Successfully reported this slideshow.

Chapter 7

399 views

Published on

  • Be the first to comment

Chapter 7

  1. 1. Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses
  2. 2. Chapter Seven Objectives • Networks – Client/Server – Main components – Common types • Hackers and harm • Firewall • Viruses • Protection
  3. 3. Networking Fundamentals • Definition • Benefits • Internet share
  4. 4. Network Architectures • Nodes • Peer-to-peer • Client/Server
  5. 5. Networks and Distance • LAN • WAN
  6. 6. Data Transmission Media • Twisted pair • Coaxial • Fiber optic
  7. 7. Data Navigation Devices • Packets • Routers • Hubs
  8. 8. Networking Software For peer-to-peer For client/server
  9. 9. Peer-to-Peer Network Types • Power line • Phone line • Ethernet • Wireless
  10. 10. Power Line Networks • Uses house wiring • Routers and hubs – Max at 14 Mbps • Uses phone lines • Power line network and jacks adapter – Sharing with phones – USB or Ethernet – Max at 10 Mbps • Plug and play • HPNA adapter or – Software USB • Routers and hubs
  11. 11. Ethernet Networks • Most efficient – Usual speed at 100 Mbps • Use unshielded twisted pair cable (UTP) • Use routers and hubs • Use NICS (network interface cards)
  12. 12. Ethernet Cabling • Installation, distance • UTP categories Fig 7.11 Maximum Data Cable Category Transfer Rate Category 5 (CAT 5) 100 Mbps Category 5E (CAT 5E) 200 Mbps Category 6 (CAT 6) 1000 Mbps (1 Gbps)
  13. 13. Ethernet Architecture • Hubs • Routers – DSL/cable routers • Internet
  14. 14. Wireless Networks • Radio waves, not cabling • Wi-Fi – Several IEEE standards • Wireless network adapter • Transceiver
  15. 15. Wireless Considerations • Range, signal degradation • Node positions – Wireless access point • Internet connection – Wireless DSL/cable routers
  16. 16. Peer-to-Peer Questions • Existing wiring? • Wireless also? • How fast? • Budget?
  17. 17. Comparing Home Networks Power Phone Factors: Line Line Ethernet Wireless 100 to Maximum data transfer rate 14 10 11 to 54 1000 (throughput) Mbps Mbps Mbps Mbps Approximate cost to network two computers $160 $120 $135 $225 (adapters and wiring only) Additional cost for adding Internet connection sharing $80 $120 $0 $40 Approximate cost to add a computer to network $80 $60 $40 $60
  18. 18. Configuring Home Network Software • With XP • With OS mix • Without XP
  19. 19. Computer Safety • Cybercrime • Cybercriminals
  20. 20. Computer Threats: Hackers Why Hack? Credit cards Packet sniffer • White hat Identity theft • Black hat • Script kiddies
  21. 21. Safety Tips • Hide passwords, pins • Personal info • Passwords: – Numbers and letters – Obscure letter combinations • FTC Identity Theft
  22. 22. Hacker Activities • Trojan horses – Far-reaching damage – Back-door programs • Denial of service • Distributed DOS • Hacker access: – Directly – Via logical ports
  23. 23. Firewall Protection Software – Easy, port protection Hardware
  24. 24. Firewalls… • Block ports • Hide network address • Use packet-filtering • Use NAT
  25. 25. Computer-At-Risk Testing • Free test from Gibson Research Corporation
  26. 26. Computer Viruses • Definition • Kinds of damage • Virus sources
  27. 27. Computer Viruses: Types • Grouped by behavior and method of transmission – Boot sector – Logic bombs – Worms – Script and macro – Trojan Horses
  28. 28. How Viruses Avoid Detection • Polymorphic • Multi-partite • Stealth
  29. 29. Antivirus Software • Norton
  30. 30. Antivirus Software • Virus signatures • Known viruses • “Signature” updates
  31. 31. Other Security Measures • Update OS – System updates – Security patches
  32. 32. Networking and Security Topic Summary • What is a network – Advantages • Difference between a client/server network and a peer-to-peer (P2P) • Main network components • Common home networks • Power line networks • Phone line networks
  33. 33. Networking and Security Topic Summary • Ethernet networks • Wireless networks • How hackers attack – Harm • Firewall – How does it keep a computer safe • Viruses • Protection

×