Anda di halaman 1dari 34

What are Computer Networks

A collection of two or more computers which are connected together (either using wires or wirelessly)

Why do we need computer networks


To share physical resources such as disk space, printers, scanners etc To share information To avoid duplication of data (less data entry) To provide consistency of data For reliable communications To reduce costs through sharing

Types of Computer Networks


Local Area Networks (LAN)
Networks which are confined to a small geographic

area such as room or a building Privately owned networks transmission media are privately owned

Types of Computer Networks cont.


Wide Area Networks (WAN)
Networks which span a large geographic area such

as connections between the branches of an organization and its head office. Connectivity obtained through a service provider

Types of Computer Networks cont.


Personal Area Networks (PAN) Computer network used for communication among computer devices (including telephones and personal digital assistants) close to one person All devices are located within few meters

Bluetooth
Why is it called Bluetooth?
Harald Bltand was king of Denmark in the

late 900s. He managed to unite Denmark and part of Norway into a single kingdom. Bltand in English Bluetooth

Other options
Home RF

IrDA (Infrared Data Association)

Wireless Networking

Network Protocols
In order for effective communication to happen there

should be certain rules For example, what will happen if everyone starts talking during this lecture? The protocol for this lecture would be that no two students chat with each other during the lecture and if they have any questions ask the lecturer to clarify

Network Protocols cont.


A protocol is a set of rules that must be followed by

all parties which are communicating with each other For effective communication between networked computers protocols are necessary

Packets
Messages containing large amounts of data that must be sent

from one computer to another are first broken down into smaller fragments called packets Then these packets are transmitted across the network. The receiver reassembles the packets to create the original message

The Internet
The Internet is the global network connecting many thousands of network spanned across the globe. It is a Network of Networks Internet is opened to anyone

who has a need to connect to it Internet is regulated by the Internet Society

Information Security
What is a secure information system? Any information system is secure if it confirms three things: Availability Integrity Confidentiality This is often called the CIA triad

Information Security
Availability Legitimate users should have timely and efficient access to information and systems Integrity Any unauthorized modifications should be prevented Confidentiality There should be a necessary level of secrecy for information and unauthorized disclosure of

information should be provided

In the early days.


Mainframe systems contained dumb terminals with limited functionality and processing

Few individuals had knowledge and access to computer systems


Companies did not depend heavily on computer systems

for their business functions

Nowadays
With the introduction of PC computer systems became popular

and majority started using them Companies depend heavily on data processing and storage capability of computers Many individuals have knowledge on computer system operations and how they can be used in destructive ways (Specially with the popularity of the Internet)

Who are your Enemies?


Hackers
Access systems in an unauthorized manner.

However, hackers have no malicious intent (i.e., they do not intend to cause harm). They are only motivated by curiosity, personal satisfaction, or gaining reputation etc

Crackers
Individuals who cause damages to

information systems with a malicious intent often for financial gains

Who are your Enemies? Cont.


Malicious Software
These are software that can cause harm to your data

and information systems (e.g., Viruses, Worms, Trojan Horses, Spyware etc)

Malicious Software
Viruses A Virus is a piece of malicious code which attaches to another program to spread and cause harm to your information Worms A worm is a self-contained program which can spread and cause damage on its own without attaching to another program

Malicious Software cont.


Trojan Horses A Trojan Horse is a harmful program which disguises it self as some other useful program Spyware These are malicious software installed in your computer without you Knowing about them. They may provide others access to your system, display unwanted banner ads, or steal your confidential information

Preventing Malicious Software cont.


Always use a virus scanner and keep it up to date with latest

updates Enable auto-protect features of your virus scanner Use a spyware scanner to scan and remove spyware and update it regularly Never download content from unknown web sites Never open email attachments coming from unknown sources sources

Preventing Malicious Software cont.


Use a personal firewall Keep your operating system

updated with latest updates and patches Never click yes in unknown popup ads that appear. Always close them using x on the upper right hand corner

Encryption
Encryption makes your data unreadable to others Encryption takes your normal messages (called clear text)

and changes it to an unreadable format called cipher text Example: Take the word Hello and replace each letter by three letters ahead in the alphabet. You end up with Khoor which is unreadable

Strong Passwords
Passwords are not stored in clear-text (i.e., readable) format

in your computer However, it is possible for someone to find out your password either by guessing it or by carrying out a password attack Cannot be easily guessed by others or cracked by password cracking programs Strong passwords are essential to protect your information

Password Best Practices


Always use a password of a minimum of eight characters Do not use your name, birthday, name of a close relative as

your password since these can be easily guessed Use non-dictionary words for your password Always use a combination of uppercase/ lowercase characters, numbers. Use at least one special character in your password (e.g., !,#,$,@)

Password Best Practices cont.


Change your password at least twice every month Never write down your password in books, pieces of paper,

diary etc. Never send your password via email or disclose it to someone even if you trust that person

Attacks on Passwords
Brute force attacks Here the attacker tries all possible combinations for a password until he gets the correct one There are programs written to do this task Dictionary attacks The attacker tries all the words in a dictionary with the hope of discovering the password (including names, places, etc..) There are dictionaries of frequently used passwords that can be used for this purpose

Attacks on Passwords cont.


Keystroke Monitoring Attacker tries to obtain a password by looking at your key strokes while you enter your password Dumpster diving Attacker searches through trash bins with the hope of finding written down passwords or other confidential information

Attacks on Passwords cont.


Key loggers These are programs planted in your Computer by an attacker to record every keystroke you type in to a file. The attacker can later analyze the file to obtain your password Social Engineering Attacker tries to trick you into revealing your password.

Identity Theft
In the Internet sometimes you have to disclose your personal

information such as name, telephone numbers and email addresses To make online purchases you need a to give your credit card number However, you got to be careful when you disclose your personal information over the Internet

Identity Theft cont.


Identity theft is the act of using someones Identity and good

reputation by another individual for financial gains One of the fastest growing crimes in United States A popular way to obtain private information is by using phishing scams In phishing scams attacker sends an email to the victim which looks like a legitimate request for victims personal information

Preventing Identity Theft


Do not disclose your private information over emails Always check whether a website is a trusted one before you

enter any sensitive information Always check whether the website supports secure transactions (others cannot see the information you send to secure sites) Always read privacy policies given on websites

Identifying Secure Websites


Secure websites have a URL starting with https://

There is a closed padlock icon at the bottom of the browser status bar

Anda mungkin juga menyukai