Presentation is loading. Please wait.

Presentation is loading. Please wait.

GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 12 Networks, Security, and Privacy Copyright © 2015 Pearson Education, Inc.

Similar presentations


Presentation on theme: "GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 12 Networks, Security, and Privacy Copyright © 2015 Pearson Education, Inc."— Presentation transcript:

1 GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 12 Networks, Security, and Privacy Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.1

2 Objectives Discuss the Importance of Computer Networks Compare Different Types of LANs and WANs List and Describe the Hardware Used in Both Wired and Wireless Networks List and Describe the Software and Protocols Used in Both Wired and Wireless Networks Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.2

3 Objectives (cont.) Explain How to Protect a Network Recognize Various Types of Cybercrime Differentiate Between Types of Malware Explain How to Secure a Computer Discuss Safe Computing Practices Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.3

4 Discuss the Importance of Computer Networks Computer network—two or more computers sharing resources Network resources—software, hardware, files Peer-to-peer network—each computer considered equal Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.4

5 Discuss the Importance of Computer Networks (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.5

6 Discuss the Importance of Computer Networks (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.6

7 Compare Different Types of LANs and WANs Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.7

8 Compare Different Types of LANs and WANs (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.8

9 Compare Different Types of LANs and WANs (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.9

10 List and Describe the Hardware Used in Both Wired and Wireless Networks Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.10

11 List and Describe the Hardware Used in Both Wired and Wireless Networks (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.11

12 List and Describe the Hardware Used in Both Wired and Wireless Networks (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.12

13 List and Describe the Software and Protocols Used in Both Wired and Wireless Networks Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.13

14 List and Describe the Software and Protocols Used in Both Wired and Wireless Networks (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.14

15 List and Describe the Software and Protocols Used in Both Wired and Wireless Networks (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.15

16 Explain How to Protect a Network Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.16

17 Recognize Various Types of Cybercrime Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.17

18 Recognize Various Types of Cybercrime (cont.) Adware and malware Suspicious email and notifications Phishing and “Please send money” scams Clickjacking Malicious script scams Computer fraud Identity theft Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.18

19 Recognize Various Types of Cybercrime (cont.) Hacking—unauthorized access to a computer system or network – White-hat—paid to hack – Gray-hat—illegal hacking but not malicious – Black-hat—hack for malicious purposes Cyberterrorism—against a government or its people Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.19

20 Differentiate Between Types of Malware Spamming—mass unsolicited email Cookie—small text file obtained by visiting websites Adware—ads displayed in pop-ups or a banner on website and software Spyware—personal information gathered for malicious purposes Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.20

21 Differentiate Between Types of Malware (cont.) Computer virus—replicates and infects computers Logic bomb—attacks when certain conditions are met Time bomb—triggers based on date or time Trojan horse—appears legitimate but is malicious Rootkit—enables someone to gain control of computer system Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.21

22 Differentiate Between Types of Malware (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.22

23 Explain How to Secure a Computer Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.23

24 Explain How to Secure a Computer (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.24

25 Discuss Safe Computing Practices Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.25

26 Discuss Safe Computing Practices (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.26

27 Discuss Safe Computing Practices (cont.) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.27

28 Summary A network is two or more computers connected to share resources Networks require hardware and software to function Cybercrime can occur against individuals or organizations Security of your computer system and networks is everyone’s job Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.28

29 Questions Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.29

30 Copyright Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall.30 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America.


Download ppt "GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 12 Networks, Security, and Privacy Copyright © 2015 Pearson Education, Inc."

Similar presentations


Ads by Google