GCSE ICT Networks & Security..

Slides:



Advertisements
Similar presentations
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Advertisements

Networks By the end of this session, you will:
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Principles of Information Technology
Computer Networks IGCSE ICT Section 4.
OCR Computing for GCSE © Hodder Education 2011
Computer Networks.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
CSCI 1101 Intro to Computers 6. Local Area Networks.
A network is a collection of computers connected by communication channels that allows you to share information. mputer_network.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Network Structure Students should be aware of what is available in order to –create and use an ICT network: communication devices.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
LANs and WANs Coatbridge High School Computing Department.
Understanding Networks. What is a Network?  A network consists of two or more computers that are linked in order to share resources (such as printers.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Security and backups GCSE ICT.
DATA COMMUNICATION. Data Communication Data communication is the transmission of data from one location to the other. Data can be sent in two ways: directly.
NETWORKS.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Networking By Nachiket Agrawal 10DD Contents Network Stand Alone LAN Advantages and Disadvantages of LAN Advantages and Disadvantages of LAN Cabled LAN.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Network Environments. Communications Networks LAN – Local Area Network Collection of Computers and peripherals with a common connection in one building.
Assignment 2 1. Wong Mun Sim, Sylvia (s970588) Group member :
Networks. What is a network? two or more computers linked together.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Networks.
GCSE ICT 3 rd Edition Computer networks 19 A computer network is a collection of computers linked together so that they can communicate with each other.
Networks and topology  Lesson Objective: Understand the main terminology about networks.  Learning Outcome: Understand the different types of network.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
Basic Computer Knowledge. Outline Notes 1 Notes 2 Assessment.
Networks Mr Hewitt. Objectives By the end of this lesson you will be able to: Compare stand alone, networked and laptop computers Define a Network Explain.
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
Networks. What is a computer network? A network is two or more computers that are linked together so that they are able to share resources.
Using ICT systems The computer. Using ICT systems Computers in an ICT System Multiple computers, usually with username and password entry Looking after.
Transferring Data Around. Networks Is a series of computer systems that are linked together so that they are able to share computer power or storage facilities.
Networks and topology  Lesson Objective: Understand the main terminology about networks.  Learning Outcome: Understand the different types of network.
Higher Computing Networking. Networking – Local Area Networks.
Communications & Networks National 4 & 5 Computing Science.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Networks By Indrani Chakraborty 1Copyright reserved to Indrani.
Networks. Learning Objectives: By the end of this lesson you should be able to:
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Elements of an ICT networks COMMUNICATION DEVICES: 1.Network interface card 2.Hub 3.Switch 4.Router STANDARDS AND PROCEDURES: 1.Enable devices to communicate.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Unit Communication Hardware
LAN, WAN, and Network Topologies
UNIT 4 NETWORK ENVIRONMENTS.
Networks.
UNIT 19 Data Security 2.
Introduction to Computers
Networks.
Security of Data  
There are two different types of computer network:
Networks By the end of this session, you will:
G061 - Network Security.
Principles of Information Technology
Presentation transcript:

GCSE ICT Networks & Security.

Transferring data Most commercial computer users need to allow their employees to share data. It also needs more than one employee to access the data at the same time. The solution to this is for the commercial computer users to have computer networks.

Computer networks A computer network is a series of computer systems that are connected together so that they can share computing power and/or storage facilities.

Computer networks There are two main types of network. These are: Local Area Networks (LAN) – are usually confined to a single building or site. Wide Area Networks (WAN) – cover a wider geographical area (e.g. anywhere in the World).

Computer networks Advantages of networks Devices (e.g. laser printers) can be shared. Software can be shared. All users can access and update files from anywhere on the network. Data and software can be stored centrally. Network security can ensure that only authorised users can access data.

Computer networks Disadvantages of networks Networks can be expensive to install and operate. Networks can be temperamental. Server breakdowns cause the whole network to stop working. Any network breakdowns can cause chaos. Security must be of the highest level possible to ensure that unauthorised access and infection by computer viruses are prevented.

Network topologies Ring network

Network topologies Line network

Network topologies Star network

Hierarchical networks In some networks one or more computers are more powerful than the others. These networks are called hierarchical networks. These more powerful computers usually look after specific functions on the network and are called servers (e.g. file servers, printer servers).

Hierarchical networks File servers manage all the files stored on the network, including program and data files. File servers are also used to store program and data files. Printer servers manage all the printing requests on the network.

Modems On WAN networks such as the Internet, computers can be connected to the network using normal telephone lines. To do this the computer must be equipped with a modem (Modulator – Demodulator).

Modems The modem converts digital signals into analogue signals that can be sent along telephone lines. It can also convert analogue signals it receives back into digital signals the computer can use.

Modems The speed of a modem (e.g. 56,000 bits per second) determines how quickly signals can be sent and received.

Network software and hardware Networks require specific software and hardware in order to work including: A network operating system. Network cabling (e.g. metal or fibre optic cables) and connectors or wireless media (e.g. radio, microwave, or infra-red). Network cards.

Network security Keeping networks secure is very important. This is usually done by giving all users a: User ID – a unique name or number that identifies each individual network user and allocates each user’s file access. Password – a string of letters and/or numbers that is only known by each individual user.

Computer security Computer security is concerned with the protection of software, hardware, and – most importantly – data. Data costs lots of time and money to collect and process, and its loss can cause serious problems, especially for businesses.

Types of computer security Physical security including: Prevention from theft. Protection from fire. Protection from environmental hazards. Software security including: Protection from viruses. Backing up data. Protecting files. Encryption.

Physical security Prevention from theft can include: Making sure the building is secure (e.g. burglar alarms, the use of security locks, staff must wear security badges). Keeping a log of hardware serial numbers. Having removable hard drives that can be locked in a safe when not in use. Keeping back ups and copies of files in secure off-site locations.

Physical security Protection from fire can include: Smoke detectors in computer rooms. Inert gas flooding anti-fire systems for computer rooms. Fireproof doors on computer rooms.

Physical security Protection from environmental hazards can include: Air conditioning that keeps computer rooms at the optimum temperature. Air filters that keep dust out of computer rooms. Humidity controls that keep the level of water in the atmosphere at the optimum level.

Software security Protection from viruses can be ensured by: The use of up-to-date antivirus software on the computer network. The use of new (not second hand or copied) software. Regular antivirus ‘sweeps’ of the network. Not allowing the installation of software by unauthorised users.

Software security Backing up data needs to be done on a regular basis, and the back up copies kept in a secure location away from the computer network (i.e. not just as a separate file on the computer network).

Software security Back ups need to be made because files are sometimes lost due to: Human error - it is very common for users to delete files by mistake. Hardware failure – a computer hard drive is likely to fail (i.e. stop working properly) on average once every 27 months

Software security Files can be protected in a variety of ways including: The use of passwords for user access to the computer network and on individual user areas and/or files. Restricting user access to only those areas of the computer network they need to access.

Software security Write protecting files that are kept on floppy disk.

Software security Encrypting (encoding) data stops unauthorised people being able to read the data. Only users who have the key to the code can decode the data.

Software security Encryption is particularly useful when data is being sent over a WAN system (e.g. the Internet) Encryption is used by online businesses to protect a customer’s confidential financial data (e.g. credit card details) from being accessed by someone who could use that data fraudulently.