Presentation is loading. Please wait.

Presentation is loading. Please wait.

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them.

Similar presentations


Presentation on theme: "Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them."— Presentation transcript:

1 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses NEXT SLIDE

2 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.2 Networking Fundamentals Computer network:Computer network: –Two or more computers connected together Network Designs:Network Designs: –Locally controlled: Peer-to-peer (P2P) Peer-to-peer (P2P) –Centrally controlled: Client/server Client/server Describe network based on distanceDescribe network based on distance –LAN –WAN Computer network:Computer network: –Two or more computers connected together Network Designs:Network Designs: –Locally controlled: Peer-to-peer (P2P) Peer-to-peer (P2P) –Centrally controlled: Client/server Client/server Describe network based on distanceDescribe network based on distance –LAN –WAN NEXT SLIDE

3 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.3 Network Components Transmission mediaTransmission media –Data transfer rate Network adaptersNetwork adapters –Network Interface Cards (NIC) –External Network Adapter Navigation devicesNavigation devices –Hubs –Routers Network softwareNetwork software Transmission mediaTransmission media –Data transfer rate Network adaptersNetwork adapters –Network Interface Cards (NIC) –External Network Adapter Navigation devicesNavigation devices –Hubs –Routers Network softwareNetwork software NEXT SLIDE Telephone wire: T wi st ed pa ir Coaxial cable Fiber-optic cable Radio waves: Wireless

4 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.4 Peer-to-Peer Networks Types of P2P networksTypes of P2P networks –Power line –Phone line –Ethernet –Wireless Things to consider:Things to consider: –Existing wiring –Wireless or wired –Speed of the network –Cost of the network Types of P2P networksTypes of P2P networks –Power line –Phone line –Ethernet –Wireless Things to consider:Things to consider: –Existing wiring –Wireless or wired –Speed of the network –Cost of the network

5 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.5 Computer Threats Cyber-crime, Cyber-criminalCyber-crime, Cyber-criminal Hackers:Hackers: –Who they are –What they do Steal information from computers: Steal information from computers: Internet packet sniffing Internet packet sniffing Commit identity theft Commit identity theft Create widespread computer attacks: Create widespread computer attacks: Denial of service attacks Denial of service attacks –How they gain access Direct access: Direct access: –Hacking software Indirect access: Indirect access: –Internet connection –Logical ports Cyber-crime, Cyber-criminalCyber-crime, Cyber-criminal Hackers:Hackers: –Who they are –What they do Steal information from computers: Steal information from computers: Internet packet sniffing Internet packet sniffing Commit identity theft Commit identity theft Create widespread computer attacks: Create widespread computer attacks: Denial of service attacks Denial of service attacks –How they gain access Direct access: Direct access: –Hacking software Indirect access: Indirect access: –Internet connection –Logical ports NEXT SLIDE

6 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.6 MovieMovie The Net (1995) http://movieweb.com/movie/thenet The Net (1995) http://movieweb.com/movie/thenet

7 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.7 Computer Safeguards FirewallsFirewalls Viruses and antivirus softwareViruses and antivirus software FirewallsFirewalls Viruses and antivirus softwareViruses and antivirus software NEXT SLIDE

8 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.8 FirewallsFirewalls Software programs or hardware designed to close logical ports to invadersSoftware programs or hardware designed to close logical ports to invaders Types of firewalls:Types of firewalls: –Norton Personal Firewall –McAfee Firewall –Zone Alarm –BlackICE PC Protection –Network routers Static addressingStatic addressing Dynamic addressingDynamic addressing Software programs or hardware designed to close logical ports to invadersSoftware programs or hardware designed to close logical ports to invaders Types of firewalls:Types of firewalls: –Norton Personal Firewall –McAfee Firewall –Zone Alarm –BlackICE PC Protection –Network routers Static addressingStatic addressing Dynamic addressingDynamic addressing NEXT SLIDE

9 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.9 Software firewall download ZoneAlarm— http://www.zonelabs.com/store/content/c atalog/products/sku_list_za.jsp?lid=pdb_z al http://www.zonelabs.com/store/content/c atalog/products/sku_list_za.jsp?lid=pdb_z al Sygate— http://soho.sygate.com/http://soho.sygate.com/ Norton Personal Firewall— http://www.symantec.com/sabu/nis/npf/ http://www.symantec.com/sabu/nis/npf/ ZoneAlarm— http://www.zonelabs.com/store/content/c atalog/products/sku_list_za.jsp?lid=pdb_z al http://www.zonelabs.com/store/content/c atalog/products/sku_list_za.jsp?lid=pdb_z al Sygate— http://soho.sygate.com/http://soho.sygate.com/ Norton Personal Firewall— http://www.symantec.com/sabu/nis/npf/ http://www.symantec.com/sabu/nis/npf/

10 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.10 Computer Viruses A program that attaches itself to another program and spreads itself to other computersA program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host programViruses are hidden within the code of a host program A program that attaches itself to another program and spreads itself to other computersA program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host programViruses are hidden within the code of a host program Norton AntiVirus Response Center Web Page NEXT SLIDE

11 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.11 What Viruses Do Replicate themselves:Replicate themselves: –Slow down networks Secondary objectives:Secondary objectives: –Annoying messages –Delete files on the hard drive –Change computer settings Replicate themselves:Replicate themselves: –Slow down networks Secondary objectives:Secondary objectives: –Annoying messages –Delete files on the hard drive –Change computer settings Love Letter – Fastest spreading virus Melissa – Caused $80 million damage Nimda – Affected more than 1 million computers NEXT SLIDE

12 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.12 Types of Viruses Boot-sector viruses:Boot-sector viruses: –Replicate themselves in the boot sector of the hard drive Logic bombs:Logic bombs: –Activate when certain conditions are met –Michelangelo virus Worms:Worms: –Travel between systems through networks –Sasser worm Boot-sector viruses:Boot-sector viruses: –Replicate themselves in the boot sector of the hard drive Logic bombs:Logic bombs: –Activate when certain conditions are met –Michelangelo virus Worms:Worms: –Travel between systems through networks –Sasser worm March 6 NEXT SLIDE

13 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.13 Types of Viruses Script viruses:Script viruses: –Hidden on Web pages –Mini programs Macro viruses:Macro viruses: –Attached to documents –Series of commands –Melissa virus Trojan horses:Trojan horses: –Backdoor programs –Control remote computers Script viruses:Script viruses: –Hidden on Web pages –Mini programs Macro viruses:Macro viruses: –Attached to documents –Series of commands –Melissa virus Trojan horses:Trojan horses: –Backdoor programs –Control remote computers NEXT SLIDE

14 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.14 Virus Classifications Polymorphic viruses:Polymorphic viruses: –Periodically rewrite themselves to avoid detection Multipartite viruses:Multipartite viruses: –Infect multiple file types Stealth viruses:Stealth viruses: –Erase their code from the hard drive and reside in the active memory Polymorphic viruses:Polymorphic viruses: –Periodically rewrite themselves to avoid detection Multipartite viruses:Multipartite viruses: –Infect multiple file types Stealth viruses:Stealth viruses: –Erase their code from the hard drive and reside in the active memory NEXT SLIDE

15 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.15 Antivirus Software Programs designed to detect viruses:Programs designed to detect viruses: –Scan files looking for virus signatures (unique code) –Provides options for deleting or fixing infected files Detect known virusesDetect known viruses Antivirus programs need to be updated frequentlyAntivirus programs need to be updated frequently Programs designed to detect viruses:Programs designed to detect viruses: –Scan files looking for virus signatures (unique code) –Provides options for deleting or fixing infected files Detect known virusesDetect known viruses Antivirus programs need to be updated frequentlyAntivirus programs need to be updated frequently NEXT SLIDE

16 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.16 Chapter 7 Summary Questions What is a firewall and how does it keep my computer safe from hackers?What is a firewall and how does it keep my computer safe from hackers? From which types of viruses do I need to protect my computer?From which types of viruses do I need to protect my computer? What can I do to protect my computer from viruses?What can I do to protect my computer from viruses? What is a firewall and how does it keep my computer safe from hackers?What is a firewall and how does it keep my computer safe from hackers? From which types of viruses do I need to protect my computer?From which types of viruses do I need to protect my computer? What can I do to protect my computer from viruses?What can I do to protect my computer from viruses? LAST SLIDE


Download ppt "Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them."

Similar presentations


Ads by Google