About Network
-
Upload
muhd-ridhwan-mohd-din -
Category
Documents
-
view
221 -
download
0
Transcript of About Network
-
8/12/2019 About Network
1/87
MBE 13203Information Technology in TVET
1
-
8/12/2019 About Network
2/87
Networking and Security:
Connecting Computers and Keeping
Them Safe from Hackers and Viruses
2
-
8/12/2019 About Network
3/87
3
Chapter Topics (part 1)
Networking fundamentals Network architecture Network components
Peer-to-peer networks Ethernet networks Power-line networks Configuring software
Wireless security
-
8/12/2019 About Network
4/87
Chapter Topics (part 2)
Computer virus types
Protecting computers from viruses
Hackers
Firewalls Passwords and password management
Biometrics
Spyware and spam Backup methods
Protecting physical assets
-
8/12/2019 About Network
5/87
5
Networking Fundamentals
Computer network
Two or more computers connected together
Devices connected to networks: nodes
Benefits of a network Sharing resources and peripherals
Transferring files
Sharing of broadband connection with use of a
router
-
8/12/2019 About Network
6/87
6
Network Architecture
Network designs
Locally administered
Peer-to-peer (P2P)
Centrally administered Client/server
-
8/12/2019 About Network
7/87
7
Peer-to-Peer Networks
Nodes communicate with each other
Peers
Share peripheral devices
Common in home networks
-
8/12/2019 About Network
8/87
8
Client/Server Networks
Client computers
Users who make requests
Server computers
Provide resources to clients Central network control
Internet
A large, multiserver,
multiclient network
-
8/12/2019 About Network
9/87
9
HANs and LANs
Home area network (HAN)
Connects digital devices within a home
Local area network (LAN)
Nodes are within a small geographic region Schools
Small businesses
-
8/12/2019 About Network
10/87
10
WANs and MANs
Wide area network (WAN)
LANs connected over long distances
A few miles to thousands of miles
Uses telecommunications lines Metropolitan area network (MAN)
Provides access within a specific geographicregion, such as a city
-
8/12/2019 About Network
11/87
11
Network Components
Transmission media Network communication
devices
Software
-
8/12/2019 About Network
12/87
12
Transmission Media
Provide communications channel between nodes Forms of media
Twisted pair cable Coaxial cable
Fiber-optic cable Radio waves (wireless) Bandwidth
Data transfer rate Throughput
-
8/12/2019 About Network
13/87
13
Network Adapters
Devices connected to or installed in nodes
Network interface cards (NICs)
External or internal network adapters
Enable communication between nodes
-
8/12/2019 About Network
14/8714
Network Navigation Devices
Devices that help make data flow possible
Routers
Route data between networks
Switches Receive data and retransmit it to nodes on the
same network
-
8/12/2019 About Network
15/87
15
Networking Software
Peer-to-peer software Built into operating systems that support
networking
Windows
Mac OS
Linux
16
-
8/12/2019 About Network
16/87
16
Networking Software
Client/server software Network operating system (NOS) software
Windows Server 2008
SUSE Linux Enterprise
17
-
8/12/2019 About Network
17/87
17
Types of Peer-to-Peer Networks
Wired Ethernet networks
Wireless Ethernet networks
Power-line networks
18
-
8/12/2019 About Network
18/87
18
Wired Ethernet Networks
Ethernet networkadapters are used toconnect nodes
NIC card ExpressCard USB adapter
Computers are connected
to each other usingunshielded twisted paircable
Ethernet Phone
19
-
8/12/2019 About Network
19/87
19
Ethernet Switches
Keep track of data packets
Amplify and retransmit signals
Keep the network running efficiently
20
-
8/12/2019 About Network
20/87
20
Ethernet Routers
Transfer packets from onenetwork to another
Home Internet routers
transfer data from theInternet to the homenetwork
Allows for network-ready
devices such as networkprinters or networkattached storage (NAS)
-
8/12/2019 About Network
21/8721
Wireless Ethernet Networks
Ethernet networks that use radio waves instead ofwires to connect nodes
Based on the IEEE 802.11 standard, also known
as Wi-Fi Each node requires a wireless network adapter
Transceivers
22
-
8/12/2019 About Network
22/87
Wireless Access Point (WAP)
Device added to a wireless network to extend therange of the network
Must connect to either a switch, a router, or a
node on the network
22
23
-
8/12/2019 About Network
23/87
23
Power-Line Networks
Computers areconnected to ahouses electricalwiring to create anetwork
A power-line networkadapter connectsnodes to electrical
outlets
24
-
8/12/2019 About Network
24/87
24
Choosing a Peer-to-Peer Network
Things to consider- Whether existing wiring is available- Whether you want wireless communications
- How fast you want your network connection to be
- How much money you can spend on your network
Comparing the Major Types of Home Networks
WiredEthernet
Power-Line
Wireless802.11g
Wireless802.11n
Maximum data transfer rate(bandwidth)
100 Mbps to1 Gbps
200 Mbps 54 Mbps 540 Mbps
Relative installation andequipment costs fornetworkingtwo computers
$ $$ $ $$
25
-
8/12/2019 About Network
25/87
25
Configuring Software
for Your Home Network
Windows Vista and later versions
Use wizards launched from Network and SharingCenter in Control Panel
Before running wizards:1. Install network adapters on each node.
2. For a wired network, plug all the cables into therouter, network adapters, and so on.
26
-
8/12/2019 About Network
26/87
26
Configuring Software
for Your Home Network
3. Make sure your cable/DSL modem is connected toyour router and the Internet.
4. Turn on your equipment in the following order:
a. Cable/DSL modemb. Router
c. All computers and peripherals (printers,
scanners, and so on)
27
-
8/12/2019 About Network
27/87
27
Networking Multiple Versions
of Windows
Set up Windows 7 and Vista machines first
Automatically detect other computers runningWindows on network
Windows XP will need adjustment to see otherversions of Windows
Give each Windows computer a unique name
Place all computers in the same workgroup
28
-
8/12/2019 About Network
28/87
Configuring a Router to
Connect to the Internet
Contact ISP for special settings
Access router from Web browser
Enter username and password
Use routers wizard to set up connection usingsettings and info provided by ISP
Test Internet connection speed
Speedtest.net
28
29
-
8/12/2019 About Network
29/87
29
Securing Wireless Networks
Wireless network range doesnt stop at theproperty line
Default device and network ID settings allow
intruders to enter the network Internet bandwidth can be stolen
Computers can be vulnerable to hacker intrusionand takeover
30
-
8/12/2019 About Network
30/87
30
Securing Wireless Networks
To secure a wireless network, do the following:
Change your network name (SSID)
Disable SSID broadcast
Change the default password on your router Turn on security protocols
Implement media access control
Limit your signal range
Apply firmware upgrades
31
-
8/12/2019 About Network
31/87
31
Chapter 7 Summary Questions
What is a network, and what are the advantagesof setting one up?
32
-
8/12/2019 About Network
32/87
32
Chapter 7 Summary Questions
What is the difference between a client/servernetwork and a peer-to-peer network?
33
-
8/12/2019 About Network
33/87
33
Chapter 7 Summary Questions
What are the main hardware components ofevery network?
34
-
8/12/2019 About Network
34/87
34
Chapter 7 Summary Questions
What are the most common home networks?
35
-
8/12/2019 About Network
35/87
Chapter 7 Summary Questions
What are wired Ethernet networks, and how arethey created?
36
-
8/12/2019 About Network
36/87
Chapter 7 Summary Questions
What are wireless Ethernet networks, and howare they created?
37
-
8/12/2019 About Network
37/87
Chapter 7 Summary Questions
How are power-line networks created, and arethey a viable alternative to Ethernet networks?
38
-
8/12/2019 About Network
38/87
Chapter 7 Summary Questions
How do I configure my computers software toset up a network?
39
-
8/12/2019 About Network
39/87
Chapter 7 Summary Questions
Why are wireless networks more vulnerable thanwired networks, and what special precautionsare required to ensure my wireless network is
secure?
40
-
8/12/2019 About Network
40/87
41
-
8/12/2019 About Network
41/87
PART 2
3/6/2014
-
8/12/2019 About Network
42/87
Computer Threats
Cybercrimes are criminal acts conducted bycybercriminals through the use of
computers Computer users need to protect themselves
from becoming victims of cybercriminals
-
8/12/2019 About Network
43/87
Types of Cybercrime
Fraud-related (58 percent of cybercrime) Auction fraud
Nondelivery of ordered items
Credit and debit card fraud
Non-fraud-related
Computer intrusions
Unsolicited e-mail
Child pornography
-
8/12/2019 About Network
44/87
Computer Threats: Viruses
Virus: A program that attaches itself to anotherprogram and spreads itself to other computers
Viruses are hidden within the code of a host
program
-
8/12/2019 About Network
45/87
What Viruses Do
Replicate themselves Slow down networks
Secondary objectives
Display annoying messages Delete files on the hard drive
Change computer settings
-
8/12/2019 About Network
46/87
How Does a Computer
Catch a Virus? Viruses copy
themselves andinfect a file onyour computer
Spread by Sharing disks or
flash drives Opening an e-mail
attachment Downloading
infected audio orvideo files
-
8/12/2019 About Network
47/87
Types of Viruses
Boot-sector viruses Replicate themselves in the boot sector of the hard
drive Logic bombs
Activate when certain conditions are met Time bombs Triggered by the passage of time or on a certain
date Worms
Travel between systems through networks
-
8/12/2019 About Network
48/87
Types of Viruses
Script viruses Hidden on Web pages as miniprograms
Macro viruses Attached to documents
E-mail viruses Use e-mail address books to distribute themselves Encryption viruses
Compress files using a complex encryption key
-
8/12/2019 About Network
49/87
Virus Classifications
Polymorphic viruses
Periodically rewrite themselves to avoid detection
Multipartite viruses
Infect multiple file types Stealth viruses
Erase their code from the hard drive and reside inthe active memory
-
8/12/2019 About Network
50/87
Antivirus Software
Programs designed todetect viruses Scan files looking for
virus signatures (uniquecode)
Provide options fordeleting or fixinginfected files
Inoculate files against
further infection Needs to be updated
frequently
-
8/12/2019 About Network
51/87
Dealing with an
Infected Computer
1. Boot computer with antivirus DVD/CD in DVDdrive.
2. Run directly from DVD/CD.
3. Allow software to delete or quarantine infectedfiles.
4. Research viruses found to ensure furthermanual steps are not needed.
-
8/12/2019 About Network
52/87
Prevent Instant
Messaging Viruses
Allow contact from Buddy or Friends List usersonly.
Never automatically accept transfers of data.
Avoid using instant messaging programs onpublic computers.
-
8/12/2019 About Network
53/87
Other Ways to Protect
Your System
Keep your antivirus and operating system (OS)software up to date
Load security patches as soon as they are
available Enable automatic updates
H k
-
8/12/2019 About Network
54/87
Hackers
Anyone who unlawfully accesses a computersystem
Types of hackers
White hat
Black hat Script kiddies
-
8/12/2019 About Network
55/87
What Hackers Steal
Hackers try to steal data stored on hard drives:
Credit card numbers
Bank account numbers
Also can steal information through packetsniffing
Use information to commit identity theft
-
8/12/2019 About Network
56/87
How Computers Are Attacked
Trojan horse
Backdoor program
Zombies
Denial of serviceattacks (DoS)
Distributed denial ofservice attacks
(DDoS)
-
8/12/2019 About Network
57/87
How Hackers Gain Access
Direct access
Hacking software
Indirect access
Internet connection Logical ports
-
8/12/2019 About Network
58/87
Firewalls
Software programs or hardware designed to closelogical ports to invaders
A software firewall is built into Windows 7
Other software firewalls are available from vendors
Network routers can contain a hardware firewall Firewalls are critical if you have an always-
on broadband connection
Test your computers vulnerability
-
8/12/2019 About Network
59/87
Bluetooth Attacks
Bluesnarfing
Exploits flaw in access software to stealinformation contained on the device
Bluebugging Hacker takes control of the device
Make your device invisible
-
8/12/2019 About Network
60/87
Wireless Networks on the Road
Beware
Evil twins
Free Internet access in paid locations
Protect yourself Check with authorized personnel for official name
of hot spot
Do not use free access from unknown sources
-
8/12/2019 About Network
61/87
Passwords
Create a strong password At least 14 characters, including numbers,
symbols, and upper- and lowercase letters
Not a single word or a word from a dictionary
Not easily associated with you (birthday, name ofpet, nickname)
Use different passwords for different sites
Do not tell anyone or write down password
Change password regularly (every month)
-
8/12/2019 About Network
62/87
Password Managers
Remember all your different passwords Built into
Operating systems
Web browsers
Some securitypackages
-
8/12/2019 About Network
63/87
Anonymous Web Surfing
Public computers Shared computers risk subsequent user viewing
your data
Might already have viruses or hacking toolsinstalled
Portable privacy devices
Linux OS on a flash drive
-
8/12/2019 About Network
64/87
Biometric Authentication Devices
Read unique personal characteristics Fingerprint Iris patterns Voice patterns
Face patterns
-
8/12/2019 About Network
65/87
Malware
Software that has a malicious intent Grayware (nondestructive)
Adware
Spyware
Viruses (destructive)
-
8/12/2019 About Network
66/87
SPAM or SPIM
SPAM: Unwanted or junk e-mail To avoid SPAM
Create free Web-based e-mail account for filling outonline forms or making online purchases
Use a spam filter
Do not try to unsubscribe from spam e-mails
Use an e-mail forwarding service
SPIM: Unsolicited instant messages
-
8/12/2019 About Network
67/87
Cookies
A Web site assigns an ID number to yourcomputer, stored in a cookie file
Each time you log in to the site, it notes the visit
and keeps track of it in a database Provide info about browsing habits
Identify user preferences
Pose some privacy risks, but low security threat
-
8/12/2019 About Network
68/87
Backing Up Your Data
Backup A copy of a file that can be used to replace the
original
Types of files to back up Program
Data
Backup routine
Frequency Changed files
-
8/12/2019 About Network
69/87
Backing Up Your Data
Software programs for easy backup Schedule automatic backups
Can back up files, folders, or entire drives
Back up to USB device, CD, or DVD Entire system backup software
Takes an image of the entire system
Stores on a separate hard drive
In case of failure, a new drive is inserted
-
8/12/2019 About Network
70/87
Backing Up Your Data
Store backups offsite
Online backups
Store backup files on Internet servers
Fees for the service
-
8/12/2019 About Network
71/87
Social Engineering
Uses social skills to generate human interactionto entice individuals to reveal sensitiveinformation
Usually does not use a computer or face-to-faceinteraction
Pretexting
-
8/12/2019 About Network
72/87
Phishing and Pharming
Phishing Uses e-mail to lure user to fake Web sites
Tricks user into revealing private data
Pharming Malicious code changes Web browsers ability tofind Web addresses
-
8/12/2019 About Network
73/87
Hoaxes
An attempt to makesomeone believesomething that isuntrue
Target large audiences Practical joke, agents of
social change, or timewasters
Mostly e-mail
-
8/12/2019 About Network
74/87
Protect Physical Assets
Environmental factors Avoid
Sudden movement
Excessive heat or cold
Dust
Food and liquids
Use padded case for notebooks
-
8/12/2019 About Network
75/87
Power Surges
Occur when electrical current is supplied inexcess of normal voltage (120 volts in the UnitedStates)
Caused by: Old or faulty wiring
Downed power lines
Malfunctions at electric substations
Lightning strikes Use surge protectors
-
8/12/2019 About Network
76/87
-
8/12/2019 About Network
77/87
Chapter 9 Summary Questions
From which types of viruses do I need to protectmy computer?
-
8/12/2019 About Network
78/87
Chapter 9 Summary Questions
What can I do to protect my computer fromviruses?
-
8/12/2019 About Network
79/87
Chapter 9 Summary Questions
How can hackers attack my computing devices,and what harm can they cause?
-
8/12/2019 About Network
80/87
Chapter 9 Summary Questions
What is a firewall, and how does it keep mycomputer safe from hackers?
-
8/12/2019 About Network
81/87
Chapter 9 Summary Questions
How do I create secure passwords and manageall of my passwords?
-
8/12/2019 About Network
82/87
Chapter 9 Summary Questions
How can I surf the Internet anonymously anduse biometric authentication devices to protectmy data?
-
8/12/2019 About Network
83/87
Chapter 9 Summary Questions
How do I manage online annoyances such asspyware and spam?
-
8/12/2019 About Network
84/87
Chapter 9 Summary Questions
What data do I need to back up, and what arethe best methods for doing so?
-
8/12/2019 About Network
85/87
Chapter 9 Summary Questions
What is social engineering, and how do I avoidfalling prey to phishing and hoaxes?
-
8/12/2019 About Network
86/87
Chapter 9 Summary Questions
How do I protect my physical computing assetsfrom environmental hazards, power surges, andtheft?
87
-
8/12/2019 About Network
87/87