Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Slides:



Advertisements
Similar presentations
Network Hardware and Physical Media
Advertisements

LAN Devices 5.3 IT Essentials.
Chapter 7 Networking: Connecting Computing Devices
CHAPTER Practical Ethernet Implementation. Chapter Objectives Provide a background on Ethernet itself and describe its characteristics Explain the practical.
Understanding Computers Ch.8
IS Network and Telecommunications Risks
James Tam Computer Networks You will learn what is a network, how they work and what are the different types.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Wi-Fi Structures.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
Computer Networks & Security
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
© 2009 Prentice-Hall, Inc. 1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
PPT Networks, Network operating systems. PPT Networking - Basics Network defined Network defined The difference between Standalone and networked.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
IS 2101 Spring 2009 Chapter 12 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Copyright © 2010 Pearson.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Networks. Network Classifications Acronyms, acronyms, and more acronyms What does PAN stand for? – Personal Area Network – interconnection of personal.
Chapter 5 Networks Communicating and Sharing Resources
Chapter 9A Network Basics.
Networks. Network Classifications Acronyms, acronyms, and more acronyms What does PAN stand for? – Personal Area Network – interconnection of personal.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Unit 1—Computer Basics Lesson 7 Networks.
Module 2: Information Technology Infrastructure
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc.
NETWORKS.
1 Technology in Action Chapter 12 Behind the Scenes: Networking and Security Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer.
Networks and Networking TEST NEXT WEEK Chapter 6.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Computers Are Your Future Eleventh Edition
1 NETWORKING TECHNOLOGIES BUS Abdou Illia, Fall 2012 (October 15, 2012)
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter5 1 Computer Networks.
Communications & Computer Networks Resource Notes - Network Hardware
COMPUTER NETWORKS. Computer Networks A series of electronic devices connected together through copper cables, fiber optics, and radio waves.
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
NETWORKING & SYSTEM UPDATES
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Computer Networks CSC September 23,
ICT Unit 4: Network and the effects of using them
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition 0.
TECHNOLOGY IN ACTION. Chapter 7 Networking: Connecting Computing Devices.
Technology in Action 1 © 2008 Prentice-Hall, Inc..
TECHNOLOGY IN ACTION Chapter 7
Intro to MIS – MGS351 Network Basics
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
NETWORKING TECHNOLOGIES
Introduction To Computers
Networking Lexi Becker Chapter is broke in two parts
Network Basics Extended Learning Module E
© 2009 Prentice-Hall, Inc. 1.
Computer Networking Fundamentals
Computer networking In this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network.
Communications & Computer Networks Resource Notes - Network Hardware
© 2009 Prentice-Hall, Inc. 1.
Presentation transcript:

Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Chapter Seven Objectives Networks –Client/Server –Main components –Common types Hackers and harm Firewall Viruses Protection

Networking Fundamentals Definition Benefits Internet share

Network Architectures Nodes Peer-to-peer Client/Server

Networks and Distance LAN WAN

Data Transmission Media Twisted pair Coaxial Fiber optic

Data Navigation Devices Packets Routers Hubs

Networking Software For peer-to-peer For client/server

Peer-to-Peer Network Types Power line Phone line Ethernet Wireless

Power Line Networks Uses house wiring –Max at 14 Mbps Power line network adapter –USB or Ethernet Plug and play –Software Routers and hubs Uses phone lines and jacks –Sharing with phones –Max at 10 Mbps HPNA adapter or USB Routers and hubs

Ethernet Networks Most efficient –Usual speed at 100 Mbps Use unshielded twisted pair cable (UTP) Use routers and hubs Use NICS (network interface cards)

Ethernet Cabling Installation, distance UTP categories Cable Category Maximum Data Transfer Rate Category 5 (CAT 5)100 Mbps Category 5E (CAT 5E)200 Mbps Category 6 (CAT 6)1000 Mbps (1 Gbps) Fig 7.11

Ethernet Architecture Hubs Routers –DSL/cable routers Internet

Wireless Networks Radio waves, not cabling Wi-Fi –Several IEEE standards Wireless network adapter Transceiver

Wireless Considerations Range, signal degradation Node positions –Wireless access point Internet connection –Wireless DSL/cable routers

Peer-to-Peer Questions Existing wiring? Wireless also? How fast? Budget?

Comparing Home Networks Factors: Power Line Phone Line EthernetWireless Maximum data transfer rate (throughput) 14 Mbps 10 Mbps 100 to 1000 Mbps 11 to 54 Mbps Approximate cost to network two computers (adapters and wiring only) $160$120$135$225 Additional cost for adding Internet connection sharing $80$120$0$40 Approximate cost to add a computer to network $80$60$40$60

Configuring Home Network Software With XP With OS mix Without XP

Computer Safety Cybercrime Cybercriminals

Computer Threats: Hackers White hat Black hat Script kiddies Why Hack? Credit cards Packet sniffer Identity theft

Safety Tips Hide passwords, pins Personal info Passwords: –Numbers and letters –Obscure letter combinations FTC Identity Theft

Hacker Activities Trojan horses –Far-reaching damage –Back-door programs Denial of service Distributed DOS Hacker access: –Directly –Via logical ports

Firewall Protection Software –Easy, port protection Hardware

Firewalls … Block ports Hide network address Use packet-filtering Use NAT

Computer-At-Risk Testing Free test from Gibson Research Corporation Gibson Research Corporation

Computer Viruses Definition Kinds of damage Virus sources

Computer Viruses: Types Grouped by behavior and method of transmission –Boot sector –Logic bombs –Worms –Script and macro –Trojan Horses

How Viruses Avoid Detection Polymorphic Multi-partite Stealth

Antivirus Software Norton

Antivirus Software Virus signatures Known viruses “Signature” updates

Other Security Measures Update OS –System updates –Security patches

Networking and Security Topic Summary What is a network –Advantages Difference between a client/server network and a peer-to-peer (P2P) Main network components Common home networks Power line networks Phone line networks

Networking and Security Topic Summary Ethernet networks Wireless networks How hackers attack –Harm Firewall –How does it keep a computer safe Viruses Protection