SlideShare a Scribd company logo
Lectured By :   Mr. Kean Tak
Group 5 Members:    OUNG SOMEY         SARY SENATE
                    PHOUK RATHA        POM CHANVEASNA
                    SEN POTIN          SREANG TITH
                    PHEN PHEAROTH      POUNG SONITA
                    RIN CHET           SOEUN PIDO


                                    SLIDE NUMBERS : 37-44
CLASS : A2 Y4
                               ACADEMIC YEAR: 2012-2013
 Telecommunication     Software
 Securing    Data Transmission
 Virtual   Private Network
 Telecommunication     and Network
 Application
 Cellular   Phone Service
 Network Operating System (NOS) –
     system software -> controls computer
     system + devices on a network
 Network Management Software
  • Protects software from being used illegally
  • Locates telecommunication errors and network
   problems
 Encryption   – Converting an message into
 a form that only receiver(machine) can be
 understood but not people


 Encryption   Key – variable value -> produce
 encrypted text + decrypted text
   Securing wireless networks
    • WEP – Wired equivalent privacy -> to secure wireless
      network
    • WEP use encryption based on 64bits key and upgraded to
      128bits key
    • Lack of security from hacker to crack the key

    • Most wireless networks employ WPA – security protocol

      -> offers significantly improved protection over WEP
 Securing       wireless networks
  • War driving -> hacker driving around with a laptop and antenna

    trying to detect insecure wireless access point

  • the hacker can gather enough traffic to analyze and crack the

    encryption
  • On WEP-encrypted network( 85,000 packages to analyze)

    -> 95% that the hacker can crack the code using the program
    aircrack-ptw running on PC
   private network that uses a public network (usually the
    Internet) to connect multiple remote locations.
   support secure, encrypted connections between a
    company’s
    private network and remote users through a third-party
    service provider.
   Telecommuters, salespeople, and frequent travelers find
    the use of a VPN to be a safe, reliable, low-cost way to
    connect to the corporate intranet.
 Cellular   Phone Service
  • Cellular Phones – operate using radio waves to
   provide two-way communication +
   Linked to a cordless phone via a bluetooth connection
  • Picocell –small cellular base station designed to
   serve a very small area
   Digital Subscriber line(DSL)-telecommunications service ->
    delivers high-speed Internet access over the existing phone
    lines of the local telephone network
   Asymmetric DSL (ADSL)-
    line designed -> provide a connection speed
    download speed 3-4 times faster than upload speed
   Symmetric DSL (SDSL) –
    used mainly by small businesses + not allow you to use the
    phone at the same time
    but the speed of receiving = speed sending data
Chapter6

More Related Content

What's hot

Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
slideshow 2
slideshow 2slideshow 2
slideshow 2
shresthad
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
Ankit Anand
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
Abu Rayhan Ahmmed Rimu
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
Saikiran Panjala
 
Electronic Communications 2
Electronic Communications 2Electronic Communications 2
Electronic Communications 2
Tori Small
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
Prakashchand Suthar
 
Electronic Communications
Electronic CommunicationsElectronic Communications
Electronic Communications
jpatetta
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
RAVI RAJ
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
karanwayne
 
Communication devices
Communication devicesCommunication devices
Communication devices
FazailAhmad2
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
AfiqEfendy Zaen
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
Ankit Anand
 
Fa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhFa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singh
Mary-Jo Apigo
 
Wireless security
Wireless securityWireless security
Wireless security
paripec
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
kentquirk
 
Wireless security
Wireless securityWireless security
Wireless security
vinay chitrakathi
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
Paul Gillingwater, MBA
 

What's hot (20)

Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
slideshow 2
slideshow 2slideshow 2
slideshow 2
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
Electronic Communications 2
Electronic Communications 2Electronic Communications 2
Electronic Communications 2
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Electronic Communications
Electronic CommunicationsElectronic Communications
Electronic Communications
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
Communication devices
Communication devicesCommunication devices
Communication devices
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Fa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhFa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singh
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 

Similar to Chapter6

NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdf
Mr. Moms
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
Usman Arshad
 
Internet an how it works
Internet an how it worksInternet an how it works
Internet an how it works
shahnaz10
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
Rbalasubramani
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
lisbala
 
it ppt-2.pptx
it ppt-2.pptxit ppt-2.pptx
it ppt-2.pptx
RitikaSharma10949
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
Dustin Pytko
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Universitas Pembangunan Panca Budi
 
Communication over networks by anam younas
Communication over networks by anam younasCommunication over networks by anam younas
Communication over networks by anam younas
AnamYounas1
 
Dial up security
Dial up securityDial up security
Dial up security
Ramla Sheikh
 
Business networks and telecomunication
Business networks and telecomunicationBusiness networks and telecomunication
Business networks and telecomunication
Attaullah Sahil-MBA
 
Business networks and telecomunication
Business networks and telecomunicationBusiness networks and telecomunication
Business networks and telecomunication
Attaullah Sahil-MBA
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
Fathima Rahaman
 
Chap 1
Chap 1Chap 1
Chap 1
fauzihayob
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
Avinash Nath
 
Network Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxNetwork Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptx
SazidHossain9
 
Uses Of Voice Over Internet Protocol
Uses Of Voice Over Internet ProtocolUses Of Voice Over Internet Protocol
Uses Of Voice Over Internet Protocol
Tara Hardin
 
group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
AshrafulIslam196006
 
Network security
Network securityNetwork security
Network security
Ravikumar Natarajan
 

Similar to Chapter6 (20)

NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdf
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Internet an how it works
Internet an how it worksInternet an how it works
Internet an how it works
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
 
it ppt-2.pptx
it ppt-2.pptxit ppt-2.pptx
it ppt-2.pptx
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Communication over networks by anam younas
Communication over networks by anam younasCommunication over networks by anam younas
Communication over networks by anam younas
 
Dial up security
Dial up securityDial up security
Dial up security
 
Business networks and telecomunication
Business networks and telecomunicationBusiness networks and telecomunication
Business networks and telecomunication
 
Business networks and telecomunication
Business networks and telecomunicationBusiness networks and telecomunication
Business networks and telecomunication
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Chap 1
Chap 1Chap 1
Chap 1
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Network Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxNetwork Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptx
 
Uses Of Voice Over Internet Protocol
Uses Of Voice Over Internet ProtocolUses Of Voice Over Internet Protocol
Uses Of Voice Over Internet Protocol
 
group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
 
Network security
Network securityNetwork security
Network security
 

Recently uploaded

Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 

Recently uploaded (20)

Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 

Chapter6

  • 1. Lectured By : Mr. Kean Tak Group 5 Members: OUNG SOMEY SARY SENATE PHOUK RATHA POM CHANVEASNA SEN POTIN SREANG TITH PHEN PHEAROTH POUNG SONITA RIN CHET SOEUN PIDO SLIDE NUMBERS : 37-44 CLASS : A2 Y4 ACADEMIC YEAR: 2012-2013
  • 2.  Telecommunication Software  Securing Data Transmission  Virtual Private Network  Telecommunication and Network Application  Cellular Phone Service
  • 3.  Network Operating System (NOS) – system software -> controls computer system + devices on a network  Network Management Software • Protects software from being used illegally • Locates telecommunication errors and network problems
  • 4.  Encryption – Converting an message into a form that only receiver(machine) can be understood but not people  Encryption Key – variable value -> produce encrypted text + decrypted text
  • 5.
  • 6. Securing wireless networks • WEP – Wired equivalent privacy -> to secure wireless network • WEP use encryption based on 64bits key and upgraded to 128bits key • Lack of security from hacker to crack the key • Most wireless networks employ WPA – security protocol -> offers significantly improved protection over WEP
  • 7.  Securing wireless networks • War driving -> hacker driving around with a laptop and antenna trying to detect insecure wireless access point • the hacker can gather enough traffic to analyze and crack the encryption • On WEP-encrypted network( 85,000 packages to analyze) -> 95% that the hacker can crack the code using the program aircrack-ptw running on PC
  • 8. private network that uses a public network (usually the Internet) to connect multiple remote locations.  support secure, encrypted connections between a company’s private network and remote users through a third-party service provider.  Telecommuters, salespeople, and frequent travelers find the use of a VPN to be a safe, reliable, low-cost way to connect to the corporate intranet.
  • 9.  Cellular Phone Service • Cellular Phones – operate using radio waves to provide two-way communication + Linked to a cordless phone via a bluetooth connection • Picocell –small cellular base station designed to serve a very small area
  • 10. Digital Subscriber line(DSL)-telecommunications service -> delivers high-speed Internet access over the existing phone lines of the local telephone network  Asymmetric DSL (ADSL)- line designed -> provide a connection speed download speed 3-4 times faster than upload speed  Symmetric DSL (SDSL) – used mainly by small businesses + not allow you to use the phone at the same time but the speed of receiving = speed sending data