Download presentation
Presentation is loading. Please wait.
Published byWilliam Flowers Modified over 9 years ago
1
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses
2
Chapter Seven Objectives Networks –Client/Server –Main components –Common types Hackers and harm Firewall Viruses Protection
3
Networking Fundamentals Definition Benefits Internet share
4
Network Architectures Nodes Peer-to-peer Client/Server
5
Networks and Distance LAN WAN
6
Data Transmission Media Twisted pair Coaxial Fiber optic
7
Data Navigation Devices Packets Routers Hubs
8
Networking Software For peer-to-peer For client/server
9
Peer-to-Peer Network Types Power line Phone line Ethernet Wireless
10
Power Line Networks Uses house wiring –Max at 14 Mbps Power line network adapter –USB or Ethernet Plug and play –Software Routers and hubs Uses phone lines and jacks –Sharing with phones –Max at 10 Mbps HPNA adapter or USB Routers and hubs
11
Ethernet Networks Most efficient –Usual speed at 100 Mbps Use unshielded twisted pair cable (UTP) Use routers and hubs Use NICS (network interface cards)
12
Ethernet Cabling Installation, distance UTP categories Cable Category Maximum Data Transfer Rate Category 5 (CAT 5)100 Mbps Category 5E (CAT 5E)200 Mbps Category 6 (CAT 6)1000 Mbps (1 Gbps) Fig 7.11
13
Ethernet Architecture Hubs Routers –DSL/cable routers Internet
14
Wireless Networks Radio waves, not cabling Wi-Fi –Several IEEE standards Wireless network adapter Transceiver
15
Wireless Considerations Range, signal degradation Node positions –Wireless access point Internet connection –Wireless DSL/cable routers
16
Peer-to-Peer Questions Existing wiring? Wireless also? How fast? Budget?
17
Comparing Home Networks Factors: Power Line Phone Line EthernetWireless Maximum data transfer rate (throughput) 14 Mbps 10 Mbps 100 to 1000 Mbps 11 to 54 Mbps Approximate cost to network two computers (adapters and wiring only) $160$120$135$225 Additional cost for adding Internet connection sharing $80$120$0$40 Approximate cost to add a computer to network $80$60$40$60
18
Configuring Home Network Software With XP With OS mix Without XP
19
Computer Safety Cybercrime Cybercriminals
20
Computer Threats: Hackers White hat Black hat Script kiddies Why Hack? Credit cards Packet sniffer Identity theft
21
Safety Tips Hide passwords, pins Personal info Passwords: –Numbers and letters –Obscure letter combinations FTC Identity Theft
22
Hacker Activities Trojan horses –Far-reaching damage –Back-door programs Denial of service Distributed DOS Hacker access: –Directly –Via logical ports
23
Firewall Protection Software –Easy, port protection Hardware
24
Firewalls … Block ports Hide network address Use packet-filtering Use NAT
25
Computer-At-Risk Testing Free test from Gibson Research Corporation Gibson Research Corporation
26
Computer Viruses Definition Kinds of damage Virus sources
27
Computer Viruses: Types Grouped by behavior and method of transmission –Boot sector –Logic bombs –Worms –Script and macro –Trojan Horses
28
How Viruses Avoid Detection Polymorphic Multi-partite Stealth
29
Antivirus Software Norton
30
Antivirus Software Virus signatures Known viruses “Signature” updates
31
Other Security Measures Update OS –System updates –Security patches
32
Networking and Security Topic Summary What is a network –Advantages Difference between a client/server network and a peer-to-peer (P2P) Main network components Common home networks Power line networks Phone line networks
33
Networking and Security Topic Summary Ethernet networks Wireless networks How hackers attack –Harm Firewall –How does it keep a computer safe Viruses Protection
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.