1 / 11

Networks

Networks. ChaPter 2. Homework. Complete Chapter 2 end of book questions. Questions 1,3,6,9,11,12 13,14,15,16, 17,18 23,24,25 34,35,36,37 38,39 40,43. contents. Types of Networks Network Topologies Network Security Threats Network Protection. Types of Networks.

clover
Download Presentation

Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Networks ChaPter 2

  2. Homework • Complete Chapter 2 end of book questions. • Questions • 1,3,6,9,11,12 • 13,14,15,16, 17,18 • 23,24,25 • 34,35,36,37 • 38,39 • 40,43

  3. contents • Types of Networks • Network Topologies • Network Security Threats • Network Protection

  4. Types of Networks • LAN – Local Area Network • Own personal private internet • P2P – Peer to Peer • Kazaa, Emule, etc • Each computer stores it’s own data and information • Client-Server • Minecraft, World of Warcraftetc • Host acts as servers and clients rely on server for resources. • WAN – Wide Area Networks • The Internet • Combined medium and networks.

  5. Networks Topologies • Bus Networks • Share single data path • Star Networks • All computers connect to a central switch/router • Hybrids • Star networks connected by bus

  6. Network Security Threats • Accidental Threats • Deliberate Threats

  7. Accidental Threats • Delete Files • Lost/dropped USB drive • Misuse • Corrupt Files • Damage HDD • Power surges

  8. Deliberate Threats • Hackers • Encryption cracking • Password cracking • Brute Force • Dictionary etc. • Packet interception • Port Spoofing or Scanning • DoS (Denial of Service) and dDos (distributed DoS) • Malware • Viruses – Replicating, corrupting, requires human intervention • Worms – Replicating, consume bandwidth, requires network activity • Trojans/Backdoors – opening access to outsiders • Spyware – Rootkits, Key-loggers, relay personal details online

  9. What is an Encryption? • Modify information in a secret way • Eg • NSI FNT JUD MBT TJT CPS JOH BTI FMM  encrypted data • NSIFNTJUDMBTTJTCPSJOHBTIFMM  “one letter back” • MRHEMSITCLASSISBORINGASHELL • MR HEMS IT CLASS IS BORING AS HELL • JGZ PRX PSL PVU HJW FNF BUI VNC TVQ  encypted data • Work it out

  10. More Networks and Servers • VPN (Virtual Private Network) • Encryption tunnel through network • Eg proxy servicer, hamachi • Proxy Server • Act as an in between server • Web Server • Servers that are available in the internet • NAS (Networked Attached Storage) • Storage device connected to the network (eg. Router or hub) so all Computers can access.

  11. Network Protection • User Profiles and Passwords • Wireless Security (WEP, WPA, WPA2) • Anti-Malware Scanners • Anti Virus • Anti Spam • Anti Spyware etc. • Firewalls • Hardware eg. Home routers, restrict MAC access • Software eg. Windows Firewall

More Related