Presentation is loading. Please wait.

Presentation is loading. Please wait.

Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Similar presentations


Presentation on theme: "Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses."— Presentation transcript:

1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

2 Chapter Seven Objectives Networks –Client/Server –Main components –Common types Hackers and harm Firewall Viruses Protection

3 Networking Fundamentals Definition Benefits Internet share

4 Network Architectures Nodes Peer-to-peer Client/Server

5 Networks and Distance LAN WAN

6 Data Transmission Media Twisted pair Coaxial Fiber optic

7 Data Navigation Devices Packets Routers Hubs

8 Networking Software For peer-to-peer For client/server

9 Peer-to-Peer Network Types Power line Phone line Ethernet Wireless

10 Power Line Networks Uses house wiring –Max at 14 Mbps Power line network adapter –USB or Ethernet Plug and play –Software Routers and hubs Uses phone lines and jacks –Sharing with phones –Max at 10 Mbps HPNA adapter or USB Routers and hubs

11 Ethernet Networks Most efficient –Usual speed at 100 Mbps Use unshielded twisted pair cable (UTP) Use routers and hubs Use NICS (network interface cards)

12 Ethernet Cabling Installation, distance UTP categories Cable Category Maximum Data Transfer Rate Category 5 (CAT 5)100 Mbps Category 5E (CAT 5E)200 Mbps Category 6 (CAT 6)1000 Mbps (1 Gbps) Fig 7.11

13 Ethernet Architecture Hubs Routers –DSL/cable routers Internet

14 Wireless Networks Radio waves, not cabling Wi-Fi –Several IEEE standards Wireless network adapter Transceiver

15 Wireless Considerations Range, signal degradation Node positions –Wireless access point Internet connection –Wireless DSL/cable routers

16 Peer-to-Peer Questions Existing wiring? Wireless also? How fast? Budget?

17 Comparing Home Networks Factors: Power Line Phone Line EthernetWireless Maximum data transfer rate (throughput) 14 Mbps 10 Mbps 100 to 1000 Mbps 11 to 54 Mbps Approximate cost to network two computers (adapters and wiring only) $160$120$135$225 Additional cost for adding Internet connection sharing $80$120$0$40 Approximate cost to add a computer to network $80$60$40$60

18 Configuring Home Network Software With XP With OS mix Without XP

19 Computer Safety Cybercrime Cybercriminals

20 Computer Threats: Hackers White hat Black hat Script kiddies Why Hack? Credit cards Packet sniffer Identity theft

21 Safety Tips Hide passwords, pins Personal info Passwords: –Numbers and letters –Obscure letter combinations FTC Identity Theft

22 Hacker Activities Trojan horses –Far-reaching damage –Back-door programs Denial of service Distributed DOS Hacker access: –Directly –Via logical ports

23 Firewall Protection Software –Easy, port protection Hardware

24 Firewalls … Block ports Hide network address Use packet-filtering Use NAT

25 Computer-At-Risk Testing Free test from Gibson Research Corporation Gibson Research Corporation

26 Computer Viruses Definition Kinds of damage Virus sources

27 Computer Viruses: Types Grouped by behavior and method of transmission –Boot sector –Logic bombs –Worms –Script and macro –Trojan Horses

28 How Viruses Avoid Detection Polymorphic Multi-partite Stealth

29 Antivirus Software Norton

30 Antivirus Software Virus signatures Known viruses “Signature” updates

31 Other Security Measures Update OS –System updates –Security patches

32 Networking and Security Topic Summary What is a network –Advantages Difference between a client/server network and a peer-to-peer (P2P) Main network components Common home networks Power line networks Phone line networks

33 Networking and Security Topic Summary Ethernet networks Wireless networks How hackers attack –Harm Firewall –How does it keep a computer safe Viruses Protection


Download ppt "Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses."

Similar presentations


Ads by Google