33
1 Computer Networks & Security

Lecture - Unit 8

Embed Size (px)

Citation preview

Page 1: Lecture - Unit 8

1

Computer NetworksComputer Networks

& Security& Security

Page 2: Lecture - Unit 8

2

Networking FundamentalsNetworking Fundamentals Computer network:

Two or more computers connected together Each is a Node

Benefits of a network: Sharing resources Transferring files

Computer network: Two or more computers connected together

Each is a Node

Benefits of a network: Sharing resources Transferring files

Page 3: Lecture - Unit 8

3

Network ArchitectureNetwork Architecture

Network designs: Individual PC controlled:

Peer-to-peer (P2P)

Centrally controlled: Client/server

Network designs: Individual PC controlled:

Peer-to-peer (P2P)

Centrally controlled: Client/server

Peer-to-peer

Client/server

Page 4: Lecture - Unit 8

4

Peer-to-Peer NetworksPeer-to-Peer Networks

Nodes communicate with each other: Peers

Share peripheral devices: Printers Scanners

Home and small office networks

Nodes communicate with each other: Peers

Share peripheral devices: Printers Scanners

Home and small office networks

Page 5: Lecture - Unit 8

5

Client/Server NetworksClient/Server Networks

Client computers: Users

Server computers: Provide resources to clients Central network control

Internet A large, multiserver, multiclient network.

Client computers: Users

Server computers: Provide resources to clients Central network control

Internet A large, multiserver, multiclient network.

Page 6: Lecture - Unit 8

6

LANs and WANsLANs and WANs

Local area network (LAN): Nodes are within a small geographic region:

Homes Schools Small businesses

Wide area network (WAN): LANs connected over long distances:

A few miles to thousands of miles Use telecommunications lines

Local area network (LAN): Nodes are within a small geographic region:

Homes Schools Small businesses

Wide area network (WAN): LANs connected over long distances:

A few miles to thousands of miles Use telecommunications lines

Page 7: Lecture - Unit 8

7

Network ComponentsNetwork Components

Transmission media Network adapters Navigation devices Network software

Transmission media Network adapters Navigation devices Network software

Page 8: Lecture - Unit 8

8

Transmission MediaTransmission Media Provides communications channel between nodes Forms of media:

Telephone wire: Twisted pair

Coaxial cable Fiber-optic cable Radio waves:

Wireless Bandwidth:

Data transfer rate Throughput

Provides communications channel between nodes Forms of media:

Telephone wire: Twisted pair

Coaxial cable Fiber-optic cable Radio waves:

Wireless Bandwidth:

Data transfer rate Throughput

Page 9: Lecture - Unit 8

9

Network AdaptersNetwork Adapters Devices connected to or installed in nodes:

Network interface cards (NIC) External network adapter

Enable communication between nodes

Devices connected to or installed in nodes: Network interface cards (NIC) External network adapter

Enable communication between nodes

Page 10: Lecture - Unit 8

10

Network Navigation DevicesNetwork Navigation Devices

Devices that help make data flow possible

Routers: Route data between networks

Switches: Receive data and retransmit it

to nodes on the network

Devices that help make data flow possible

Routers: Route data between networks

Switches: Receive data and retransmit it

to nodes on the network

Page 11: Lecture - Unit 8

11

Networking SoftwareNetworking Software Peer-to-Peer Software:

Built into operating systems that support networking Windows Mac OS

Client/Server Software Network operating system (NOS) software

Windows XP Professional Windows Server 2003 Novell Netware Windows Vista Enterprise

Page 12: Lecture - Unit 8

12

Ethernet SwitchesEthernet Switches

Keep track of data packets Amplify and retransmit signals Keep the network running efficiently

Keep track of data packets Amplify and retransmit signals Keep the network running efficiently

Page 13: Lecture - Unit 8

13

Ethernet RoutersEthernet Routers

Transfer packets from one network to another Home Internet routers transfer data from the

Internet to the home network.

Transfer packets from one network to another Home Internet routers transfer data from the

Internet to the home network.

Router

Page 14: Lecture - Unit 8

14

Wireless NetworksWireless Networks

Use radio waves to connect nodes Basically an Ethernet network that uses radio waves

instead of wires Each node requires a wireless network adapter:

Transceiver

Use radio waves to connect nodes Basically an Ethernet network that uses radio waves

instead of wires Each node requires a wireless network adapter:

Transceiver

Page 15: Lecture - Unit 8

15

Computer ThreatsComputer Threats

Cybercrimes are criminal acts conducted through the use of computers by cybercriminals.

Cybercrimes are criminal acts conducted through the use of computers by cybercriminals.

Page 16: Lecture - Unit 8

16

Hackers Hackers

Anyone who unlawfully accesses a computer system

Types of hackers: White-hat Black-hat Script kiddies

Anyone who unlawfully accesses a computer system

Types of hackers: White-hat Black-hat Script kiddies

Page 17: Lecture - Unit 8

17

What Hackers DoWhat Hackers Do

Steal information from computers: Credit card numbers Bank account numbers

Internet packet sniffing Commit identity theft

Page 18: Lecture - Unit 8

18

Denial of Service AttacksDenial of Service Attacks

Backdoor programs Trojan horse Zombies

Denial of service attacks

Backdoor programs Trojan horse Zombies

Denial of service attacks

Page 19: Lecture - Unit 8

19

How Hackers Gain AccessHow Hackers Gain Access

Direct access: Hacking software

Indirect access: Internet connection Logical ports

Direct access: Hacking software

Indirect access: Internet connection Logical ports

Page 20: Lecture - Unit 8

20

Computer SafeguardsFirewalls

Computer SafeguardsFirewalls

Software programs or hardware designed to close logical ports to invaders A firewall is built into

Windows XP More robust firewalls are

available from other vendors. Firewalls are critical if you

have an always-on broadband connection.

Software programs or hardware designed to close logical ports to invaders A firewall is built into

Windows XP More robust firewalls are

available from other vendors. Firewalls are critical if you

have an always-on broadband connection.

Page 21: Lecture - Unit 8

21

Protecting a Wireless NetworkProtecting a Wireless Network

Wireless network range doesn’t stop at the property line.

Default device and network ID settings allow intruders to enter the network.

Internet bandwidth can be stolen Computers can be vulnerable to hacker

intrusion and takeover.

Wireless network range doesn’t stop at the property line.

Default device and network ID settings allow intruders to enter the network.

Internet bandwidth can be stolen Computers can be vulnerable to hacker

intrusion and takeover.

Page 22: Lecture - Unit 8

22

Computer Threat - VirusesComputer Threat - Viruses

A program that attaches itself to another program and spreads itself to other computers

Viruses are hidden within the code of a host program

A program that attaches itself to another program and spreads itself to other computers

Viruses are hidden within the code of a host program

Page 23: Lecture - Unit 8

23

How Does a Computer Catch a Virus

How Does a Computer Catch a Virus

Viruses copy themselves

Infect a file on your computer

Viruses spread by sharing disks

E-mail attachments are the most likely source of a virus

Viruses copy themselves

Infect a file on your computer

Viruses spread by sharing disks

E-mail attachments are the most likely source of a virus

Page 24: Lecture - Unit 8

24

What Viruses DoWhat Viruses Do Replicate themselves:

Slow down networks

Secondary objectives: Annoying messages Delete files on the hard drive Change computer settings

Replicate themselves: Slow down networks

Secondary objectives: Annoying messages Delete files on the hard drive Change computer settings

Page 25: Lecture - Unit 8

25

Antivirus SoftwareAntivirus Software Programs designed to detect viruses:

Scan files looking for virus signatures (unique code) Provides options for deleting or fixing infected files Inoculates files against further infection

Detect known viruses Antivirus programs need to be updated frequently

Programs designed to detect viruses: Scan files looking for virus signatures (unique code) Provides options for deleting or fixing infected files Inoculates files against further infection

Detect known viruses Antivirus programs need to be updated frequently

Page 26: Lecture - Unit 8

26

Trojan HorseTrojan Horse

Refers to Greek Mythology Appears to be something it is not Not self-replicating Leaves a back-door Zombies - Botnets

Refers to Greek Mythology Appears to be something it is not Not self-replicating Leaves a back-door Zombies - Botnets

Page 27: Lecture - Unit 8

27

WormsWorms

Self-replicating Stand alone Targets networks

Self-replicating Stand alone Targets networks

Page 28: Lecture - Unit 8

28

Online AnnoyancesOnline Annoyances

Spam – electronic junk mail Pop-ups – intrusive advertising Cookies – tracking user’s browsing habits Spyware – programs that collect data from a user’s

computer Malware - software that has a malicious intent Phishing and Hoaxes – Ruses to fool and maybe

steal from users

Spam – electronic junk mail Pop-ups – intrusive advertising Cookies – tracking user’s browsing habits Spyware – programs that collect data from a user’s

computer Malware - software that has a malicious intent Phishing and Hoaxes – Ruses to fool and maybe

steal from users

Page 29: Lecture - Unit 8

29

SpamSpam

Junk e-Mail Spam filters Antispam

practices

Junk e-Mail Spam filters Antispam

practices

Page 30: Lecture - Unit 8

30

Pop-upsPop-ups

Usually advertising Pop-up automatically Pop-up blockers

Usually advertising Pop-up automatically Pop-up blockers

Page 31: Lecture - Unit 8

31

Cookies Cookies

Text files stored on client computers when visiting Web sites

Used on return visits to Web sites

Unique ID number Personal information

remembered Privacy risk

Selling information

Text files stored on client computers when visiting Web sites

Used on return visits to Web sites

Unique ID number Personal information

remembered Privacy risk

Selling information

Page 32: Lecture - Unit 8

32

SpywareSpyware Added as a program

piggybacked with a requested program

Gathers information, usually about surfing habits

Antivirus software doesn’t detect it

Spyware removal programs are required

Added as a program piggybacked with a requested program

Gathers information, usually about surfing habits

Antivirus software doesn’t detect it

Spyware removal programs are required

Page 33: Lecture - Unit 8

33

Phishing and HoaxesPhishing and Hoaxes

Phishing is a phony communication Attempts to scam someone into sending vital

information Hoaxes are attempts to scam people into sending

money, or join a chain letter

Phishing is a phony communication Attempts to scam someone into sending vital

information Hoaxes are attempts to scam people into sending

money, or join a chain letter