Download presentation
Presentation is loading. Please wait.
Published byRalph Manning Modified over 9 years ago
1
1 Technology in Action © 2007 Prentice-Hall, Inc. 1
2
2 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses
3
3 Topics Networking fundamentalsNetworking fundamentals Network architectureNetwork architecture Network componentsNetwork components Peer-to-peer networksPeer-to-peer networks Computer threatsComputer threats Computer safeguardsComputer safeguards Computer virusesComputer viruses
4
4 Networking Fundamentals Computer network:Computer network: –Two or more computers connected together Each is a NodeEach is a Node Benefits of a network:Benefits of a network: –Sharing resources –Transferring files
5
5 Network Architecture Network designs:Network designs: –Individual PC controlled: Peer-to-peer (P2P)Peer-to-peer (P2P) –Centrally controlled: Client/serverClient/server Peer-to-peer Client/ server
6
6 Peer-to-Peer Networks Nodes communicate with each other:Nodes communicate with each other: –Peers Share peripheral devices:Share peripheral devices: –Printers –Scanners Home and small office networksHome and small office networks
7
7 Client/Server Networks Client computers:Client computers: –Users Server computers:Server computers: –Provide resources to clients –Central network control InternetInternet –A large, multi-server, multi-client network. multi-client network.
8
8 LANs and WANs Local area network (LAN):Local area network (LAN): –Nodes are within a small geographic region: HomesHomes SchoolsSchools Small businessesSmall businesses Wide area network (WAN):Wide area network (WAN): –LANs connected over long distances: A few miles to thousands of milesA few miles to thousands of miles Use telecommunications linesUse telecommunications lines
9
9 Network Components Transmission mediaTransmission media Network adaptersNetwork adapters Navigation devicesNavigation devices Network softwareNetwork software
10
10 Transmission Media Provides communications channel between nodesProvides communications channel between nodes Forms of media:Forms of media: –Telephone wire: Twisted pairTwisted pair –Coaxial cable –Fiber-optic cable –Radio waves: WirelessWireless Bandwidth:Bandwidth: –Data transfer rate –Throughput
11
11 Network Adapters Devices connected to or installed in nodes:Devices connected to or installed in nodes: –Network interface cards (NIC) –External network adapter Enable communication between nodesEnable communication between nodes
12
12 Network Navigation Devices Devices that help make data flow possibleDevices that help make data flow possible Routers:Routers: –Route data between networks Switches:Switches: –Receive data and retransmit it to nodes on the network
13
13 Networking Software Peer-to-peer Software:Peer-to-peer Software: Built into operating systems that support networkingBuilt into operating systems that support networking –Windows –Mac OS Client/server SoftwareClient/server Software Network operating system (NOS) softwareNetwork operating system (NOS) software –Windows XP Professional –Windows Server 2003 –Novell Netware
14
14 Types of Peer-to-Peer Networks Power linePower line Phone linePhone line EthernetEthernet WirelessWireless
15
15 Ethernet Networks Ethernet network adapters are used to connect nodesEthernet network adapters are used to connect nodes –NIC card –PC Card –USB adapter Computers are connected to each other using unshielded twisted pair cableComputers are connected to each other using unshielded twisted pair cable RJ-45 Phoneline
16
16 Ethernet Switches Keep track of data packetsKeep track of data packets Amplify and retransmit signalsAmplify and retransmit signals Keep the network running efficientlyKeep the network running efficiently
17
17 Ethernet Routers Transfer packets from one network to anotherTransfer packets from one network to another Home Internet routers transfer data from the Internet to the home network.Home Internet routers transfer data from the Internet to the home network. Router
18
18 Wireless Networks Use radio waves to connect nodesUse radio waves to connect nodes Basically an Ethernet network that uses radio waves instead of wiresBasically an Ethernet network that uses radio waves instead of wires Each node requires a wireless network adapter:Each node requires a wireless network adapter: –Transceiver 802.11a/b/g/n for wireless and 802.3 for wired.802.11a/b/g/n for wireless and 802.3 for wired.
19
19 Power Line Networks Computers are connected to a house’s electrical wiring to create a networkComputers are connected to a house’s electrical wiring to create a network Power line network adapter is used to connect nodes to electrical outletsPower line network adapter is used to connect nodes to electrical outlets
20
20 Phone Line Networks Computers are connected to a house’s telephone wiring to create a networkComputers are connected to a house’s telephone wiring to create a network Home phone line network adapter is used to connect nodes to phone jacksHome phone line network adapter is used to connect nodes to phone jacks
21
21 Choosing a Peer-to-Peer Network Things to consider:Things to consider: –Existing wiring –Wireless or wired –Speed of the network –Cost of the network Comparing the Major Types of Home Networks Wired Ethernet Wireless 802.11g Wireless Enhanced G Wireless 802.11n Maximum data Transfer rate (bandwidth) 100 Mbps to 1,000 Mbps to (1 gigabit) 54 Mbps108 Mbps100 to 630 bps Relative installation and equipment costs for networking two computers $$$$$$$
22
22 Configuring Software for a Home Network Windows operating system:Windows operating system: –Windows XP: Network setup wizardNetwork setup wizard –Wired or wireless –Windows ME: Network setup wizardNetwork setup wizard –Windows 98: Configure manuallyConfigure manually –Help has a clear instructions
23
23 Computer Threats Cyber-crimes are criminal acts conducted through the use of computers by Cyber-criminals.Cyber-crimes are criminal acts conducted through the use of computers by Cyber-criminals.
24
24 Hackers Anyone who unlawfully accesses a computer systemAnyone who unlawfully accesses a computer system Types of hackers:Types of hackers: –White-hat –Black-hat –Script kiddies
25
25 What Hackers Do Steal information from computers:Steal information from computers: –Credit card numbers –Bank account numbers Internet packet sniffingInternet packet sniffing Commit identity theftCommit identity theft
26
26 Denial of Service Attacks Backdoor programsBackdoor programs –Trojan horse –Zombies Denial of service attacksDenial of service attacks
27
27 How Hackers Gain Access Direct access:Direct access: –Hacking software Indirect access:Indirect access: –Internet connection –Logical ports http: 80http: 80 SMTP: 25SMTP: 25 ftp: 21ftp: 21
28
28 Computer Safeguards Firewalls Software programs or hardware designed to close logical ports to invadersSoftware programs or hardware designed to close logical ports to invaders –A firewall is built into Windows XP –More robust firewalls are available from other vendors. –Firewalls are critical if you have an always-on broadband connection.
29
29 Protecting a Wireless Network Wireless network range doesn’t stop at the property line.Wireless network range doesn’t stop at the property line. Default device and network ID settings allow intruders to enter the network.Default device and network ID settings allow intruders to enter the network. Internet bandwidth can be stolenInternet bandwidth can be stolen Computers can be vulnerable to hacker intrusion and takeover.Computers can be vulnerable to hacker intrusion and takeover.
30
30 Computer Threat - Viruses A program that attaches itself to another program and spreads itself to other computersA program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host programViruses are hidden within the code of a host program
31
31 How Does a Computer Catch a Virus Viruses copy themselvesViruses copy themselves Infect a file on your computerInfect a file on your computer Viruses spread by sharing disksViruses spread by sharing disks E-mail attachments are the most likely source of a virusE-mail attachments are the most likely source of a virus
32
32 What Viruses Do Replicate themselves:Replicate themselves: –Slow down networks Secondary objectives:Secondary objectives: –Annoying messages –Delete files on the hard drive –Change computer settings
33
33 Types of Viruses Boot-sector viruses:Boot-sector viruses: –Replicate themselves in the boot sector of the hard drive Logic bombs:Logic bombs: –Activate when certain conditions are met Worms:Worms: –Travel between systems through networks –Independently replicates –Slightly different with viruses (dependable on host).
34
34 Types of Viruses Script viruses:Script viruses: –Hidden on Web pages –Mini programs Macro viruses:Macro viruses: –Attached to documents –Series of commands Trojan horses:Trojan horses: –Backdoor programs –Control remote computers
35
35 Virus Classifications Polymorphic viruses: – –Periodically rewrite themselves to avoid detection Multipartite viruses: – –Infect multiple file types Stealth viruses: – –Erase their code from the hard drive and reside in the active memory
36
36 Antivirus Software Programs designed to detect viruses:Programs designed to detect viruses: –Scan files looking for virus signatures (unique code) –Provides options for deleting or fixing infected files Detect known virusesDetect known viruses Antivirus programs need to be updated frequentlyAntivirus programs need to be updated frequently
37
37 Chapter 7 Summary Questions What is a network and what are the advantages of setting one up?What is a network and what are the advantages of setting one up?
38
38 Chapter 7 Summary Questions What is the difference between a client/server network and a peer-to-peer network?What is the difference between a client/server network and a peer-to-peer network?
39
39 Chapter 7 Summary Questions What are the main components of every network?What are the main components of every network?
40
40 Chapter 7 Summary Questions What are the most common home networks?What are the most common home networks?
41
41 Chapter 7 Summary Questions What are power line networks?What are power line networks?
42
42 Chapter 7 Summary Questions What are phone line networks?What are phone line networks?
43
43 Chapter 7 Summary Questions What are Ethernet networks?What are Ethernet networks?
44
44 Chapter 7 Summary Questions What are wireless networks?What are wireless networks?
45
45 Chapter 7 Summary Questions How can hackers attack a network and what harm can they cause?How can hackers attack a network and what harm can they cause?
46
46 Chapter 7 Summary Questions How are home wireless networks vulnerable?How are home wireless networks vulnerable?
47
47 Chapter 7 Summary Questions What is a firewall and how does it keep my computer safe from hackers?What is a firewall and how does it keep my computer safe from hackers?
48
48 Chapter 7 Summary Questions From which types of viruses do I need to protect my computer?From which types of viruses do I need to protect my computer?
49
49 Chapter 7 Summary Questions What can I do to protect my computer from viruses?What can I do to protect my computer from viruses?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.