyalty
1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson,
1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson,
 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Chapter 6 The Voice of the Market.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 1 Computers, Information Processing, and Ubiquitous Systems Copyright © 2015.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 11 Creating Tables and Inserting Functions and Charts Copyright © 2015 Pearson.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 15 Application Software Copyright © 2015 Pearson Education, Inc. Publishing.
PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 5 Using Internet Explorer, Microsoft Cloud Computing, and OneNote Copyright.
Creating Documents with Microsoft Word 2013
GO! with Office 2013 Volume 1 By: Shelley Gaskin, Alicia Vargas, and Carolyn McLellan Excel Chapter 2 Using Functions, Creating Tables, and Managing Large.
C HAPTER Social Networking Using LinkedIn 5 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson,
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 3 Introduction to Microsoft Office 2013 Features Copyright © 2015 Pearson.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Access Module 2 Workshop 4 Accessing, Maintaining, and Presenting Information Series.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 2 Getting Started with Windows 8.1 Copyright © 2015 Pearson Education, Inc.
Direct / Online marketing Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 17.
Target marketing Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 7.
Chapter 3 Appendix Object-Oriented Analysis and Design: Project Management Modern Systems Analysis and Design Sixth Edition Jeffrey A. Hoffer Joey F. George.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
GO! with Office 2013 Volume 1 By: Shelley Gaskin, Alicia Vargas, and Carolyn McLellan Access Chapter 3 Forms, Filters, and Reports.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 13 Creating and Editing Presentations with Microsoft PowerPoint 2013 Copyright.
Chapter Thirteen Defensive Strategies. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall13-2 Defensive Strategies Defensive strategic.
Computers Are Your Future Tenth Edition Spotlight 3: Home Network Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter Six Competitor Analysis and Sources of Advantage.
Chapter Six Competitor Analysis and Sources of Advantage.
© 2012 Pearson Education, Inc. publishing Prentice Hall. Chapter 2 Situation Assessment: The External Environment.
GO! with Office 2013 Volume 1 By: Shelley Gaskin, Alicia Vargas, and Carolyn McLellan PowerPoint Chapter 2 Formatting PowerPoint 2 Presentations.
© 2012 Pearson Education, Inc. publishing Prentice Hall. Note 7 Company Assessment— The Value Chain.
Integrating Word, Excel,
GO! with Office 2013 Volume 1 By: Shelley Gaskin, Alicia Vargas, and Carolyn McLellan Word Chapter 1 Creating Documents with Microsoft Word 2013.
Chapter 7 Appendix C Object-Oriented Analysis and Design: Sequence Diagrams Modern Systems Analysis and Design Sixth Edition Jeffrey A. Hoffer Joey F.
Marketing Information 04 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Services and Intangibles 10 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Skills for Success with Microsoft Office 2013 Volume 1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Kris Townsend, Catherine.
Skills for Success with Microsoft Office 2013 Volume 1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Kris Townsend, Catherine.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 8 Using Word to Create Resumes and Cover Letters Copyright © 2015 Pearson.
GO! with Office 2013 Volume 1 By: Shelley Gaskin, Alicia Vargas, and Carolyn McLellan Word Chapter 3 Creating Research Papers, Newsletters, and Merged.
© 2012 Pearson Education, Inc. publishing Prentice Hall. Note 22 Loyalty-Based Marketing, Customer Acquisition, and Customer Retention.
© 2012 Pearson Education, Inc. publishing Prentice Hall. Note 9 The Product Life Cycle.
GO! with Office 2013 Volume 1 By: Shelley Gaskin, Alicia Vargas, and Carolyn McLellan Introduction to Microsoft Office 2013 Features.
GO! with Office 2013 Volume 1 By: Shelley Gaskin, Alicia Vargas, and Carolyn McLellan Access Chapter 1 Introduction to Microsoft Access 2013.
© 2012 Pearson Education, Inc. publishing Prentice Hall. Note 18 Generic Strategies—The Value Map.
GO! with Office 2013 Volume 1 By: Shelley Gaskin, Alicia Vargas, and Carolyn McLellan Excel Chapter 3 Analyzing Data with Pie Charts, Line Charts, and.
© 2012 Pearson Education, Inc. publishing Prentice Hall. Note 16 What is a Marketing Strategy?
Chapter Fourteen Building a Marketing Plan. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall14-2 Building a Marketing Plan Creativity.
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
GO! with Office 2013 Volume 1 By: Shelley Gaskin, Alicia Vargas, and Carolyn McLellan Word Chapter 2 Using Tables and Templates to Create Resumes and Cover.
GO! with Office 2013 Volume 1 By: Shelley Gaskin, Alicia Vargas, and Carolyn McLellan PowerPoint Chapter 1 Introducing Microsoft PowerPoint 2013.
GO! with Office 2013 Volume 1 By: Shelley Gaskin, Alicia Vargas, and Carolyn McLellan PowerPoint Chapter 3 Enhancing a Presentation with Animation, Video,
GO! with Office 2013 Volume 1 By: Shelley Gaskin, Alicia Vargas, and Carolyn McLellan Excel Chapter 1 Creating a Worksheet and Charting Data.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.
Chapter Eleven Portfolio Analysis and Strategic Market Planning.
David M. Kroenke and David J. Auer Database Processing: Fundamentals, Design, and Implementation Chapter Ten: Managing Databases with SQL Server 2012,
Organizational Behavior 15th Ed Diversity in Organizations Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall2-1 Robbins and Judge Chapter.
Chapter Two Marketing Performance and Marketing Profitability.
TECHNOLOGY IN ACTION. Chapter 7 Networking: Connecting Computing Devices.
Note 20 Specific Marketing Strategies
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Presentation transcript:

GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 12 Networks, Security, and Privacy Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.1

Objectives Discuss the Importance of Computer Networks Compare Different Types of LANs and WANs List and Describe the Hardware Used in Both Wired and Wireless Networks List and Describe the Software and Protocols Used in Both Wired and Wireless Networks Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.2

Objectives (cont.) Explain How to Protect a Network Recognize Various Types of Cybercrime Differentiate Between Types of Malware Explain How to Secure a Computer Discuss Safe Computing Practices Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.3

Discuss the Importance of Computer Networks Computer network—two or more computers sharing resources Network resources—software, hardware, files Peer-to-peer network—each computer considered equal Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.4

Discuss the Importance of Computer Networks (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.5

Discuss the Importance of Computer Networks (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.6

Compare Different Types of LANs and WANs Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.7

Compare Different Types of LANs and WANs (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.8

Compare Different Types of LANs and WANs (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.9

List and Describe the Hardware Used in Both Wired and Wireless Networks Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.10

List and Describe the Hardware Used in Both Wired and Wireless Networks (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.11

List and Describe the Hardware Used in Both Wired and Wireless Networks (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.12

List and Describe the Software and Protocols Used in Both Wired and Wireless Networks Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.13

List and Describe the Software and Protocols Used in Both Wired and Wireless Networks (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.14

List and Describe the Software and Protocols Used in Both Wired and Wireless Networks (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.15

Explain How to Protect a Network Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.16

Recognize Various Types of Cybercrime Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.17

Recognize Various Types of Cybercrime (cont.) Adware and malware Suspicious and notifications Phishing and “Please send money” scams Clickjacking Malicious script scams Computer fraud Identity theft Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.18

Recognize Various Types of Cybercrime (cont.) Hacking—unauthorized access to a computer system or network – White-hat—paid to hack – Gray-hat—illegal hacking but not malicious – Black-hat—hack for malicious purposes Cyberterrorism—against a government or its people Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.19

Differentiate Between Types of Malware Spamming—mass unsolicited Cookie—small text file obtained by visiting websites Adware—ads displayed in pop-ups or a banner on website and software Spyware—personal information gathered for malicious purposes Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.20

Differentiate Between Types of Malware (cont.) Computer virus—replicates and infects computers Logic bomb—attacks when certain conditions are met Time bomb—triggers based on date or time Trojan horse—appears legitimate but is malicious Rootkit—enables someone to gain control of computer system Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.21

Differentiate Between Types of Malware (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.22

Explain How to Secure a Computer Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.23

Explain How to Secure a Computer (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.24

Discuss Safe Computing Practices Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.25

Discuss Safe Computing Practices (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.26

Discuss Safe Computing Practices (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.27

Summary A network is two or more computers connected to share resources Networks require hardware and software to function Cybercrime can occur against individuals or organizations Security of your computer system and networks is everyone’s job Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.28

Questions Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.29

Copyright Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.30 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America.