© 2008 Prentice-Hall, Inc. 1 Technology in Action 1.

Slides:



Advertisements
Similar presentations
Web Page Design Chapter 1 Introducing Networks and the Internet.
Advertisements

Chapter 7 Networking: Connecting Computing Devices
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Unit 9 Network Fundamentals. Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
© 2009 Prentice-Hall, Inc Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
Nasca Internet Networking and Security viruses.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
Computer Networks & Security
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
© 2009 Prentice-Hall, Inc. 1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Unit 8 Network Fundamentals Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
IS 2101 Spring 2009 Chapter 12 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Copyright © 2010 Pearson.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
CSCI 1101 Intro to Computers 6. Local Area Networks.
Chapter 5 Networks Communicating and Sharing Resources
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Chapter 9A Network Basics.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Networking Basics lesson 4 essential concepts. This lesson includes the following sections: The Uses of a Network How Networks are Structured Network.
Unit 1—Computer Basics Lesson 7 Networks.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Module 2: Information Technology Infrastructure
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc.
NETWORKS.
Computer Networks – an overview 1. 2 Computer Networks Advantages of a network Advantages of a network Client/server and peer-to-peer networks Client/server.
1 Technology in Action Chapter 12 Behind the Scenes: Networking and Security Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer.
Living Online Module Lesson 23 — Networks and Telecommunication
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Technology in Action © 2007 Prentice-Hall, Inc. 1.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them.
Networks.
Computers Are Your Future Eleventh Edition
What is a Network? Living Online Lesson 1 Mrs. Elzey.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.
Computer Networks and Internet. 2 Objectives Computer Networks Computer Networks Internet Internet.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
HI150 – Automation of Health Information Unit 2 Seminar.
Computer Networks CSC September 23,
Technology in Action 1 © 2008 Prentice-Hall, Inc..
Chapter Objectives In this chapter, you will learn:
Chapter 7 - Networking Fundamentals
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
© 2009 Prentice-Hall, Inc. 1.
EUT 122 Skills and Technology in Communication
© 2009 Prentice-Hall, Inc. 1.
Securing your system, protecting your digital data and devices.
Presentation transcript:

© 2008 Prentice-Hall, Inc. 1 Technology in Action 1

© 2008 Prentice-Hall, Inc. 2 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2008 Prentice-Hall, Inc. 3 Chapter Topics Networking fundamentalsNetworking fundamentals Network architectureNetwork architecture Network componentsNetwork components Peer-to-peer networksPeer-to-peer networks Computer threatsComputer threats Computer safeguardsComputer safeguards Computer virusesComputer viruses

© 2008 Prentice-Hall, Inc. 4 Networking Fundamentals Computer network:Computer network: –Two or more computers connected together Each is a NodeEach is a Node Benefits of a network:Benefits of a network: –Sharing resources –Transferring files

© 2008 Prentice-Hall, Inc. 5 Network Architecture Network designs:Network designs: –Individual PC controlled: Peer-to-peer (P2P)Peer-to-peer (P2P) –Centrally controlled: Client/serverClient/server Peer-to-peer Client/ server

© 2008 Prentice-Hall, Inc. 6 Peer-to-Peer Networks Nodes communicate with each other:Nodes communicate with each other: –Peers Share peripheral devices:Share peripheral devices: –Printers –Scanners Home and small office networksHome and small office networks

© 2008 Prentice-Hall, Inc. 7 Client/Server Networks Client computers:Client computers: –Users Server computers:Server computers: –Provide resources to clients –Central network control InternetInternet –A large, multiserver, multiclient network. multiclient network.

© 2008 Prentice-Hall, Inc. 8 LANs and WANs Local area network (LAN):Local area network (LAN): –Nodes are within a small geographic region: HomesHomes SchoolsSchools Small businessesSmall businesses Wide area network (WAN):Wide area network (WAN): –LANs connected over long distances: A few miles to thousands of milesA few miles to thousands of miles Use telecommunications linesUse telecommunications lines

© 2008 Prentice-Hall, Inc. 9 Network Components Transmission mediaTransmission media Network adaptersNetwork adapters Navigation devicesNavigation devices Network softwareNetwork software

© 2008 Prentice-Hall, Inc. 10 Transmission Media Provides communications channel between nodesProvides communications channel between nodes Forms of media:Forms of media: –Telephone wire: Twisted pairTwisted pair –Coaxial cable –Fiber-optic cable –Radio waves: WirelessWireless Bandwidth:Bandwidth: –Data transfer rate –Throughput

© 2008 Prentice-Hall, Inc. 11 Network Adapters Devices connected to or installed in nodes:Devices connected to or installed in nodes: –Network interface cards (NIC) –External network adapter Enable communication between nodesEnable communication between nodes

© 2008 Prentice-Hall, Inc. 12 Network Navigation Devices Devices that help make data flow possibleDevices that help make data flow possible Routers:Routers: –Route data between networks Switches:Switches: –Receive data and retransmit it to nodes on the network

© 2008 Prentice-Hall, Inc. 13 Networking Software Peer-to-Peer Software:Peer-to-Peer Software: Built into operating systems that support networkingBuilt into operating systems that support networking –Windows –Mac OS Client/Server SoftwareClient/Server Software Network operating system (NOS) softwareNetwork operating system (NOS) software –Windows XP Professional –Windows Server 2003 –Novell Netware –Windows Vista Enterprise

© 2008 Prentice-Hall, Inc. 14 Types of Peer-to-Peer Networks Power-linePower-line PhonelinePhoneline EthernetEthernet WirelessWireless

© 2008 Prentice-Hall, Inc. 15 Ethernet Networks Ethernet network adapters are used to connect nodesEthernet network adapters are used to connect nodes –NIC card –PC Card –USB adapter Computers are connected to each other using unshielded twisted pair cableComputers are connected to each other using unshielded twisted pair cable RJ-45 Phoneline

© 2008 Prentice-Hall, Inc. 16 Ethernet Switches Keep track of data packetsKeep track of data packets Amplify and retransmit signalsAmplify and retransmit signals Keep the network running efficientlyKeep the network running efficiently

© 2008 Prentice-Hall, Inc. 17 Ethernet Routers Transfer packets from one network to anotherTransfer packets from one network to another Home Internet routers transfer data from the Internet to the home network.Home Internet routers transfer data from the Internet to the home network. Router

© 2008 Prentice-Hall, Inc. 18 Wireless Networks Use radio waves to connect nodesUse radio waves to connect nodes Basically an Ethernet network that uses radio waves instead of wiresBasically an Ethernet network that uses radio waves instead of wires Each node requires a wireless network adapter:Each node requires a wireless network adapter: –Transceiver

© 2008 Prentice-Hall, Inc. 19 Power-Line Networks Computers are connected to a house’s electrical wiring to create a networkComputers are connected to a house’s electrical wiring to create a network Power-line network adapter is used to connect nodes to electrical outletsPower-line network adapter is used to connect nodes to electrical outlets

© 2008 Prentice-Hall, Inc. 20 Phoneline Networks Computers are connected to a house’s telephone wiring to create a networkComputers are connected to a house’s telephone wiring to create a network Home phoneline network adapter is used to connect nodes to phone jacksHome phoneline network adapter is used to connect nodes to phone jacks

© 2008 Prentice-Hall, Inc. 21 Choosing a Peer-to-Peer Network Things to consider:Things to consider: –Existing wiring –Wireless or wired –Speed of the network –Cost of the network Comparing the Major Types of Home Networks Wired Ethernet Wireless g Wireless Enhanced G Wireless n Maximum data Transfer rate (bandwidth) 100 Mbps to 1,000 bps (1 gigabit) 54 Mbps108 Mbps100 to 630 bps Relative installation and equipment costs for networking two computers $$$$$$$

© 2008 Prentice-Hall, Inc. 22 Configuring Software for a Home Network Windows operating system:Windows operating system: –Windows Vista home versions Network setup wizard Network setup wizard –Wired or wireless –Windows XP: Network setup wizardNetwork setup wizard –Windows ME: Network setup wizardNetwork setup wizard –Windows 98: Configure manuallyConfigure manually –Help has a clear instructions

© 2008 Prentice-Hall, Inc. 23 Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals.Cybercrimes are criminal acts conducted through the use of computers by cybercriminals.

© 2008 Prentice-Hall, Inc. 24 Hackers Anyone who unlawfully accesses a computer systemAnyone who unlawfully accesses a computer system Types of hackers:Types of hackers: –White-hat –Black-hat –Script kiddies

© 2008 Prentice-Hall, Inc. 25 What Hackers Do Steal information from computers:Steal information from computers: –Credit card numbers –Bank account numbers Internet packet sniffingInternet packet sniffing Commit identity theftCommit identity theft

© 2008 Prentice-Hall, Inc. 26 Denial of Service Attacks Backdoor programsBackdoor programs –Trojan horse –Zombies Denial of service attacksDenial of service attacks

© 2008 Prentice-Hall, Inc. 27 How Hackers Gain Access Direct access:Direct access: –Hacking software Indirect access:Indirect access: –Internet connection –Logical ports

© 2008 Prentice-Hall, Inc. 28 Computer Safeguards Firewalls Software programs or hardware designed to close logical ports to invadersSoftware programs or hardware designed to close logical ports to invaders –A firewall is built into Windows XP –More robust firewalls are available from other vendors. –Firewalls are critical if you have an always-on broadband connection.

© 2008 Prentice-Hall, Inc. 29 Protecting a Wireless Network Wireless network range doesn’t stop at the property line.Wireless network range doesn’t stop at the property line. Default device and network ID settings allow intruders to enter the network.Default device and network ID settings allow intruders to enter the network. Internet bandwidth can be stolenInternet bandwidth can be stolen Computers can be vulnerable to hacker intrusion and takeover.Computers can be vulnerable to hacker intrusion and takeover.

© 2008 Prentice-Hall, Inc. 30 Computer Threat - Viruses A program that attaches itself to another program and spreads itself to other computersA program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host programViruses are hidden within the code of a host program

© 2008 Prentice-Hall, Inc. 31 How Does a Computer Catch a Virus Viruses copy themselvesViruses copy themselves Infect a file on your computerInfect a file on your computer Viruses spread by sharing disksViruses spread by sharing disks attachments are the most likely source of a virus attachments are the most likely source of a virus

© 2008 Prentice-Hall, Inc. 32 What Viruses Do Replicate themselves:Replicate themselves: –Slow down networks Secondary objectives:Secondary objectives: –Annoying messages –Delete files on the hard drive –Change computer settings

© 2008 Prentice-Hall, Inc. 33 Types of Viruses Boot-sector viruses:Boot-sector viruses: –Replicate themselves in the boot sector of the hard drive Logic bombs:Logic bombs: –Activate when certain conditions are met Worms:Worms: –Travel between systems through networks

© 2008 Prentice-Hall, Inc. 34 Types of Viruses Script viruses:Script viruses: –Hidden on Web pages –Mini programs Macro viruses:Macro viruses: –Attached to documents –Series of commands Encryption virusesEncryption viruses –Search for common data files –Compress files using a complex encryption key –User must pay to get the files unlocked Trojan horses:Trojan horses: –Backdoor programs –Control remote computers

© 2008 Prentice-Hall, Inc. 35 Virus Classifications Polymorphic viruses: – –Periodically rewrite themselves to avoid detection Multipartite viruses: – –Infect multiple file types Stealth viruses: – –Erase their code from the hard drive and reside in the active memory

© 2008 Prentice-Hall, Inc. 36 Antivirus Software Programs designed to detect viruses:Programs designed to detect viruses: –Scan files looking for virus signatures (unique code) –Provides options for deleting or fixing infected files –Inoculates files against further infection Detect known virusesDetect known viruses Antivirus programs need to be updated frequentlyAntivirus programs need to be updated frequently

© 2008 Prentice-Hall, Inc. 37 Chapter 7 Summary Questions What is a network and what are the advantages of setting one up?What is a network and what are the advantages of setting one up?

© 2008 Prentice-Hall, Inc. 38 Chapter 7 Summary Questions What is the difference between a client/server network and a peer-to-peer network?What is the difference between a client/server network and a peer-to-peer network?

© 2008 Prentice-Hall, Inc. 39 Chapter 7 Summary Questions What are the main components of every network?What are the main components of every network?

© 2008 Prentice-Hall, Inc. 40 Chapter 7 Summary Questions What are the most common home networks?What are the most common home networks?

© 2008 Prentice-Hall, Inc. 41 Chapter 7 Summary Questions What are power-line networks?What are power-line networks?

© 2008 Prentice-Hall, Inc. 42 Chapter 7 Summary Questions What are phoneline networks?What are phoneline networks?

© 2008 Prentice-Hall, Inc. 43 Chapter 7 Summary Questions What are Ethernet networks?What are Ethernet networks?

© 2008 Prentice-Hall, Inc. 44 Chapter 7 Summary Questions What are wireless networks?What are wireless networks?

© 2008 Prentice-Hall, Inc. 45 Chapter 7 Summary Questions How can hackers attack a network and what harm can they cause?How can hackers attack a network and what harm can they cause?

© 2008 Prentice-Hall, Inc. 46 Chapter 7 Summary Questions How are home wireless networks vulnerable?How are home wireless networks vulnerable?

© 2008 Prentice-Hall, Inc. 47 Chapter 7 Summary Questions What is a firewall and how does it keep my computer safe from hackers?What is a firewall and how does it keep my computer safe from hackers?

© 2008 Prentice-Hall, Inc. 48 Chapter 7 Summary Questions From which types of viruses do I need to protect my computer?From which types of viruses do I need to protect my computer?

© 2008 Prentice-Hall, Inc. 49 Chapter 7 Summary Questions What can I do to protect my computer from viruses?What can I do to protect my computer from viruses?