Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.

Slides:



Advertisements
Similar presentations
Chapter 7 Networking: Connecting Computing Devices
Advertisements

Understanding Computers Ch.8
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Telecommunications Chapter 5 Chapter 5 Telecommunications
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved Extended Learning Module E NETWORK BASICS (on your CD)
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Nasca Internet Networking and Security viruses.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
Computer Networks & Security
Principles of Information Technology
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Computer Networks IGCSE ICT Section 4.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Securing a Wireless Network
NETWORK CHONGSEOK PARK 10DD MRS. VEENA MONY Content.
IS 2101 Spring 2009 Chapter 12 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Copyright © 2010 Pearson.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
LAN Dr. Yan Quan Liu ILS SCSU
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Networking and Operating Systems. Networking What is it? Things that are hooked together. Computer Network- Computers that are connected together.
Networks and Telecommunications
Chapter 9A Network Basics.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Unit 1—Computer Basics Lesson 7 Networks.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
NETWORKS.
1 Technology in Action Chapter 12 Behind the Scenes: Networking and Security Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.
Networking By Nachiket Agrawal 10DD Contents Network Stand Alone LAN Advantages and Disadvantages of LAN Advantages and Disadvantages of LAN Cabled LAN.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them.
IST 126 Computer Networks Spring, What is a Computer Network? A group of computers and other devices that are connected together in order to share.
Understanding and Building Basic Networks Chapter 6 Creating a Network.
Computers Are Your Future Eleventh Edition
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.
Computer Networks and Internet. 2 Objectives Computer Networks Computer Networks Internet Internet.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Week-13 (Lecture-1) Data Communication Hardware: 1)Coaxial cable: Widely installed for use in business and corporation Ethernet Used to install LANs. Consists.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc. 0.
Computer Networks CSC September 23,
Network System Security - Task 2. Russell Johnston.
TECHNOLOGY IN ACTION. Chapter 7 Networking: Connecting Computing Devices.
Technology in Action 1 © 2008 Prentice-Hall, Inc..
TECHNOLOGY IN ACTION Chapter 7
Computer Networks and Internet
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Computer Networks and Internet
Networking Lexi Becker Chapter is broke in two parts
Computer Technology Notes #4
Computer Networks.
Ethernet First network to provide CSMA/CD
Computer Networks.
Principles of Information Technology
Presentation transcript:

Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes

What is a Network? A computer network is simply two or more computers that are connected using software and hardware so that they can communicate Britzmann & Hughes

What are the Advantages of setting up a Network? Networks allow users to: 1. Share peripherals 2. Transfer files easily 3. Share an internet connection Britzmann & Hughes

What is a client/server network? Most networks that have ten or more nodes are client/server networks Contain two types of computers 1. Client computer on which users accomplish specific tasks 2. A server computer that provides resources to the clients and central control for the network Britzmann & Hughes

What is a peer-to-peer network? In peer-to-peer networks, each node connected to the network can communicate directly with every other node instead of having a separate device exercise central control over the network Peer-to-peer networks are the most common installed in homes Britzmann & Hughes

What are the main hardware components of every network? 1. transition media (cables or radio waves) to connect and establish communication between nodes 2. Network adaptors that allow the nodes on the network to communicate 3. Network navigation devices ( routers and hubs) that move data around the network 4. software that allows the network to run Britzmann & Hughes

What are the most common home networks? The two most common home networks are wired ethernet and wireless ethernet Modern powerline networks, boasting faster data through, are now a viable option in certain situations The major difference in these networks is the transition media by which the nodes are connected Britzmann & Hughes

What are wired ethernet networks? Ethernet networks use the ethernet protocol as the means by which the nodes on the network communicate This protocol ethernet networks efficient but also slightly complex Because of this complexity, additional devices (switchers and routers) are required in ethernet networks Britzmann & Hughes

How are ethernet networks created? To create a wired ethernet network, you connect or install network adaptors or NICs to each network node Network adaptors connect via cables to a central network navigation device such as a switch or router Data flows through the navigation device to the nodes on the network Britzmann & Hughes

What are wireless ethernet networks? A wireless network uses radio waves instead of wires or cable as its transition media Current wireless protocols provide for networks with a maximun of 108 Mbps Britzmann & Hughes

How to create a wireless ethernet network To create a wireless network, you install or attach wireless network adaptors to the nodes that will make up the network If the nodes are unable to communicate because of distance, then you can add a wireless access point to the network to help relay the data between nodes. Wireless networks are susceptible to inference from other wireless devices such as phones Britzmann & Hughes

How are powerline networks created? Powerline networks use electrical wiring in your home to connect the nodes in the network To create a powerline network, you connect special network adaptors to each node on the network These adaptors are then plugged in to an electrical outlet, and data is transmitted through the electrical wires Britzmann & Hughes

How do I configure my computers software to set up a network? Windows vista and XP both feature software wizards that facilitate the setup of both wire and wireless networks Plug in the modem, routers, and all cables and then switch on the modem, router, and computers Run the wizards which should guide you through the process Make sure each computer has a distinct name and insure that all computers are in the same work group Britzmann & Hughes

How can hackers hack a network? A hacker is defined as anyone who breaks into a computer system unlawfully Hackers can use software to break into almost any computer connected to the internet Once hackers gain access to a computer, they can potentially steal personal information, damage and destroy data, or use the computer to attack other computers Britzmann & Hughes

What is a firewall and how does it keep my computer safe from hackers? Firewalls are software programs or hardware devices designed to keep computers safe from hackers By using a personal firewall, you can close open logical ports to invaders and potentially make your computer invisible to other computers on the internet Britzmann & Hughes

Why are wireless networks more vulnerable than wired networks? Wireless networks are even more susceptible to hacking than wired networks because the signal of most wireless networks extend beyond the walls of your home. Neighbors may unintentionally or intentionally connect to the internet through your wireless connection and hackers may try to access it Britzmann & Hughes

What special precautions are required to insure my wireless network is secure? To prevent unwanted intrusions into your network, you should change the default password on your router, use a hard to guess SSID, turn off SSID broadcasting, and enable security protocols such as WPA or WED Britzmann & Hughes

From which types of viruses do I need to protect my computer? A computer virus is a program that attaches itself to another program and attempts to spread itself to other computers when files are exchanged. Computer viruses can be grouped into 6 categories 1. boot-sector viruses 2. logic bombs and time bombs 3. worms 4. scripts and macros 5. encryption viruses 6. trojan horses Britzmann & Hughes

What can I do to protect my computer from viruses? The best defense against viruses is to install antivirus software. You should update the software on a regular basis and configure it to examine all attachments for viruses. You should periodically run a complete virus scan on your computer to ensure that no viruses have made it onto your hard drive. Britzmann & Hughes

Britzmann & Hughes

1. What is the term for anyone who breaks into a computer system unlawfully? Hacker Hackers can use software to break into almost any computer connected to the internet Britzmann & Hughes

2. Explain what fiber-optic, twisted-pair cable, and coaxial cable is and which is able to transmit data the fastest? Fiber optic cable: a cable that transmits data at close to the speed of light along glass or plastic fibers Twisted-pair cable: cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket Coaxial cable: a single copper wire surrounded by layers of plastic insulation and sheathing used mainly in cable tv and cable internet Britzmann & Hughes

3. What program appears to be something useful or desirable, but at the same time, does something malicious in the background? Trojan Horse Britzmann & Hughes

4. What have denial of service (DDoS) attacks been associated with? Scientology campaign called Project Chanology, ex. Ebay, Amazon, online games Britzmann & Hughes

5. What is a firewall and what is its main purpose? Firewalls are software programs or hardware devices designed to keep computers safe from hackers Britzmann & Hughes