Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe...

33
Technology in Technology in Action Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Transcript of Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe...

Page 1: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Technology in ActionTechnology in Action

Chapter 7

Networking and Security:Connecting Computers and Keeping Them Safe from

Hackers and Viruses

Page 2: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Chapter Seven ObjectivesChapter Seven Objectives• Networks

– Client/Server– Main components– Common types

• Hackers and harm

• Firewall

• Viruses

• Protection

Page 3: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Networking FundamentalsNetworking Fundamentals

• Definition

• Benefits

• Internet share

Page 4: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Network ArchitecturesNetwork Architectures

• Nodes

• Peer-to-peer

• Client/Server

Page 5: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Networks and DistanceNetworks and Distance

• LAN

• WAN

Page 6: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Data Transmission MediaData Transmission Media

• Twisted pair

• Coaxial

• Fiber optic

Page 7: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Data Navigation DevicesData Navigation Devices

• Packets

• Routers

• Hubs

Page 8: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Networking SoftwareNetworking SoftwareFor peer-to-peer

For client/server

Page 9: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Peer-to-Peer Network TypesPeer-to-Peer Network Types

• Power line

• Phone line

• Ethernet

• Wireless

Page 10: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Power Line NetworksPower Line Networks

• Uses house wiring– Max at 14 Mbps

• Power line network adapter– USB or Ethernet

• Plug and play– Software

• Routers and hubs • Uses phone lines

and jacks– Sharing with

phones– Max at 10 Mbps

• HPNA adapter or USB

• Routers and hubs

Page 11: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Ethernet Networks Ethernet Networks

• Most efficient– Usual speed at 100 Mbps

• Use unshielded twisted pair cable (UTP)

• Use routers and hubs

• Use NICS (network interface cards)

Page 12: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Ethernet CablingEthernet Cabling

• Installation, distance

• UTP categories

Cable CategoryMaximum Data Transfer Rate

Category 5 (CAT 5) 100 Mbps

Category 5E (CAT 5E) 200 Mbps

Category 6 (CAT 6) 1000 Mbps (1 Gbps)

Fig 7.11

Page 13: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Ethernet ArchitectureEthernet Architecture

• Hubs

• Routers– DSL/cable routers

• Internet

Page 14: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Wireless NetworksWireless Networks

• Radio waves, not cabling

• Wi-Fi – Several IEEE standards

• Wireless network adapter

• Transceiver

Page 15: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Wireless ConsiderationsWireless Considerations

• Range, signal degradation

• Node positions– Wireless access point

• Internet connection– Wireless DSL/cable routers

Page 16: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Peer-to-Peer QuestionsPeer-to-Peer Questions

• Existing wiring?

• Wireless also?

• How fast?

• Budget?

Page 17: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Comparing Home Networks Comparing Home Networks

Factors: Power Line

Phone Line

Ethernet

Wireless

Maximum data transfer rate (throughput)

14 Mbps

10 Mbps

100 to 1000 Mbps

11 to 54 Mbps

Approximate cost to network two computers (adapters and wiring only)

$160 $120 $135 $225

Additional cost for adding Internet connection sharing

$80 $120 $0 $40

Approximate cost to add a computer to network

$80 $60 $40 $60

Page 18: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Configuring Home Network Configuring Home Network SoftwareSoftware

• With XP

• With OS mix

• Without XP

Page 19: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Computer SafetyComputer Safety

• Cybercrime

• Cybercriminals

Page 20: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Computer Threats: Hackers Computer Threats: Hackers

• White hat

• Black hat

• Script kiddies

Why Hack?Credit cards

Packet sniffer

Identity theft

Page 21: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Safety TipsSafety Tips

• Hide passwords, pins

• Personal info

• Passwords:– Numbers and letters

– Obscure letter combinations

• FTC Identity Theft

Page 22: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Hacker ActivitiesHacker Activities• Trojan horses

– Far-reaching damage

– Back-door programs

• Denial of service

• Distributed DOS• Hacker access:

– Directly– Via logical ports

Page 23: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Firewall ProtectionFirewall Protection

Software– Easy, port protection

Hardware

Page 24: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Firewalls…Firewalls…

• Block ports

• Hide network address

• Use packet-filtering

• Use NAT

Page 25: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Computer-At-Risk TestingComputer-At-Risk Testing

• Free test fromGibson Research Corporation

Page 26: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Computer VirusesComputer Viruses

• Definition

• Kinds of damage

• Virus sources

Page 27: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Computer Viruses: TypesComputer Viruses: Types

• Grouped by behavior and method of transmission– Boot sector

– Logic bombs

– Worms

– Script and macro

– Trojan Horses

Page 28: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

How Viruses Avoid DetectionHow Viruses Avoid Detection

• Polymorphic

• Multi-partite

• Stealth

Page 29: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Antivirus SoftwareAntivirus Software

• Norton

Page 30: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Antivirus SoftwareAntivirus Software

• Virus signatures

• Known viruses

• “Signature” updates

Page 31: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Other Security MeasuresOther Security Measures

• Update OS– System updates

– Security patches

Page 32: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Networking and Security Networking and Security Topic SummaryTopic Summary

• What is a network– Advantages

• Difference between a client/server network

and a peer-to-peer (P2P)

• Main network components

• Common home networks

• Power line networks

• Phone line networks

Page 33: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.

Networking and Security Networking and Security Topic SummaryTopic Summary

• Ethernet networks

• Wireless networks

• How hackers attack– Harm

• Firewall– How does it keep a computer safe

• Viruses

• Protection