Presentation is loading. Please wait.

Presentation is loading. Please wait.

Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.

Similar presentations


Presentation on theme: "Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes."— Presentation transcript:

1

2 Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes

3 What is a Network? A computer network is simply two or more computers that are connected using software and hardware so that they can communicate Britzmann & Hughes

4 What are the Advantages of setting up a Network? Networks allow users to: 1. Share peripherals 2. Transfer files easily 3. Share an internet connection Britzmann & Hughes

5 What is a client/server network? Most networks that have ten or more nodes are client/server networks Contain two types of computers 1. Client computer on which users accomplish specific tasks 2. A server computer that provides resources to the clients and central control for the network Britzmann & Hughes

6 What is a peer-to-peer network? In peer-to-peer networks, each node connected to the network can communicate directly with every other node instead of having a separate device exercise central control over the network Peer-to-peer networks are the most common installed in homes Britzmann & Hughes

7 What are the main hardware components of every network? 1. transition media (cables or radio waves) to connect and establish communication between nodes 2. Network adaptors that allow the nodes on the network to communicate 3. Network navigation devices ( routers and hubs) that move data around the network 4. software that allows the network to run Britzmann & Hughes

8 What are the most common home networks? The two most common home networks are wired ethernet and wireless ethernet Modern powerline networks, boasting faster data through, are now a viable option in certain situations The major difference in these networks is the transition media by which the nodes are connected Britzmann & Hughes

9 What are wired ethernet networks? Ethernet networks use the ethernet protocol as the means by which the nodes on the network communicate This protocol ethernet networks efficient but also slightly complex Because of this complexity, additional devices (switchers and routers) are required in ethernet networks Britzmann & Hughes

10 How are ethernet networks created? To create a wired ethernet network, you connect or install network adaptors or NICs to each network node Network adaptors connect via cables to a central network navigation device such as a switch or router Data flows through the navigation device to the nodes on the network Britzmann & Hughes

11 What are wireless ethernet networks? A wireless network uses radio waves instead of wires or cable as its transition media Current wireless protocols provide for networks with a maximun of 108 Mbps Britzmann & Hughes

12 How to create a wireless ethernet network To create a wireless network, you install or attach wireless network adaptors to the nodes that will make up the network If the nodes are unable to communicate because of distance, then you can add a wireless access point to the network to help relay the data between nodes. Wireless networks are susceptible to inference from other wireless devices such as phones Britzmann & Hughes

13

14 How are powerline networks created? Powerline networks use electrical wiring in your home to connect the nodes in the network To create a powerline network, you connect special network adaptors to each node on the network These adaptors are then plugged in to an electrical outlet, and data is transmitted through the electrical wires Britzmann & Hughes

15 How do I configure my computers software to set up a network? Windows vista and XP both feature software wizards that facilitate the setup of both wire and wireless networks Plug in the modem, routers, and all cables and then switch on the modem, router, and computers Run the wizards which should guide you through the process Make sure each computer has a distinct name and insure that all computers are in the same work group Britzmann & Hughes

16 How can hackers hack a network? A hacker is defined as anyone who breaks into a computer system unlawfully Hackers can use software to break into almost any computer connected to the internet Once hackers gain access to a computer, they can potentially steal personal information, damage and destroy data, or use the computer to attack other computers Britzmann & Hughes

17 What is a firewall and how does it keep my computer safe from hackers? Firewalls are software programs or hardware devices designed to keep computers safe from hackers By using a personal firewall, you can close open logical ports to invaders and potentially make your computer invisible to other computers on the internet Britzmann & Hughes

18 Why are wireless networks more vulnerable than wired networks? Wireless networks are even more susceptible to hacking than wired networks because the signal of most wireless networks extend beyond the walls of your home. Neighbors may unintentionally or intentionally connect to the internet through your wireless connection and hackers may try to access it Britzmann & Hughes

19 What special precautions are required to insure my wireless network is secure? To prevent unwanted intrusions into your network, you should change the default password on your router, use a hard to guess SSID, turn off SSID broadcasting, and enable security protocols such as WPA or WED Britzmann & Hughes

20 From which types of viruses do I need to protect my computer? A computer virus is a program that attaches itself to another program and attempts to spread itself to other computers when files are exchanged. Computer viruses can be grouped into 6 categories 1. boot-sector viruses 2. logic bombs and time bombs 3. worms 4. scripts and macros 5. encryption viruses 6. trojan horses Britzmann & Hughes

21 What can I do to protect my computer from viruses? The best defense against viruses is to install antivirus software. You should update the software on a regular basis and configure it to examine all email attachments for viruses. You should periodically run a complete virus scan on your computer to ensure that no viruses have made it onto your hard drive. Britzmann & Hughes

22 https://www.youtube.com/watch?v=sxal31zIKdE Britzmann & Hughes

23 1. What is the term for anyone who breaks into a computer system unlawfully? Hacker Hackers can use software to break into almost any computer connected to the internet Britzmann & Hughes

24 2. Explain what fiber-optic, twisted-pair cable, and coaxial cable is and which is able to transmit data the fastest? Fiber optic cable: a cable that transmits data at close to the speed of light along glass or plastic fibers Twisted-pair cable: cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket Coaxial cable: a single copper wire surrounded by layers of plastic insulation and sheathing used mainly in cable tv and cable internet Britzmann & Hughes

25 3. What program appears to be something useful or desirable, but at the same time, does something malicious in the background? Trojan Horse Britzmann & Hughes

26 4. What have denial of service (DDoS) attacks been associated with? Scientology campaign called Project Chanology, ex. Ebay, Amazon, online games Britzmann & Hughes

27 5. What is a firewall and what is its main purpose? Firewalls are software programs or hardware devices designed to keep computers safe from hackers Britzmann & Hughes

28


Download ppt "Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes."

Similar presentations


Ads by Google