Ch 19 Networks

download Ch 19 Networks

of 16

Transcript of Ch 19 Networks

  • 8/2/2019 Ch 19 Networks

    1/16

    Chapter 19 ICT5

    A network exists when 2 or more

    computers are connected to each

    other by cable, telephone lines orwireless communication.

  • 8/2/2019 Ch 19 Networks

    2/16

    Recap from ICT2 Chapter Ch20:

    Advantages

    Share peripherals (cheaper)

    Share datafiles (all haveaccess to the latest info)

    Electronic communicationbetween computers such ase-mail and EDI

    Software held centrally so

    only installed once Security and backup

    controlled centrally bynetwork manager

    Disadvantages

    If client/server networkthen if fileserver fails thenall computers will fail

    Network open to moreexternal threats if attachedto a WAN eg Internet

    Network may be slow if

    much network trafficitdepends on speed ofconnection

    Viruses spread quickly

  • 8/2/2019 Ch 19 Networks

    3/16

    Recap Types of Network:

    Client/Server

    Backup easy to perform asjust backup fileserver harddisc

    Used on large star or bus

    network topologies Most data files andsoftware stored on thefileserver only

    Users set up centrally withappropriate access rightsand disc space on fileserver

    Powerful central computer

    needed called a fileserver

    Peer to Peer

    Backup has to be donefrom each workstation -YUK

    Used with small ring

    network topologies Software stored on each

    workstation

    Users can access data files

    & peripherals on otherworkstations if haveappropriate access rights

    No fileserver, all

    workstations are equal

  • 8/2/2019 Ch 19 Networks

    4/16

    Recap Network Topologies:

    Star

    Central fileserver connects to all the other workstationsvia a hub. Each workstation has its own cable to the hub(Large networks use this method)

    BusAll workstations are connected via one central cable andall data is transmitted both ways across it (Used for asmall LAN)

    RingAll workstations and peripherals are linked together in acircular configuration and all data is transmitted one wayacross it. (Used for a small LAN) see back pages

  • 8/2/2019 Ch 19 Networks

    5/16

    Network Security needs to consider:

    Staff- Security on a network is only as good as

    its weakest linknormally its staff!! Must have acorporate policy on security supported by Senior

    Management and appropriate disciplinary

    procedures to back it up.Viruses and illegal software spread easily

    especially if backing storage drives and USB ports

    are active and employees have Internet and e-mailaccess

    Unauthorised access to data files from hackers

    Hardware failure need backup (see Ch15)

  • 8/2/2019 Ch 19 Networks

    6/16

    Preserving Network Security

    1. Physical securitylocks on doors and equipment

    restricts access to authorised personnel only.2. Security of backing storagelocking mechanisms on

    floppy discs and tapes to prevent overwriting data.

    3. Restrict peripheral use - only allowed to print to certain

    printers, access certain backing storage drives eg CD

    drive, local hard disc etc

    4. Restrict access to data files and foldersNo access; read

    only; read/write access; full access.5. UserIDs and passwordsnecessary for 3 and 4.

  • 8/2/2019 Ch 19 Networks

    7/16

    Staff and Passwords

    1. Only acceptable words should be used

    Dont use anything obvious not a meaningful word.The operating system can monitor thismust be over acertain length, must contain a mixture of upper &lowercase letters & numbers.

    KEEP IT SECRET. Change frequentlythe OS can make you change it after

    a set period

    OS can lock person out after 3 attempts at password

    Have password protected screen saver so can leaveworkstation logged on if essential.

  • 8/2/2019 Ch 19 Networks

    8/16

    Illegal access through a WAN

    1. Use a firewalla system placed between an internal and

    external network that monitors all network traffic comingin and out of the internal network. Only authorised trafficis allowed through. It also filters e-mail and Internetrequests from certain sites.

    2. Use data encryptioncodes data so it can only berecovered by someone who has the encryption key

    3. Use a call back system so your network makes contactwith another computer system instead of their system

    contacting your system (Prevents hackers masqueradingas legitimate systems)

    4. Maintain up-to-date anti-virus software

  • 8/2/2019 Ch 19 Networks

    9/16

    Duties of a Network Manager

    1. Installing software centrally or on individual

    workstations. Ensure correct licensing

    2. Allocating and maintaining user accounts ofuserIDs, access rights and resource usage

    3. Make regular backups (See Ch15)

    4. Running and updating anti-virus software

    5. Auditing the network by tracking the way

    employees use it.

  • 8/2/2019 Ch 19 Networks

    10/16

    Network Audit Software

    1. It is a key software tool for hunting down fraud andcomputer misuse within an organisation. It helps toensure an organisation conforms to its security policy.

    2. All logins and attempted logins are recorded so illegalattempts at a particular workstation are recorded. Thisalso applies to access to datafiles

    3. Audit software monitors the number of users on a pieceof software at one time and so prevents more users thanthe licence agreement allows.

    4. It produces an audit log. This is used find computermisuse by staff and can also be used as networkaccounting software to charge departments for computertime and resources

  • 8/2/2019 Ch 19 Networks

    11/16

    An audit log records the following:

    1. Who is using the system

    2. What workstation they are using3. Data and time of access

    4. What programs they are using

    5. What files have been opened, modified and deleted

    6. How many reads and writes have been excuted. Howmany times the server as been accessed

    7. Failed log on attempts

    8. Websites accessed and time spent there.9. Summary reports can be produced of the above for a

    single user or groups of users such as a department

    Read Question:

  • 8/2/2019 Ch 19 Networks

    12/16

    Network accounting Software

    Is used to monitor network usage by individualdepartments. For each user the networkmanager can:

    Allocate a maximum amount of hard disc space

    Allocate a maximum amount of printer credits

    Restrict login to a time of day and workstationReports:

    Summary reports are produced per departmentcharging for printer use, processor time, backing

    storage, network traffic.Usage trends that can be used to plan futureservice provision eg bigger fileserver hard discneeded

  • 8/2/2019 Ch 19 Networks

    13/16

    Network User Interface

    Security enforced centrally, must have

    ID&passwordDifferent desktops and software mandatory

    for different types of user to stop

    customisation and creates a consistentcorporate image. Also any member of the

    department can use the workstation.

    The user has more available backingstorage drives

    Shared printers so need to choose the right

    one

  • 8/2/2019 Ch 19 Networks

    14/16

    Question Page 207 Q1

    (a) Describe two changes that may be evident to anend-user when they change over from using a stand-

    alone computer to a networked environment. 4m

    (b) A multinational company has recently created anIntranet, connecting all of its computer systems. Allits sites are now connected using high-speed

    dedicated links.(i) Describe one facility that could now be made

    available to the company which would improveproductivity. (2 marks)

    (ii) Describe two possible problems that may ariseas a result of using this computer network (4m)

    (iii) Describe two possible measures that thecompany can take to combat problems caused by

    the use of this type of network. (4 marks)

  • 8/2/2019 Ch 19 Networks

    15/16

    Answer Page 207 Q1

    a)login screen(1) user now has one more stage to completebefore they are able to use their system(1): More disk drives onscreen(1) user now has access to drives that are logical rather

    than physical(1):Less control over the interface(1) e.g. inabilityto customise (1) etc

    B i) Video-conferencing (1) managers will be able to see eachother without the need for travel costs/long arrangement times(1) OR Ability to share hardware resources (1) means that less

    hardware needs to be purchased (1) etcii) Risk of unauthorised access (1) meaning potentially

    sensitive/confidential information may be accessible (1) Risk ofviruses (1) all workstations need to have up to date anti-virus

    software (1) etciii)Provide user login and password (1) to make it more difficultto enter the system if not authorised (1): Set up requiredprocedures (1) so that users know the tasks that need to becarried out to maintain system security/integrity(1):Use up to

    date anti-virus software (1) + example (1) Use a firewall (1)e. . to rovide a filter on traffic comin in/ oin out 1 etc

  • 8/2/2019 Ch 19 Networks

    16/16

    What students have problems with:

    Dont understand the network is a service

    function in a business so needs to:

    Charge departments for service

    Audit for misuse and future provision Have standard user interface

    Also dont seem to understand the jargon