110 likes | 228 Views
Networks. ChaPter 2. Homework. Complete Chapter 2 end of book questions. Questions 1,3,6,9,11,12 13,14,15,16, 17,18 23,24,25 34,35,36,37 38,39 40,43. contents. Types of Networks Network Topologies Network Security Threats Network Protection. Types of Networks.
E N D
Networks ChaPter 2
Homework • Complete Chapter 2 end of book questions. • Questions • 1,3,6,9,11,12 • 13,14,15,16, 17,18 • 23,24,25 • 34,35,36,37 • 38,39 • 40,43
contents • Types of Networks • Network Topologies • Network Security Threats • Network Protection
Types of Networks • LAN – Local Area Network • Own personal private internet • P2P – Peer to Peer • Kazaa, Emule, etc • Each computer stores it’s own data and information • Client-Server • Minecraft, World of Warcraftetc • Host acts as servers and clients rely on server for resources. • WAN – Wide Area Networks • The Internet • Combined medium and networks.
Networks Topologies • Bus Networks • Share single data path • Star Networks • All computers connect to a central switch/router • Hybrids • Star networks connected by bus
Network Security Threats • Accidental Threats • Deliberate Threats
Accidental Threats • Delete Files • Lost/dropped USB drive • Misuse • Corrupt Files • Damage HDD • Power surges
Deliberate Threats • Hackers • Encryption cracking • Password cracking • Brute Force • Dictionary etc. • Packet interception • Port Spoofing or Scanning • DoS (Denial of Service) and dDos (distributed DoS) • Malware • Viruses – Replicating, corrupting, requires human intervention • Worms – Replicating, consume bandwidth, requires network activity • Trojans/Backdoors – opening access to outsiders • Spyware – Rootkits, Key-loggers, relay personal details online
What is an Encryption? • Modify information in a secret way • Eg • NSI FNT JUD MBT TJT CPS JOH BTI FMM encrypted data • NSIFNTJUDMBTTJTCPSJOHBTIFMM “one letter back” • MRHEMSITCLASSISBORINGASHELL • MR HEMS IT CLASS IS BORING AS HELL • JGZ PRX PSL PVU HJW FNF BUI VNC TVQ encypted data • Work it out
More Networks and Servers • VPN (Virtual Private Network) • Encryption tunnel through network • Eg proxy servicer, hamachi • Proxy Server • Act as an in between server • Web Server • Servers that are available in the internet • NAS (Networked Attached Storage) • Storage device connected to the network (eg. Router or hub) so all Computers can access.
Network Protection • User Profiles and Passwords • Wireless Security (WEP, WPA, WPA2) • Anti-Malware Scanners • Anti Virus • Anti Spam • Anti Spyware etc. • Firewalls • Hardware eg. Home routers, restrict MAC access • Software eg. Windows Firewall