A collection of two or more computers which are connected together (either using wires or wirelessly)
area such as room or a building Privately owned networks transmission media are privately owned
as connections between the branches of an organization and its head office. Connectivity obtained through a service provider
Bluetooth
Why is it called Bluetooth?
Harald Bltand was king of Denmark in the
late 900s. He managed to unite Denmark and part of Norway into a single kingdom. Bltand in English Bluetooth
Other options
Home RF
Wireless Networking
Network Protocols
In order for effective communication to happen there
should be certain rules For example, what will happen if everyone starts talking during this lecture? The protocol for this lecture would be that no two students chat with each other during the lecture and if they have any questions ask the lecturer to clarify
all parties which are communicating with each other For effective communication between networked computers protocols are necessary
Packets
Messages containing large amounts of data that must be sent
from one computer to another are first broken down into smaller fragments called packets Then these packets are transmitted across the network. The receiver reassembles the packets to create the original message
The Internet
The Internet is the global network connecting many thousands of network spanned across the globe. It is a Network of Networks Internet is opened to anyone
Information Security
What is a secure information system? Any information system is secure if it confirms three things: Availability Integrity Confidentiality This is often called the CIA triad
Information Security
Availability Legitimate users should have timely and efficient access to information and systems Integrity Any unauthorized modifications should be prevented Confidentiality There should be a necessary level of secrecy for information and unauthorized disclosure of
Nowadays
With the introduction of PC computer systems became popular
and majority started using them Companies depend heavily on data processing and storage capability of computers Many individuals have knowledge on computer system operations and how they can be used in destructive ways (Specially with the popularity of the Internet)
However, hackers have no malicious intent (i.e., they do not intend to cause harm). They are only motivated by curiosity, personal satisfaction, or gaining reputation etc
Crackers
Individuals who cause damages to
and information systems (e.g., Viruses, Worms, Trojan Horses, Spyware etc)
Malicious Software
Viruses A Virus is a piece of malicious code which attaches to another program to spread and cause harm to your information Worms A worm is a self-contained program which can spread and cause damage on its own without attaching to another program
updates Enable auto-protect features of your virus scanner Use a spyware scanner to scan and remove spyware and update it regularly Never download content from unknown web sites Never open email attachments coming from unknown sources sources
updated with latest updates and patches Never click yes in unknown popup ads that appear. Always close them using x on the upper right hand corner
Encryption
Encryption makes your data unreadable to others Encryption takes your normal messages (called clear text)
and changes it to an unreadable format called cipher text Example: Take the word Hello and replace each letter by three letters ahead in the alphabet. You end up with Khoor which is unreadable
Strong Passwords
Passwords are not stored in clear-text (i.e., readable) format
in your computer However, it is possible for someone to find out your password either by guessing it or by carrying out a password attack Cannot be easily guessed by others or cracked by password cracking programs Strong passwords are essential to protect your information
your password since these can be easily guessed Use non-dictionary words for your password Always use a combination of uppercase/ lowercase characters, numbers. Use at least one special character in your password (e.g., !,#,$,@)
diary etc. Never send your password via email or disclose it to someone even if you trust that person
Attacks on Passwords
Brute force attacks Here the attacker tries all possible combinations for a password until he gets the correct one There are programs written to do this task Dictionary attacks The attacker tries all the words in a dictionary with the hope of discovering the password (including names, places, etc..) There are dictionaries of frequently used passwords that can be used for this purpose
Identity Theft
In the Internet sometimes you have to disclose your personal
information such as name, telephone numbers and email addresses To make online purchases you need a to give your credit card number However, you got to be careful when you disclose your personal information over the Internet
reputation by another individual for financial gains One of the fastest growing crimes in United States A popular way to obtain private information is by using phishing scams In phishing scams attacker sends an email to the victim which looks like a legitimate request for victims personal information
enter any sensitive information Always check whether the website supports secure transactions (others cannot see the information you send to secure sites) Always read privacy policies given on websites
There is a closed padlock icon at the bottom of the browser status bar