33
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses • Networking fundamentals • Network architecture • Network components • Peer-to-peer networks • Computer threats • Computer safeguards • Computer viruses NEXT SLIDE NEXT SLIDE

1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

  • View
    219

  • Download
    3

Embed Size (px)

Citation preview

Page 1: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

1

Networking and Security: Connecting Computers and

Keeping Them Safe from Hackers and Viruses

• Networking fundamentals

• Network architecture

• Network components

• Peer-to-peer networks

• Computer threats

• Computer safeguards

• Computer virusesNEXT SLIDENEXT SLIDE

Page 2: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

2

Networking Fundamentals• Computer network:

– Two or more computers connected together– Nodes

• Benefits of a network:– Sharing resources– Transferring files

NEXT SLIDE

Page 3: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

3

Network Architecture

• Network designs:– Locally controlled:

• Peer-to-peer (P2P)

– Centrally controlled:• Client/server

Peer-to-peer

Client/server

NEXT SLIDE

Page 4: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

4

Peer-to-Peer Networks

• Nodes communicate with each other:– Peers

• Share peripheral devices:– Printers– Scanners

• Home and small office networks

NEXT SLIDE

Page 5: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

5

Client/Server Networks

• Client computers:– Users

• Server computers:– Provide resources to clients– Central control unit

• Internet

NEXT SLIDE

Page 6: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

6

LANs and WANs

• Local area network (LAN):– Nodes are within a small geographic region:

• Homes• Schools• Small businesses

• Wide area network (WAN):– LANs connected over long distances:

• A few miles to thousands of miles• Use telecommunications lines

NEXT SLIDE

Page 7: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

7

Network Components

• Transmission media

• Network adapters

• Navigation devices

• Network software

NEXT SLIDE

Page 8: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

8

Transmission Media

• Provides communications channel between nodes

• Forms of media:– Telephone wire:

• Twisted pair

– Coaxial cable– Fiber-optic cable– Radio waves:

• Wireless

• Bandwidth:– Data transfer rate

NEXT SLIDE

Page 9: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

9

Network Adapters

• Devices connected to or installed in nodes:– Network interface cards (NIC)– External network adapter

• Enable communication between nodes

NICExternal adapter

NEXT SLIDE

Page 10: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

10

Network Navigation Devices

• Devices that help make data flow possible

• Routers:– Route data between networks

• Hubs:– Receive data and retransmit it to nodes on the

network

Hub Router NEXT SLIDE

Page 11: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

11

Networking Software

• Software needed:– Peer-to-peer:

• Operating systems that support networking• Windows• Mac OS

– Client/server:• Network operating system (NOS) software• Windows XP Professional• Windows Server 2003• Novell Netware

Page 12: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

12

Types of Peer-to-Peer Networks

• Power line

• Phone line

• Ethernet

• Wireless

Page 13: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

13

Power Line Networks

• Computers are connected to a house’s electrical wiring to create a network

• Power line network adapter is used to connect nodes to electrical outlets

NEXT SLIDE

Page 14: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

14

Phone Line Networks

• Computers are connected to a house’s telephone wiring to create a network

• Home phone line network adapter is used to connect nodes to phone jacks

NEXT SLIDE

Page 15: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

15

Ethernet Networks

• Computers are connected to each other using unshielded twisted pair cable

• Ethernet network adapters are used to connect nodes– NIC– PC card– USB adapter

NEXT SLIDE

RJ-45

conn

ecto

r

PC card

NIC card

USB

adap

ter

Page 16: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

16

Ethernet Hubs

• Keep track of data packets

• Amplify and retransmit signals

• Keep the network running efficiently

NEXT SLIDE

Page 17: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

17

Ethernet Routers

• Route packets of data between networks

• Router needed to send data between the network and the Internet

NEXT SLIDE

Page 18: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

18

Wireless Networks

• Use radio waves to connect nodes

• Basically an Ethernet network that uses radio waves instead of wires

• Each node requires a wireless network adapter:– Transceiver

NEXT SLIDE

Page 19: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

19

Choosing a Peer-to-Peer Network

• Things to consider:– Existing wiring– Wireless or wired– Speed of the network– Cost of the network

NEXT SLIDE

Page 20: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

20

Configuring Software for a Home Network

• Windows operating system:– Windows XP:

• Network setup wizard

– Windows ME:• Network setup wizard

– Windows 98:• Configure manually

NEXT SLIDE

Page 21: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

21

Computer Threats

• Cyber-crime

• Hackers:– Who they are– What they do– How they gain access

NEXT SLIDE

Page 22: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

22

Cyber-crimes and Cyber-criminals

• Cyber-crimes are criminal acts conducted through the use of a computer:– Fraud– Identity theft

• Cyber-criminals are individuals who use a computer to commit a crime

NEXT SLIDE

Page 23: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

23

Hackers

• Anyone who unlawfully accesses a computer system

• Types of hackers:– Cracker – White-hat– Black-hat– Script kiddies

NEXT SLIDE

Page 24: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

24

What Hackers Do

• Steal information from computers:– Credit card numbers– Bank account numbers

• Internet packet sniffing• Commit identity theft• Create widespread computer attacks:

– Backdoor programs (Trojan horse)– Zombies

• Denial of service attacks

NEXT SLIDE

Page 25: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

25

How Hackers Gain Access

• Direct access:– Hacking software

• Indirect access:– Internet connection– Logical ports

NEXT SLIDE

Page 26: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

26

Computer Safeguards

• Firewalls

• Viruses and antivirus software

NEXT SLIDE

Page 27: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

27

Firewalls

• Software programs or hardware designed to close logical ports to invaders

• Types of firewalls:– Norton Personal Firewall– McAfee Firewall– Zone Alarm– BlackICE PC Protection– Network routers

NEXT SLIDE

Page 28: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

28

Computer Viruses

• A program that attaches itself to another program and spreads itself to other computers

• Viruses are hidden within the code of a host program

Norton AntiVirus Response Center Web Page

NEXT SLIDE

Page 29: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

29

What Viruses Do

• Replicate themselves:– Slow down networks

• Secondary objectives:– Annoying messages– Delete files on the hard drive– Change computer settings

Love Letter – Fastest spreading virus

Melissa – Caused $80 million damage

Nimda – Affected more than 1 million computers

NEXT SLIDE

Page 30: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

30

Types of Viruses

• Boot-sector viruses:– Replicate themselves in the boot sector of the

hard drive

• Logic bombs:– Activate when certain conditions are met

• Worms:– Travel between systems through networks

March 6

NEXT SLIDE

Page 31: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

31

Types of Viruses

• Script viruses:– Hidden on Web pages– Mini programs

• Macro viruses:– Attached to documents– Series of commands

• Trojan horses:– Backdoor programs– Control remote computers

NEXT SLIDE

Page 32: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

32

Virus Classifications

• Polymorphic viruses:– Periodically rewrite themselves to avoid

detection

• Multipartite viruses:– Infect multiple file types

• Stealth viruses:– Erase their code from the hard drive and

reside in the active memory

• Polymorphic viruses:– Periodically rewrite themselves to avoid

detection

• Multipartite viruses:– Infect multiple file types

• Stealth viruses:– Erase their code from the hard drive and

reside in the active memory

NEXT SLIDE

Page 33: 1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components

33

Antivirus Software• Programs designed to detect viruses:

– Scan files looking for virus signatures (unique code)

– Provides options for deleting or fixing infected files

• Detect known viruses

• Antivirus programs need to be updated frequently

NEXT SLIDE