14
BSAD 104 Computer Security Online Communication Cloud Computing

Bsad 104 Network and Computer Security Online Communication cloud computing

  • Upload
    msdenee

  • View
    237

  • Download
    4

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Bsad 104 Network and Computer Security Online Communication cloud computing

BSAD 104Computer Security

Online CommunicationCloud Computing

Page 2: Bsad 104 Network and Computer Security Online Communication cloud computing

Types of NetworkTypes of NetworksPeer-to-peer network (P2P)

Connects two or more computers without going through a central server computer

Used in home network or small businessClient-Server Network

Client (user) connects to server (central computer) Server manages disk drives, printers, and network traffic Server holds copy of application program

04/09/2023 06:17 PM 2

Page 3: Bsad 104 Network and Computer Security Online Communication cloud computing

Compare Client-Server/P2Pfrom http://www.webexploits.co.uk/2010/03/peer-to-peer-and-effects-on-network_02.html

04/09/2023 06:17 PM 3

Page 4: Bsad 104 Network and Computer Security Online Communication cloud computing

Network termsHub is used in local area network (LAN)

network. LAN are not an opened network. Can connect LANs.

Data packet goes to one port on hub and hub copies to all other ports

Hub can be overwhelmed by network traffic as can not direct data packet to hub instead copies everything to all ports, which can slow network traffic

04/09/2023 06:17 PM 4

Page 5: Bsad 104 Network and Computer Security Online Communication cloud computing

Network termsSwitch sorts and distributes data packets

between devices in wired setting such as a LAN

Switch costs more than hubRouter routes data packets for both wireless

and wired data and determines most efficient route to take data

Router can also serve as a gateway that connects LANs, WANs and internetRouter can be wireless (antennae) vs. wired

(no antennae)04/09/2023 06:17 PM 5

Page 6: Bsad 104 Network and Computer Security Online Communication cloud computing

Images Hub, Switch from (

http://helpdeskgeek.com/networking/router-vs-switch-vs-hub/)

Hub Switch

04/09/2023 06:17 PM 6

Page 7: Bsad 104 Network and Computer Security Online Communication cloud computing

Images Wired Router, Wireless Router from http://helpdeskgeek.com/networking/router-vs-switch-vs-hub/ and http://www.google.com/imgres?hl=en&biw=1600&bih=1099&tbm=isch&tbnid=lEGPKVBaG49RvM:&imgrefurl=http://www.bitsy.biz/wired-router-wrt614-p-697.html&docid=86n9QyPTWJZ0rM&imgurl=http://www.bitsy.biz/bizgraphics/RP614.jpg&w=600&h=532&ei=uPczUNrkMOXy8QHtmIFg&zoom=1&iact=hc&vpx=872&vpy=551&dur=337&hovh=181&hovw=209&tx=56&ty=142&sig=106451797350112111161&page=1&tbnh=168&tbnw=197&start=0&ndsp=45&ved=1t:429,r:30,s:0,i:171Wired Router Wireless Router

04/09/2023 06:17 PM 7

Page 8: Bsad 104 Network and Computer Security Online Communication cloud computing

Tips for Using Wi-FiDo not log into financial institutions or credit

card accountsDo not automatically save and store

passwordsDisable Wi-Fi when doneWhen setting up wireless network, use a

encryption methodHave firewall on computer (Start/Control

Panel/System and Security/Windows Firewall) and router

04/09/2023 06:17 PM 8

Page 9: Bsad 104 Network and Computer Security Online Communication cloud computing

Definitions of VirusesMalware stands for malicious software and

can include the following programsVirus—program that causes harm to computer

Needs human interaction to pass along such as USB drive or email attachment

Worm—copies itself to other computers without your awareness or involvement Attacks networks by slowing them down by using

massive amounts of bandwidth Attacks vulnerabilities in O/S

04/09/2023 06:17 PM 9

Page 10: Bsad 104 Network and Computer Security Online Communication cloud computing

Definitions of VirusesMalware stands for malicious software and

can include the following programsTrojan Horse—form of malware that acts as useful

program when not Can’t replicate itself on own but can be very

destructive Copies keystrokes to get into computer system

without knowledgePhishing

E-mail scam that acts from legitimate source (e.g. bank) to gain access to your user account information (e.g. e-mail from bank)

Can use e-mail, social media, online chats, or text messages to gain access to your accounts04/09/2023 06:17 PM 10

Page 11: Bsad 104 Network and Computer Security Online Communication cloud computing

Protect Against VirusesUse Anti-virus software like AVG or Microsoft

Security EssentialsUse Anti-virus software that has spyware

protectionHave firewall on your computer and router

onHave virus do deep scan once a week in off

hours as takes long timeDownload files and scan with virus protection

softwareDo not opened attachments from individuals

do not knowStay away for suspicious e-mails or e-mails

from bank

04/09/2023 06:17 PM 11

Page 12: Bsad 104 Network and Computer Security Online Communication cloud computing

Other termsCookies—small file saved on your computer

that remembers your login information or shopping preferences for websites

Spam—unwanted emailUsually email software has way to filter into

folder that is junk folderCloud computing—using Internet to host

applications or file storage

04/09/2023 06:17 PM 12

Page 13: Bsad 104 Network and Computer Security Online Communication cloud computing

Companies offering Cloud ComputingCompanies offering storage space or file

applicationsGoogle (e.g. Google Docs for application and

store files on Internet)Dropbox—store filesMicrosoft SkydriveAmazon—Cloud Player for music

04/09/2023 06:17 PM 13

Page 14: Bsad 104 Network and Computer Security Online Communication cloud computing

E-mail EtiquetteUse Signature LineUse Subject Line so not think a virusUse Proper Greeting at start of message like

Dear Mrs JonesBe conciseDo not use All CapsUse spell checkerProofreadUse humor sparingly

04/09/2023 06:17 PM 14