Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them.

Slides:



Advertisements
Similar presentations
Downloading + Viruses. Downloading Modems (56K) V.90 DSL (digital subscriber line) Cable Modem Satellite.
Advertisements

1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
© 2009 Prentice-Hall, Inc Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
Nasca Internet Networking and Security viruses.
© 2008 Prentice-Hall, Inc. 1 Technology in Action 1.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
© 2009 Prentice-Hall, Inc. 1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
1Lecturer: Dalia Mirghani Saadabi. 2 A set of computers connected together so that they can communicate is called a computer network. This involves installing.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
1. 2 Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2012 Pearson Education, Inc. Publishing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
IS 2101 Spring 2009 Chapter 12 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Copyright © 2010 Pearson.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
D. Beecroft Fremont High School VIRUSES.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
NETWORKS.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
1 Technology in Action © 2007 Prentice-Hall, Inc. 1.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
COMPUTER SECURITY: INFORMATION AND ACCOUNT By: Jack Denman.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
HI150 – Automation of Health Information Unit 2 Seminar.
Computer Networks CSC September 23,
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Technology in Action 1 © 2008 Prentice-Hall, Inc..
Introduction to Computers
By Quentin Lively Notorious Viruses.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
© 2009 Prentice-Hall, Inc. 1.
Chap 10 Malicious Software.
Chap 10 Malicious Software.
© 2009 Prentice-Hall, Inc. 1.
Securing your system, protecting your digital data and devices.
Presentation transcript:

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses NEXT SLIDE

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.2 Networking Fundamentals Computer network:Computer network: –Two or more computers connected together Network Designs:Network Designs: –Locally controlled: Peer-to-peer (P2P) Peer-to-peer (P2P) –Centrally controlled: Client/server Client/server Describe network based on distanceDescribe network based on distance –LAN –WAN Computer network:Computer network: –Two or more computers connected together Network Designs:Network Designs: –Locally controlled: Peer-to-peer (P2P) Peer-to-peer (P2P) –Centrally controlled: Client/server Client/server Describe network based on distanceDescribe network based on distance –LAN –WAN NEXT SLIDE

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.3 Network Components Transmission mediaTransmission media –Data transfer rate Network adaptersNetwork adapters –Network Interface Cards (NIC) –External Network Adapter Navigation devicesNavigation devices –Hubs –Routers Network softwareNetwork software Transmission mediaTransmission media –Data transfer rate Network adaptersNetwork adapters –Network Interface Cards (NIC) –External Network Adapter Navigation devicesNavigation devices –Hubs –Routers Network softwareNetwork software NEXT SLIDE Telephone wire: T wi st ed pa ir Coaxial cable Fiber-optic cable Radio waves: Wireless

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.4 Peer-to-Peer Networks Types of P2P networksTypes of P2P networks –Power line –Phone line –Ethernet –Wireless Things to consider:Things to consider: –Existing wiring –Wireless or wired –Speed of the network –Cost of the network Types of P2P networksTypes of P2P networks –Power line –Phone line –Ethernet –Wireless Things to consider:Things to consider: –Existing wiring –Wireless or wired –Speed of the network –Cost of the network

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.5 Computer Threats Cyber-crime, Cyber-criminalCyber-crime, Cyber-criminal Hackers:Hackers: –Who they are –What they do Steal information from computers: Steal information from computers: Internet packet sniffing Internet packet sniffing Commit identity theft Commit identity theft Create widespread computer attacks: Create widespread computer attacks: Denial of service attacks Denial of service attacks –How they gain access Direct access: Direct access: –Hacking software Indirect access: Indirect access: –Internet connection –Logical ports Cyber-crime, Cyber-criminalCyber-crime, Cyber-criminal Hackers:Hackers: –Who they are –What they do Steal information from computers: Steal information from computers: Internet packet sniffing Internet packet sniffing Commit identity theft Commit identity theft Create widespread computer attacks: Create widespread computer attacks: Denial of service attacks Denial of service attacks –How they gain access Direct access: Direct access: –Hacking software Indirect access: Indirect access: –Internet connection –Logical ports NEXT SLIDE

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.6 MovieMovie The Net (1995) The Net (1995)

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.7 Computer Safeguards FirewallsFirewalls Viruses and antivirus softwareViruses and antivirus software FirewallsFirewalls Viruses and antivirus softwareViruses and antivirus software NEXT SLIDE

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.8 FirewallsFirewalls Software programs or hardware designed to close logical ports to invadersSoftware programs or hardware designed to close logical ports to invaders Types of firewalls:Types of firewalls: –Norton Personal Firewall –McAfee Firewall –Zone Alarm –BlackICE PC Protection –Network routers Static addressingStatic addressing Dynamic addressingDynamic addressing Software programs or hardware designed to close logical ports to invadersSoftware programs or hardware designed to close logical ports to invaders Types of firewalls:Types of firewalls: –Norton Personal Firewall –McAfee Firewall –Zone Alarm –BlackICE PC Protection –Network routers Static addressingStatic addressing Dynamic addressingDynamic addressing NEXT SLIDE

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.9 Software firewall download ZoneAlarm— atalog/products/sku_list_za.jsp?lid=pdb_z al atalog/products/sku_list_za.jsp?lid=pdb_z al Sygate— Norton Personal Firewall— ZoneAlarm— atalog/products/sku_list_za.jsp?lid=pdb_z al atalog/products/sku_list_za.jsp?lid=pdb_z al Sygate— Norton Personal Firewall—

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.10 Computer Viruses A program that attaches itself to another program and spreads itself to other computersA program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host programViruses are hidden within the code of a host program A program that attaches itself to another program and spreads itself to other computersA program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host programViruses are hidden within the code of a host program Norton AntiVirus Response Center Web Page NEXT SLIDE

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.11 What Viruses Do Replicate themselves:Replicate themselves: –Slow down networks Secondary objectives:Secondary objectives: –Annoying messages –Delete files on the hard drive –Change computer settings Replicate themselves:Replicate themselves: –Slow down networks Secondary objectives:Secondary objectives: –Annoying messages –Delete files on the hard drive –Change computer settings Love Letter – Fastest spreading virus Melissa – Caused $80 million damage Nimda – Affected more than 1 million computers NEXT SLIDE

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.12 Types of Viruses Boot-sector viruses:Boot-sector viruses: –Replicate themselves in the boot sector of the hard drive Logic bombs:Logic bombs: –Activate when certain conditions are met –Michelangelo virus Worms:Worms: –Travel between systems through networks –Sasser worm Boot-sector viruses:Boot-sector viruses: –Replicate themselves in the boot sector of the hard drive Logic bombs:Logic bombs: –Activate when certain conditions are met –Michelangelo virus Worms:Worms: –Travel between systems through networks –Sasser worm March 6 NEXT SLIDE

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.13 Types of Viruses Script viruses:Script viruses: –Hidden on Web pages –Mini programs Macro viruses:Macro viruses: –Attached to documents –Series of commands –Melissa virus Trojan horses:Trojan horses: –Backdoor programs –Control remote computers Script viruses:Script viruses: –Hidden on Web pages –Mini programs Macro viruses:Macro viruses: –Attached to documents –Series of commands –Melissa virus Trojan horses:Trojan horses: –Backdoor programs –Control remote computers NEXT SLIDE

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.14 Virus Classifications Polymorphic viruses:Polymorphic viruses: –Periodically rewrite themselves to avoid detection Multipartite viruses:Multipartite viruses: –Infect multiple file types Stealth viruses:Stealth viruses: –Erase their code from the hard drive and reside in the active memory Polymorphic viruses:Polymorphic viruses: –Periodically rewrite themselves to avoid detection Multipartite viruses:Multipartite viruses: –Infect multiple file types Stealth viruses:Stealth viruses: –Erase their code from the hard drive and reside in the active memory NEXT SLIDE

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.15 Antivirus Software Programs designed to detect viruses:Programs designed to detect viruses: –Scan files looking for virus signatures (unique code) –Provides options for deleting or fixing infected files Detect known virusesDetect known viruses Antivirus programs need to be updated frequentlyAntivirus programs need to be updated frequently Programs designed to detect viruses:Programs designed to detect viruses: –Scan files looking for virus signatures (unique code) –Provides options for deleting or fixing infected files Detect known virusesDetect known viruses Antivirus programs need to be updated frequentlyAntivirus programs need to be updated frequently NEXT SLIDE

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.16 Chapter 7 Summary Questions What is a firewall and how does it keep my computer safe from hackers?What is a firewall and how does it keep my computer safe from hackers? From which types of viruses do I need to protect my computer?From which types of viruses do I need to protect my computer? What can I do to protect my computer from viruses?What can I do to protect my computer from viruses? What is a firewall and how does it keep my computer safe from hackers?What is a firewall and how does it keep my computer safe from hackers? From which types of viruses do I need to protect my computer?From which types of viruses do I need to protect my computer? What can I do to protect my computer from viruses?What can I do to protect my computer from viruses? LAST SLIDE