350 likes | 479 Views
Need help with computer networks? Our dedicated network administrators are here to assist you! Open a support ticket at http://support.unibz.it. Gain insights into essential concepts like LAN, WAN, and network encryption. Discover the importance of digital signatures, email communication protocols like PEC, and safeguards against viruses. Explore methods to enhance security through strong passwords and regular updates. Stay informed on broadband connections, search engines, and communication tools to optimize your network experience.
E N D
Computer networks Network administrators are here to help you! Open a ticket on http://support.unibz.it Computer networks
Computer networks • What is a network • Computers • External connection • Terminals • Printers • Stand-alone hard disks • VoIP telephones • Server-client architecture Computer networks
Transfer speed • Network areas • Local Area Network (LAN, Intranet) • Wide Area Network (WAN, Internet) • Virtual Private Network (VPN) • Speed in “bits per second” (bps) • Ethernet 10 Mbps • Fast Ethernet 100 Mbps • Giga Ethernet 1 Gbps • Wireless 30-300 Mbps Computer networks
Communication programs • Web browser • Chrome (55% of the market) • Mozilla Firefox (25% of the market) • Internet Explorer (10% of the market) • Safari • Mail reader • Outlook, Mozilla Thunderbird • Webmail and Microsoft Outlook Web App http://webmail.unibz.it • Voice over IP • Costs Computer networks
Posta Elettronica Certificata – PEC • Standard email • No guarantee of sender’s e-mail address identity • No guarantee of sender’s identity • No guarantee that content has not been altered • No sent proof • No dispatched proof • No read proof • PEC to PEC: like a raccomandata con ricevuta di ritorno • Sent proof • Dispatched proof • (in practice also) sender’s address identity and unaltered content Computer networks
Posta Elettronica Certificata – PEC • PEC to standard email: like a raccomandata semplice • Sent proof • Standard email to PEC: like a normal letter • Sent and dispatched proves are legal proves • Every citizen may have a free PEC address to communicate with public administration Computer networks
Search engines • Crawler technique (8 billions web pages!) • Google scoring system • Search tricks: • Use many keywords • Quotations • Advanced search • Search for images Computer networks
Slow connections Computer networks
Broadband connections Computer networks
Broadband connections • ADSL Congestion • “minimum band guaranteed” contract • Digital divide • 5,400,000 Italians not covered by broadband • WiMax • 10 Kilometers range • “line of sight” problem Computer networks
Privacy • Law 196/2003 on privacy • authentication • permission • training • firewall and antivirus • 6-12 months update • backup every week • sensitive data • encryption • restore within 7 days Computer networks
Encryption • Scrambling technique to make text unreadable • Public key for encrypting • Private key for decrypting • 128 bits to be sure Computer networks
decrypt decrypt decrypt encrypt encrypt B B G#4hg! G#4hg! message 1 Trb:-ò°§ message 1 message 1 Encryption for information exchange A C C encrypt encrypt decrypt decrypt message 2 f@çd*s f@çd*s Dr4^\|ò9 message 2 message 2 encrypt encrypt decrypt D D message 3 %$&/òL message 3 message 3 È^£(iw, È^£(iw, Computer networks
secret data secretdata secretdata %£)(“84jhgds?ì A A A encrypt encrypt D(£ò§*+]dH D(£ò§*+]dH decrypt decrypt Encryption for data storage Computer networks
Digital signature • Law 82/2005 • Private key for encrypting • Public key for decrypting • Keys given by certification authorities • Combination with PEC • Keys expiration • Temporal mark Computer networks
B B 2?=zx:-ki document decrypt decrypt Digital signature A document falsedocument Y&”:ò[fgj?’^d G#4$h&à?-2y encrypt encrypt C C decrypt decrypt 2?=zx:-ki document decrypt decrypt D D 2?=zx:-ki document Computer networks
Comparison with handwritten signature Computer networks
Passwords Computer networks
Passwords • What can be done with your password? • Steal personal data • Steal other people’s data • Steal money • Delete and modify data • Steal identity • Start illegal activities • A standard computer can try 1 million passwords per second Computer networks
Passwords • Law 196/2003 • Avoid personal data in the password • Change password every 3 months • Minimum 8 characters • Better also: • Mix letters, strange characters and numbers • Do not use words • Use different passwords for different purposes • Beware of passwords stored in programs • What to do in case of employee’s absence • Alternative password devices • smartcard, token key, OTP with display, OTP USB, phone Computer networks
Viruses • What does a virus do? • Infect • Survive • Duplicate • Damage • Virus infection symptoms • computer is slow to start • unwanted and annoying pop-ups • many system errors Computer networks
Viruses • User’s responsible behaviors • downloaded files and email attachments • CD, DVD, USB pendrives • strange websites • updated programs • updated antivirus • Anti-viruses • Checking the whole hard disk • Checking suspect files • Always running Computer networks
Types of viruses • Trojan horse • looks like a good program • Key logger • records your keyboard activity (to get passwords) • Back door • opens a port on your computer (to let external users in) • Adware • displays advertisement • Spyware • spies your activity (to get passwords or for spam targeting) • Dialer • dials expensive numbers using your PSTN modem Computer networks
Spam • “unsolicited” “unwanted” “bulk” email • Advertisement: gambling, pornographic websites, medicines, risky investments, software… • Chain letters • Frauds • Phishing • Sender is always counterfeited • Do not click on links! Do not answer!!! • Where do they get my email address? • Antispam and blacklists Computer networks
Phishing Computer networks
Phishing example • 2,000,000 emails sent • 5% arrive to existing users: 100,000 • 5% of users read the email: 5,000 • 2% of readers believe in the email: 100 • $1,200 from each user • Gain: $120,000 • In 2005 Mr. David Levi gained $360,000 from 160 people using Phishing on eBay website Computer networks
Safe navigating • Navigation security • Phishing • Viruses • Download Save Antivirus Open • Avoid visiting and downloading from untrustworthy websites • Keep Explorer and Windows up-to-date • Intercept your data • Secure connection SSL: httpS Computer networks
Attacks from outside • Denial of Service • zombie computers • Firewall • which internal program • which external address • what amount of traffic • which kind of data • Windows Seven Firewall Computer networks
Backup • Why backup? Source: The Cost of Lost Data. The importance of investing in that “ounce of prevention” by David M. Smith Computer networks
Backup • What to backup? • Your data files • Emails and addresses; browser’s configuration • Program configuration files • Difficult-to-find stuff • Where to backup? • another hard disk • online backup systems: Dropbox, Mozy, Sugarsync • rewritable CD and DVD • RAID techniques Computer networks
RAID – Redundant Array of Independent Disks • JBOD – Just a Bunch Of Disks • 2 disks • RAID 0 • 2 disks, fast • RAID 1 • 2 disks but space as for 1, safe vs crash, 24h service • Most common solution • RAID 10 • 4 disks but space as for 2, fast, safe vs crash , 24h service • None of these techniques is safe versus viruses or human errors! Computer networks
JBOD Computer networks
RAID 1 Computer networks
RAID 0 Computer networks
RAID 10 Computer networks