Network And Recognize The Common Network Types.pptx
NoureldinIdris
16 views
50 slides
Oct 14, 2024
Slide 1 of 50
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
About This Presentation
Network And Recognize The Common Network Types
Size: 127.08 KB
Language: en
Added: Oct 14, 2024
Slides: 50 pages
Slide Content
Network There are several common types of network, enabling people in a variety of locations to connect their computers together.
Network And Recognize The Common Network Types In computing terms, a network is a collection of computers connected together .the most common types of network are local area network, wide area network and virtual private network . Local Area Network (LAN ): A LAN consist of several computers connected together, so they can share files (documents and applications) and computer equipment (for example, printers) as well as being able to exchange e-mail. LAN are usually confined to a small geographic area, such as an office or building. They can be connected to each other over telephone lines and radio waves. Workstations and personal computers in an office are commonly connected in a LAN. This allows individual users to send or receive files and to share access to files, peripherals and data.
Wireless local area network (WLAN) A WLAN in a LAN where the computers and equipment are connected together wirelessly for example, using a router to transmit data between equipment . Wide Area Network(WAN ): A WAN consists of several computers connected together over high speed, long distance communications cables or satellites, to share files and computer equipment and exchange e-mail. A WAN connects computers across a large geographic area, such as city or country. The internet is an example of WAN.
Virtual Private Network (VPN) A VPN is a network that allows users who are not connected directly to their organization's network (for example through a LAN or WAN) to connect to the organization's network and access the computers, drives and folders to which they have logon rights. This can be useful for users who travel extensively in their work or who are located in remote offices. The VPN uses a public telecommunication infrastructure most commonly the internet to connect authorized users securely and reliably to their organizations network. This is known as a 'virtual connection' the data sent and received via this connection will be encrypted, so it cannot be read by anyone who attempts to intercept it.
Role Of The Network Administrator: Network administrators manage networks for all users. in this role, they ensure that three main areas of security are in place regarding network usage, in line with the ICT policy of the organization. . These areas are: Authentication: Ensuring that any user or service that attempts to use the network is who or what they say they are. Although a user name and password are the most common form of authentication used today for computer access, biometric identification can also be matched against a database of records to ensure that people are who they claim to be.
Authorization : Giving each user or service to the appropriate data in the network .authorization is the process of verifying that an authenticated subject has the authority to perform a specific operation. Authentication must therefore precede authorization. Accounting Checking what dose data each user or service has accessed. The day –to day tasks of the network administrator are involved with the installation, update and maintenance of software and hardware for the network.
Function And Limitations Of A Farewell A firewall is hard ware or software designed to protect private computer systems and networks from unauthorized external access. Any incoming or outgoing computer traffic has to meet a predefined set of rules in order to be allowed past the firewall. Firewalls are used by schools, corporations, banks, and research facilities on the internet and on intranets, to keep hackers and crackers out. Home PCs which are connected to the internet should also use a firewall, to protect the data stored on each of the PCs within the home .if any of the computers in a network is not contained within the firewall, the entire network is at risk. You may also find that some legitimate traffic is restricted by the settings of the firewall. It is important to be aware that firewalls cannot protect systems from malware contained within files or programs, or protect against attacks by authorized users within the network .also, a firewall will not automatically alert you if someone attempts to hack into your network.
Network Connections: Dependent upon your location, there is a choice of using cable or a wireless connection to connect to your network. You need to be aware of the security implications when connecting to the network. Recognise The Options For Connecting To A Network: Once a network is set up, the most common method for users to connect to it are cable or wireless.
Cables are used to connect each computer to the modem or router that connects to the internet. Cabling is a good method to use when the computers to be connected are physically close to the modem or router. Wireless routers ad access points are available, to which computers can connect via a wireless network adaptor in each computer. Wireless connection dose away with the need to run cables from each computer to the router. However, each computer must be close enough to the router to pick up the wireless signal.
How Connecting To A Network Has Implications For Security When you connect to a network, you need to be aware of the security implications concerned with malware, unauthorized data access and maintaining privacy. Malware: You should remember that other computers connected to your network may be infected with malware, which could then infect your computer. Unauthorized data access: f a public or private network does not have adequate security, such as a password to access it, the network can be accessed by other users, and the information on the network will be available to the these unauthorized users.
If you send information across an unsecured network, the information is also visible to other users. If you have to use an unsecured network, ensure that any information you send across it is encrypted. This means that the information is encoded before it is sent and decoded when it is received, so that only the intended recipient can read it.
Maintaining Privacy: A public network is a computer network owned and used by public enterprises .it is visible to computers outside the network, and users of these computers can communicate with the network. It enables resource sharing by its users. This increases the challenge of maintaining privacy. Wireless Security: There are different types of wireless security available some of which are more secure than other.
Recognize Different Types Of Wireless Security: Requiring user enter a network key ( or password) in order to access a wireless network will ensure that only authorized user can access the network and the data contained on the network . Recognize Different Types Of Wireless Security: The following are types of wireless security that people use when connecting to wireless network: Wired Equivalent Privacy (WEP ): WEP security requires users to set up a network security key, which must be entered by anyone wishing to access the network. The network security key encrypts information sent across the network, therefore the information can only be decrypted and accessed by other network users if they know the network security key.
Wi-Fi Protected Access (WPA): WPA provides an additional level of security to WEP. In addition to encrypting information, WPA checks that the security key has not been modified and also authenticates users who are accessing the network. Media Access Control (MAC) MAC is a technology that provides identification for each computer on a network, via a unique number assigned to the network card in each computer. This number is known as the MAC address. Part of the MAC address is based on the serial number of the network adaptor.
Be Aware That Using An Unprotected Wireless Network Can Allow Wireless Eavesdroppers To Access Your Data An additional security issue wireless networks is that they may be visible to other user who have a wireless adapter in their computer, who could then access the data on the network. Security can be set on wireless networks so that they are either invisible to external users or so that they can only be accessed with the network key. Access Control: Controlling access to networks helps to protect the data held on the network. You need to know measures for access control.
Understand The Purpose Of A Network Account And How It Should Be Accessed Through A User Name And Password
When many computers are connected together, or 'networked', such as in a school or large business and over the internet, this enables users to share information. However, without adequate protection, this also means that your information is at risk from unauthorized access. Network can be set to recognize the user who is logging on and limit that user’s access to certain areas – this is done using a unique user "login" (or ID) name . Having an individual user login name can restrict or encourage sharing saved information on the network. These access right are important. Don’t let someone else log in as you – this gives them the ability to open, read, delete, change and publish documents under your identity risky!
Recognise Good Password Policies You should never share your password with anyone else, as this may enable them to log in as you .it is also important to change your password regularly, to ensure that they do not accidentally become known to other user. When changing your password you should ensure that they are well thought out: The password must be easy enough for you to remember but not obvious enough for anyone else to guess! Passwords should be a minimum of eight characters.
Randomly generate combination of numbers, letters and symbols make the best password. However, you could try typing a favorite word backwards, deliberately leaving out a letter or including a number. Some password are "case sensitive" which means they recognize the different between capitals and lower case lettering - use this to your advantage and use a combination of both.
Identify Common Biometric Security Techniques Used In Access Control Biometric authentication is the recording of people’s physical features that are unique to each individual, in order to recognize and identify them in the future. This can ensure that only authorized users can access information systems or restricted areas. The main techniques used are:
Fingerprint scanning: This technique records the unique patterns that make up each user's fingerprint. It is a popular and inexpensive solution, used on laptop and desktop computers to restrict to networks and information systems, and on flash drives, to protect data. Facial recognition: This technique records features such as the distance between eyes and the height of an individual's cheekbones. Voice recognition: This technique records the pattern of an individual's voice, and checks that this pattern matches when the individual wishes to access an information system or restricted area in the future. Eye scanning: This technical records the unique pattern in an individual's iris. A scanner can then be used to confirm the identity of the individual, based on this pattern.
Secure Web Use This section deals with the security issues you may encounter when using the internet. These issues may affect your personal and financial security.
Be Aware That Certain Online Activity Should Only Be Undertaken On Secure Web Pages You would not give a complete stranger your home address and credit card distils. You should therefore be aware of how to protect yourself against fraudulent dealings when shopping online or carrying out financial transactions, online banking and fund transfers on a website. These activates should only be carried out on secure web pages.
Identify A Secure Website: There are some things you can look for, when accessing websites, that will help you to ensure that the site is secure and protect you from fraud when making purchases from a website.
HTTPS : HTTP is the communications protocol used by many sites to transfer information across the internet. in order to ensure additional security where payment over the internet is required , many sites now use HTTPS (hypertext Transfer Protocol over Secure Socket layer) HTTPS gives an additional layer of encryption and authentication in the transfer of information via HTTP. For your own security, look for HTTPS in the URL of any site you are using to make payments over the internet.
The lock symbol When making a purchase online, you are required to give two sets of personal details – your delivery information and your credit card information. Both sets of information should be handled by different parties – for their own protection as well as yours. Look for the padlock on the key symbol in the address bar of the website you are using – this guarantees the security of the information.
Be Aware Of Pharming Pharming is the practice of installing malicious code onto user's computers, to redirect them from legitimate websites to fake websites. Unlike, where personal and financial information can only be obtained if each individual user replies to or clicks on a link in an e-mail they have received, pharming affects all users of a system, by changing information on their host file or DNS (domain name system) server.
For legitimate websites, the host file or DNS server will direct users to the correct website when they type a web address into their internet browser. The web address (such as www.astonswann.co.uk ) is converted into a number string (such as 192.168.1.1), which directs the user to the correct web page. A pharming attack (which could be contained in an e-mail sent to just one user on a system) corrupts the host file or DNS table by redirecting web address to bogus number string. The websites to which people are redirected will look legitimate, causing them to enter personal information onto these bogus sites. If this attack is carried out on the DNS table, it will affect all users of the DNS server.
DIGITAL CERTIFICATE, VALIDATE A DIGITAL CERTIFICATE A digital certificate is used in conjunction with encryption to enable the safe transfer of sensitive information during online transaction. Digital certificates are a digital form of identification which are issued by a third party, known as a certification authority (CA). The digital certificate contains a unique public key belonging to the individual certificate owner, which proves the authenticity of the certificate. The CA guarantees, for a specific period of time that the public key in the certificate dose belong to the certificate owner. The CA also signs the certificate with its own public key.
Digital certificate are widely used when a web browser needs to connect to a secure website, Digital certificate can also be included in the transmission of an encrypted massage to prove that the sender is the persons he or she claims to be .the user receiving the encrypted information can validate the digital certificate by obtaining the CA’s public key, to determine that the specified CA has signed and guaranteed the certificate’s authenticity.
ONE –TIME PASSWORD A one - time password is a password that is only valid once. This could be to log in to an information system, or to give you the authority to carry out a financial transaction. Because the password to be used changes each time the action is performed, it will not be possible for malware programs to record and use it.
One example of one – time password is that used by some banks when clients wish to carry out financial transactions online. The client is given a security card and card reader that are synchronized with the bank. Each time they carry out a transaction, the password to be entered for that transaction is shown on the card reader. Other one-time password can be delivered by text massage, mobile phone program, USB token or on paper.
Select Appropriate Settings When Completing A Form Autocomplete can be used be complete automatically fields that you frequently enter on the internet, such as website addresses in the address bar, or your name and address details in forms .it can also be used to auto save your user names and passwords that you enter into forms. This can be a time saving feature, however, it should never be used on public computers, or computers that may be used by someone else, as it could give them access to your confidential websites.
Cookie Cookies are small files, containing information about your previous visit to a website, such as your preferences. These are stored on your computer, to enable quick, customized access to these websites when you visit them. Cookies are generally safe, but they can be blocked or deleted whenever you wish.
First party cookies are created by the website you are vesting. They often store information that will be used next time you visit the site. Many websites contain advertisements from other websites, such as pop –up ads and banner ads. Some of these ads contain Third party cookies, which can be used to track your web use for marking purposes.
Session cookies are temporary cookies, used to store information such as the items currently in your shopping basket when you are internet shopping. These cookies are removed from your computer when internet explorer is closed.
Delete Private Data From Browser: Details of your browsing history and temporary Internet files are stored on your computer each time you visit a website, they can speed up revisits a site, as they hold much of the information you need to reload the web pages. These files do take up space on your computer, so it is possible to delete them if you wish to free up space. It is also possible to delete cookies, auto complete data and saved passwords, if you wish to remove the personal information that is stored on your computer. When deleting temporary internet files and cookies, it is possible to retain the information relating to any of your favorites websites, in order to speed up access to these favorite sites.
PURPOSE, FUNCTION AND TYPES OF CONTENT-CONTROL SOFTWARE
The internet is a resource to access information about an unlimited number of subjects. However, because it is possible for anyone to upload content onto the internet, it is impossible to regulate the content of every site. Some sites will contain malware and some sites will have content that is not suitable for everyone_ such as pornography, sexually explicit information and language invoking hostility towards different races, genders, religions, nationalities or ethnic origins. Other sites relate to bomb-making, weapons, drugs, alcohol, tobacco, and gambling.
For this reason, software is available to limit access to sites based on their content : Internet filtering software: Internet filtering software protects computers, networks and companies from malware, inappropriate content and security breaches by limiting access to and monitoring use of websites. Parental control software: Parental control software limits the content of different websites available to children, based on the categories above. It can ensure that ‘safe search’ is always selected for any search engine that the child uses. Time restriction can be set, to allow web access only at designated times.
Parents can view reports of their child’s internet access. The following are some suggestions for parents to keep their family safe online: 1.Keep computers in a central place where you can be aware of your children’s activities. 2.Know where your children go online. Use the internet with young children. For older children, talk about the types of sites they visit, and what is not appropriate for your family. You can check where they have been by looking at the history in your browser menu. You might consider using filtering tools, such as Google Safe Search. 3.Teach internet safety It is difficult to monitor all online activities; however , you can make sure they know how to use the internet safely and responsibly on their own.
4.Use privacy settings and sharing controls, This is important when you or your children share personal information such as: names, addresses, or phone numbers on public sites. Teach your children to respect the privacy of friends and family by not identifying people by name in public profiles and pictures. 5.Show your children how to: •Protect passwords •Beware of strangers •Prevent viruses •Communicate responsibly If you can’t say it to someone’s face, do not text it, e-mail it, instant massage it, or post it as a comment on someone’s page. •Distinguish reliable sources from unreliable ones
Social Networking It is important to know how to control your privacy when using social networking sites, in order to protect your personal and financial safety.
Importance Of Not Disclosing Confidential Information On Social Networking Sites Online communities and other social networking sites, where you share information with others, can be very useful and great fun. However, it is vital to ensure that you take precautions when imparting this information. It is very easy to make public personal information that could be used fraudulently or dangerously against you, Such as your birthday, address, PIN numbers or other information that could be used to impersonate you. You should also never divulge confidential company information, and client details, that could be used by competitors.
Be Aware Of The Need To Apply Appropriate Social Networking Account Privacy Sittings
To ensure that you do not disclose personal and confidential information, you should be aware of the following: •Make your profile private (only available to users you invite to view it). •Limit the amount of personal information you post (do not give away, eg : your birthday, address, phone number). •Be aware that posted information is publicly available. •Be wary of strangers.
Potential Dangers When Using Social Networking Sites As well as ensuring your privacy on social networking sites, you should be aware that there are potential dangers associated with these sites: Cyber bullying: It is when one person or a group of people try to threaten, upset or harass someone else using electronic methods, such as the internet. Creating profiles on social networking sites, in order to make fun of someone, or posting and responding to nasty massages on social networking sites, are forms of this that can cause great upset to other people.
Grooming: In relation to the internet, grooming is when an adult uses the internet to befriend a young person; with the intent of gaining the young person’s trust and persuading them to carry out inappropriate behavior. When using social networking sites, you should be wary of strangers attempting to befriend you, as they may not be who they seem to be.
Misleading \ dangerous information: Because users of websites can post any information they like, it is important to evaluate anything you read on any website, including social networking sites, in order to decide if this information is correct. Incorrect information can be misleading or even dangerous if you act upon it. You should check the authenticity, reliability and validity of any information, as well as its objectivity and relevance to you.
False identities: Anyone can create a social networking profile, pretending to be someone they are not. You should be wary of users creating such profiles, as a mean of contacting and interacting with you in order to obtain private information about you. Fraudulent links or messages: As with e-mail massages containing viruses or phishing links, social networking users can post fraudulent messages, which could link an unwary user to a bogus website or download malware onto their computer.