Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.

Slides:



Advertisements
Similar presentations
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Advertisements

Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
IS Network and Telecommunications Risks
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
The Internet and the World Wide Web. Una DooneyThe Internet and WWWSlide 2 What is the Internet? A collection of networks (LANS and WANS) around the world.
Nasca Internet Networking and Security viruses.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
UNIFORM RESOURCE LOCATOR (URL)
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
Computer Networks IGCSE ICT Section 4.
Quiz Review.
{ Networking High School Computer Application. What is a network? A system containing any combination of computers, computer terminals, printers, audio.
Network and WiFi By: Clara-Hannah S., Amelia H., and Margot d’I.
1Lecturer: Dalia Mirghani Saadabi. 2 A set of computers connected together so that they can communicate is called a computer network. This involves installing.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
The Office Procedures and Technology
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
World Wide Web and Internet Communications. Definitions O Adware – unwanted advertising banners, pop- ups, pop-unders, etc. in your web browser O Anti-virus.
Networks What are they and how do they work? What is a Network?  Hardware and software data communication system  Two or more devices connected for.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Topics Communication Technology Internet Data Security Information Misuse Information Systems Technological Trends Impact of IT.
NETWORKS.
How did the internet develop?. What is Internet? The internet is a network of computers linking many different types of computers all over the world.
Networking By Nachiket Agrawal 10DD Contents Network Stand Alone LAN Advantages and Disadvantages of LAN Advantages and Disadvantages of LAN Cabled LAN.
Living Online Module Lesson 23 — Networks and Telecommunication
Computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Communication, Networks, The internet and the Worldwide Web.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
SETTING UP AN INTERNET NETWORK What you’ll need Your options How does data travel the Internet? Different terminology.
Networking Relationships What is a computer network?
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
Mechanism Sharing & Storing Create and Edit NetworksVocabulary.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
TELECOMMUNICATIONS AND NETWORKS
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Higher Computing Networking. Networking – Local Area Networks.
Communications & Networks National 4 & 5 Computing Science.
LOCAL AREA NETWORK (LAN) WIDE AREA NETWORK (WAN) A network consists of two or more computers that are linked in order to share resources (such as printers.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Introduction to Networks. When Personal Computers first appeared in business, software programs were designed for a single user. However as computers.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Networks : What is a network? A Network is formed when 2 or more computers (devices) are linked together. Every computer or device on a network can send.
Introduction to Computers
Professional Web Designing For Absolute Beginners
Information Technology Ms. Abeer Helwa
King Saud University- College OF Applied Studies
King Saud University- College OF Applied Studies
Presentation transcript:

Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015

A set of computers connected together so that they can communicate is called a computer network. This involves installing network cards in each computer. Each computer is then connected through cabling to a central device called a hub. The most commonly used protocol for establishing and maintaining communication across a network is called TCP/IP or Transmission Control Protocol / Internet Protocol. Lecturer: Dalia Mirghani Saadabi2

There are two types of network interconnection: 1) Networks on which all computers have equal status are called peer-to-peer networks. 3

2) Certain computers provide services to other computers, they are called servers. The computers that make use of the services or servers are called clients. A network such as this is called a client server network. 4

1. LAN A LAN or Local Area Network is a group of computers within the same building, or within a group of buildings that are in close proximity, that are connected together. 2. WAN A WAN or Wide Area Network is a group of widely dispersed computers that are connected together. These could be across the same town, or across a country or even across the world. 5

Internet The internet is the collection of all computers across the world which can access each other in some way. The links between computers might include telephone, fiber optic cable, radio, microwave or satellite. Some of its main uses: Provide access to and share information and databases. Transfer and share files between computers. Facilitate business transactions. Share resources. Promote scientific co-operation between research institutions. Provide a communications channel for the military. 6

7

INTERNET ACCESS  Using Web browser: A web browser is the software program that is used to display Web pages on the World Wide Web, as Internet explorer and Firefox.  Internet search engine: Is an application, which helps users to locate Web sites containing useful information and references. To search Information :  A user types the description of the information using the user interference of the search engine.  The search engine then searches the requested information on the WWW and returns the results to the user. 8

Some Popular Internet Search Engines 9

Special Medical Search Engines…

Medical Search Engines: Medical search engines are search engines which are specialized in medical information, researches, news and so on. Here are some examples of the most popular medical search engines… 11

Lecturer: Dalia Mirghani Saadabi 12

13 Most Popular medical website:

Information security refers to all the procedures which are used to protect information for deliberate or accidental misuse or dissemination There are a number of procedures companies and persons can take to protect their information. 14

1. Physical procedures: Physical access to mainframes should be restricted to operators and systems administrators. The use of security cameras can also act as a deterrent. 2. Software procedures: Information can be stolen, altered or deleted without the computer being physically removed. The information may even be accessed across the Internet. 15

a) Firewalls: It is a computer program that is installed on a computer that connects a network to the Internet. The firewall analysis the packets that pass in and out of the network. b) Access rights: Information should be classified on the basis of its sensitivity. Access rights to this information should be limited to those who need to know Software rights refer to the level of access different users have to different levels of data and information. 16

c) Password policies: They can be required for access to a computer system or a group of files or a single file. 17

A computer virus is a program that is deliberately created to cause annoyance or alter or delete data. Trojan:  A Trojan (or Trojan horse) is a virus that hides itself inside another legitimate program.  When the program is used, the virus is released and can begin its work of replication and annoyance or damage. 18

Worm:  A Worm is a program that replicates itself over and over in the computer's memory until the computer can barely function.  One of the signs of invasion by a worm is the slowness of computers. 19

Spread of computer viruses: Viruses are spread in a number of ways: – Downloads from the Internet. – Exchange of diskettes. – In attachments to s and in s themselves. 20

Anti-virus software: Anti-virus software scans files for pieces of code, called signatures, which it recognizes as part of a virus. Updating anti-virus software mostly involves updating the signatures file. When a virus is detected, the software will attempt to remove the virus. This is called cleaning or disinfecting. 21

22

Lecturer: Dalia Mirghani Saadabi23