Top Banner
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses • Networking fundamentals • Network architecture • Network components • Peer-to-peer networks • Computer threats • Computer safeguards • Computer viruses NEXT SLIDE NEXT SLIDE
33

1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

Dec 22, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

1

Networking and Security: Connecting Computers and

Keeping Them Safe from Hackers and Viruses

• Networking fundamentals

• Network architecture

• Network components

• Peer-to-peer networks

• Computer threats

• Computer safeguards

• Computer virusesNEXT SLIDENEXT SLIDE

Page 2: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

2

Networking Fundamentals• Computer network:

– Two or more computers connected together– Nodes

• Benefits of a network:– Sharing resources– Transferring files

NEXT SLIDE

Page 3: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

3

Network Architecture

• Network designs:– Locally controlled:

• Peer-to-peer (P2P)

– Centrally controlled:• Client/server

Peer-to-peer

Client/server

NEXT SLIDE

Page 4: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

4

Peer-to-Peer Networks

• Nodes communicate with each other:– Peers

• Share peripheral devices:– Printers– Scanners

• Home and small office networks

NEXT SLIDE

Page 5: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

5

Client/Server Networks

• Client computers:– Users

• Server computers:– Provide resources to clients– Central control unit

• Internet

NEXT SLIDE

Page 6: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

6

LANs and WANs

• Local area network (LAN):– Nodes are within a small geographic region:

• Homes• Schools• Small businesses

• Wide area network (WAN):– LANs connected over long distances:

• A few miles to thousands of miles• Use telecommunications lines

NEXT SLIDE

Page 7: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

7

Network Components

• Transmission media

• Network adapters

• Navigation devices

• Network software

NEXT SLIDE

Page 8: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

8

Transmission Media

• Provides communications channel between nodes

• Forms of media:– Telephone wire:

• Twisted pair

– Coaxial cable– Fiber-optic cable– Radio waves:

• Wireless

• Bandwidth:– Data transfer rate

NEXT SLIDE

Page 9: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

9

Network Adapters

• Devices connected to or installed in nodes:– Network interface cards (NIC)– External network adapter

• Enable communication between nodes

NICExternal adapter

NEXT SLIDE

Page 10: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

10

Network Navigation Devices

• Devices that help make data flow possible

• Routers:– Route data between networks

• Hubs:– Receive data and retransmit it to nodes on the

network

Hub Router NEXT SLIDE

Page 11: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

11

Networking Software

• Software needed:– Peer-to-peer:

• Operating systems that support networking• Windows• Mac OS

– Client/server:• Network operating system (NOS) software• Windows XP Professional• Windows Server 2003• Novell Netware

Page 12: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

12

Types of Peer-to-Peer Networks

• Power line

• Phone line

• Ethernet

• Wireless

Page 13: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

13

Power Line Networks

• Computers are connected to a house’s electrical wiring to create a network

• Power line network adapter is used to connect nodes to electrical outlets

NEXT SLIDE

Page 14: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

14

Phone Line Networks

• Computers are connected to a house’s telephone wiring to create a network

• Home phone line network adapter is used to connect nodes to phone jacks

NEXT SLIDE

Page 15: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

15

Ethernet Networks

• Computers are connected to each other using unshielded twisted pair cable

• Ethernet network adapters are used to connect nodes– NIC– PC card– USB adapter

NEXT SLIDE

RJ-45

conn

ecto

r

PC card

NIC card

USB

adap

ter

Page 16: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

16

Ethernet Hubs

• Keep track of data packets

• Amplify and retransmit signals

• Keep the network running efficiently

NEXT SLIDE

Page 17: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

17

Ethernet Routers

• Route packets of data between networks

• Router needed to send data between the network and the Internet

NEXT SLIDE

Page 18: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

18

Wireless Networks

• Use radio waves to connect nodes

• Basically an Ethernet network that uses radio waves instead of wires

• Each node requires a wireless network adapter:– Transceiver

NEXT SLIDE

Page 19: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

19

Choosing a Peer-to-Peer Network

• Things to consider:– Existing wiring– Wireless or wired– Speed of the network– Cost of the network

NEXT SLIDE

Page 20: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

20

Configuring Software for a Home Network

• Windows operating system:– Windows XP:

• Network setup wizard

– Windows ME:• Network setup wizard

– Windows 98:• Configure manually

NEXT SLIDE

Page 21: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

21

Computer Threats

• Cyber-crime

• Hackers:– Who they are– What they do– How they gain access

NEXT SLIDE

Page 22: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

22

Cyber-crimes and Cyber-criminals

• Cyber-crimes are criminal acts conducted through the use of a computer:– Fraud– Identity theft

• Cyber-criminals are individuals who use a computer to commit a crime

NEXT SLIDE

Page 23: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

23

Hackers

• Anyone who unlawfully accesses a computer system

• Types of hackers:– Cracker – White-hat– Black-hat– Script kiddies

NEXT SLIDE

Page 24: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

24

What Hackers Do

• Steal information from computers:– Credit card numbers– Bank account numbers

• Internet packet sniffing• Commit identity theft• Create widespread computer attacks:

– Backdoor programs (Trojan horse)– Zombies

• Denial of service attacks

NEXT SLIDE

Page 25: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

25

How Hackers Gain Access

• Direct access:– Hacking software

• Indirect access:– Internet connection– Logical ports

NEXT SLIDE

Page 26: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

26

Computer Safeguards

• Firewalls

• Viruses and antivirus software

NEXT SLIDE

Page 27: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

27

Firewalls

• Software programs or hardware designed to close logical ports to invaders

• Types of firewalls:– Norton Personal Firewall– McAfee Firewall– Zone Alarm– BlackICE PC Protection– Network routers

NEXT SLIDE

Page 28: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

28

Computer Viruses

• A program that attaches itself to another program and spreads itself to other computers

• Viruses are hidden within the code of a host program

Norton AntiVirus Response Center Web Page

NEXT SLIDE

Page 29: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

29

What Viruses Do

• Replicate themselves:– Slow down networks

• Secondary objectives:– Annoying messages– Delete files on the hard drive– Change computer settings

Love Letter – Fastest spreading virus

Melissa – Caused $80 million damage

Nimda – Affected more than 1 million computers

NEXT SLIDE

Page 30: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

30

Types of Viruses

• Boot-sector viruses:– Replicate themselves in the boot sector of the

hard drive

• Logic bombs:– Activate when certain conditions are met

• Worms:– Travel between systems through networks

March 6

NEXT SLIDE

Page 31: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

31

Types of Viruses

• Script viruses:– Hidden on Web pages– Mini programs

• Macro viruses:– Attached to documents– Series of commands

• Trojan horses:– Backdoor programs– Control remote computers

NEXT SLIDE

Page 32: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

32

Virus Classifications

• Polymorphic viruses:– Periodically rewrite themselves to avoid

detection

• Multipartite viruses:– Infect multiple file types

• Stealth viruses:– Erase their code from the hard drive and

reside in the active memory

• Polymorphic viruses:– Periodically rewrite themselves to avoid

detection

• Multipartite viruses:– Infect multiple file types

• Stealth viruses:– Erase their code from the hard drive and

reside in the active memory

NEXT SLIDE

Page 33: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.

33

Antivirus Software• Programs designed to detect viruses:

– Scan files looking for virus signatures (unique code)

– Provides options for deleting or fixing infected files

• Detect known viruses

• Antivirus programs need to be updated frequently

NEXT SLIDE