Download presentation
Presentation is loading. Please wait.
Published byเนาวรัตน์ เก่งงาน Modified over 5 years ago
1
King Saud University- College OF Applied Studies
CSC1103- NoufALjaffan
2
Computer Network
3
Computer Network A Computer Network is a communication system that connect tow or more computers so they can exchange information and share resources. the most well-known computer network is the Internet .
4
Benefits of Computer Networks
7
Benefits of Computer Networks
King Saud University- College OF Applied Studies Benefits of Computer Networks Exchanging Information Sharing of resources: Software hardware CSC1103- NoufALjaffan
8
CLASSIFICATION OF NETWORKS:
Computer networks are classified into different types, based on the following: According to the network's Transport Media (Wired and Wireless) According to the network's Geographical Area (PAN, LAN, MAN and WAN) According to the network's Management System (Peer to Peer, Client – Server)
9
Types Of Networks According to Transport Media
Wired Networks Wireless Networks
10
CLASSIFICATION OF NETWORKS:
Computer networks are classified into different types, based on the following: According to the network's Transport Media (Wired and Wireless) According to the network's Geographical Area (PAN, LAN, MAN and WAN) According to the network's Management System (Peer to Peer, Client – Server)
11
Types Of Networks According to Geographical Area:
personal area network (PAN)
12
Types Of Networks According to Geographical Area:
Local Area Network (LAN) A local area network (LAN) is a computers network that interconnects computers within a limited area such as school, university or office building. LAN can span over a limited distance up to one mile.
13
Types Of Networks According to Geographical Area:
Metropolitan Area Network (MAN) These networks are considered larger than LAN as they connect several LANs in the same city and are usually used to connect organizations, companies, banks and government agencies. MAN can span over a distance up to 100 miles
14
Types Of Networks According to Geographical Area:
Wide Area Network (WAN) Wide area network (WAN) is a countrywide or worldwide network, which covers distances greater than miles. It uses microwave relays and satellites to reach users over long distances. The widest of all WANs is the Internet, which spans the entire globe.
15
CLASSIFICATION OF NETWORKS:
Computer networks are classified into different types, based on the following: According to the network's Transport Media (Wired and Wireless) According to the network's Geographical Area (PAN, LAN, MAN and WAN) According to the network's Management System (Peer to Peer, Client – Server)
16
Types Of Networks According to the network's Management System
Client-Server Network
18
Types Of Networks According to the network's Management System
Client-Server Network Client-server network systems use one computer (server) to coordinate and supply services to other computers (clients) in the network. The server provides access to resources such as web pages, databases, application software, and hardware.
19
Types Of Networks According to the network's Management System
Peer-to-Peer Network
20
Types Of Networks According to the network's Management System
Peer-to-Peer Network A peer-to-peer network system doesn't have a central computer (server). All nodes have equal authority and can act both as clients and servers. For example, when a file passes through many computers on a network, these computers act as both server and client.
21
King Saud University- College OF Applied Studies
Internet Internet is a huge network of computer networks. The Internet can be termed as a network of networks. The Internet is the global network system of private, public, academic, business and government networks. CSC1103- NoufALjaffan
22
USES OF THE INTERNET AS A SOURCE OF INFORMATION SHOPPING ENTERTAINMENT
Education communication
23
INFORMATION SECURITY
24
The password: A Password is a set of characters used to get access to a computer, web page, network resource or data TIPS FOR CREATING PASSWORDS Creating a strong password is the responsibility of the owner. Below are the recommendations for creating a strong password: • The password should be difficult to guess. • The password should not be less than the length of 8 characters. • The password should contain a mixture of numbers, characters • The password should not contain the user's name. • The password should not contain the user's personal information, as name, street address, phone number, date of birth etc.
25
The password: TIPS FOR THE USE OF PASSWORD
•Do not share your passwords with others. •Do not use the same password everywhere such as , bank account … •Do not keep a written record of passwords on a paper or in an •Avoid using the "Remember Password" option everywhere.
26
MALICIOUS SOFTWARE Malicious software, also known as Malware, is any program or file that is harmful to a computer or the privacy of users. The harm done by malware can vary from something slight as changing the author's name on a document to full access of your machine
27
TYPES OF MALICIOUS PROGRAMS
Malware types can be categorized as follows: • Viruses • Worms • Spywares • Trojan Horse
28
Viruses A computer virus is a malicious program that attaches itself to a file or a program, enabling it to spread and infect different files. Viruses can be transmitted as attachments to an or in a downloaded file. Viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program
29
Worms Worms are stand alone malicious software and do not require a host program or human help to spread. It replicates its functional copies and can consume system memory.
30
Spywares Spyware is classified as privacy-invasive software. The most common spyware function is to steal personal information and address book
31
Trojan Horse A Trojan is another type of malware. It is a harmful piece of software that looks genuine. Users are typically tricked into loading and executing it on their systems. After it is activated, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files or activating and spreading other malware). Trojans are also known to create back doors to give malicious user access to the system.
32
To stay protected from malicious software:
•Avoid using the "auto-run" option in Windows OS for portable drives. •Use anti-spyware software, anti-virus software and scan and update regularly. •always be wary of strange s, especially ones with attachments. •While browsing the Internet, always confirm what you click , download and install.
33
THE BACKUP Local Backup Internet Backup (Cloud Storage)
EX : Drop Box , Google Drive and One Drive
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.