410 likes | 506 Views
Computer networks. Network administrators are here to help you! Open a ticket on http://support.unibz.it. Computer networks. What is a network Computers External connection Terminals Printers Stand-alone hard disks VoIP telephones Server-client architecture. Transfer speed.
E N D
Computer networks Network administrators are here to help you! Open a ticket on http://support.unibz.it Computer networks
Computer networks • What is a network • Computers • External connection • Terminals • Printers • Stand-alone hard disks • VoIP telephones • Server-client architecture Computer networks
Transfer speed • Network areas • Local Area Network (LAN, Intranet) • Wide Area Network (WAN, Internet) • Virtual Private Network (VPN) • Speed in “bits per second” (bps) • Ethernet 10 Mbps • Fast Ethernet 100 Mbps • Giga Ethernet 1 Gbps • Wireless 30-300 Mbps Computer networks
Communication programs • Web browser • Chrome (55% of the market) • Mozilla Firefox (25% of the market) • Internet Explorer (10% of the market) • Safari • Mail reader • Outlook, Mozilla Thunderbird, Windows Live Mail • Webmail and Microsoft Outlook Web App http://webmail.unibz.it • Voice over IP • Costs • WhatsApp Computer networks
Posta Elettronica Certificata – PEC • Standard email • No guarantee of sender’s e-mail address identity • No guarantee of sender’s identity • No guarantee that content has not been altered • No sent proof • No dispatched proof • No read proof • PEC to PEC: like a raccomandata con ricevuta di ritorno • Sent proof • Dispatched proof • (in practice also) sender’s address identity and unaltered content Computer networks
Posta Elettronica Certificata – PEC • PEC to standard email: like a raccomandata semplice • Sent proof • Standard email to PEC: like a normal letter • Sent and dispatched proves are legal proves • Every citizen may have a free PEC address to communicate with public administration Computer networks
Search engines • Crawler technique (8 billions web pages!) • Google scoring system • Search tricks: • Use many keywords • Quotations • Advanced search • Search for images Computer networks
Slow connections Computer networks
Broadband connections Computer networks
Broadband connections • ADSL Congestion • “minimum band guaranteed” contract • Digital divide • 5,400,000 Italians not covered by broadband • WiMax • 10 Kilometers range • “line of sight” problem Computer networks
Law 196/2003 on privacy • Data are divided into: • personal data • sensitive data • race and ethnicity, • religious / philosophical / political opinions, • belonging to religious / philosophical / political / workers organization • sensitive data about health and sex • justice data (handled as sensitive data) • genetic data (need extremely particular procedures) Computer networks
Law 196/2003 on privacy • To personal users who do not communicate data only security requirements apply • Requirements • authentication with login + password or alternatives • permission • training or instructions • backup every week all data • security programs updated every 12 months (6 if sensitive) • sensitive data must be encrypted or unidentifiable Computer networks
Encryption • Scrambling technique to make text unreadable • Public key for encrypting • Private key for decrypting • 128 bits to be sure Computer networks
decrypt decrypt decrypt encrypt encrypt B B G#4hg! G#4hg! message 1 Trb:-ò°§ message 1 message 1 Encryption for information exchange A C C encrypt encrypt decrypt decrypt message 2 f@çd*s f@çd*s Dr4^\|ò9 message 2 message 2 encrypt encrypt decrypt D D message 3 %$&/òL message 3 message 3 È^£(iw, È^£(iw, Computer networks
secret data secretdata secretdata %£)(“84jhgds?ì A A A encrypt encrypt D(£ò§*+]dH D(£ò§*+]dH decrypt decrypt Encryption for data storage Computer networks
Digital signature • Law 82/2005 • Private key for encrypting • Public key for decrypting • Keys given by certification authorities • Combination with PEC • Keys expiration • Temporal mark Computer networks
B B 2?=zx:-ki document decrypt decrypt Digital signature A document falsedocument Y&”:ò[fgj?’^d G#4$h&à?-2y encrypt encrypt C C decrypt decrypt 2?=zx:-ki document decrypt decrypt D D 2?=zx:-ki document Computer networks
Comparison with handwritten signature Computer networks
Electronic vs digital signature • Electronic signature • automatic signature through username and password • Qualified electronic signature • and a certification authority guarantees it • Digital signature • and uses encryption Computer networks
Passwords Computer networks
Passwords • What can be done with your password? • Steal personal data • Steal other people’s data • Steal money • Delete and modify data • Steal identity • Start illegal activities Computer networks
Passwords • Most people have the following passwords: • A standard computer can try 4 billion passwords per second Computer networks
Passwords • Law 196/2003 • Avoid personal data in the password • Change password every 6 months (3 if sensitive data) • Minimum 8 characters • Better also: • Mix letters, strange characters and numbers • Do not use words • Use different passwords for different purposes • Beware of passwords stored in programs • Test your password robustness on https://howsecureismypassword.net • What to do in case of employee’s absence Computer networks
Alternatives to password • Law 196/2003 allows biometric identification methods • fingerprints • hand palm • retina scanning • voice identification Computer networks
Extra security • Adding physical methods to standard password • smartcard • token key • OTP with display • OTP USB • phone SMS • phone call Computer networks
Viruses • What does a virus do? • Infect • Survive • Duplicate • Damage • Virus infection symptoms • computer is slow to start • unwanted and annoying pop-ups • many system errors Computer networks
Viruses • User’s responsible behaviors • downloaded files and email attachments • CD, DVD, USB pendrives • strange websites • updated programs • updated antivirus • Anti-viruses • Checking the whole hard disk • Checking suspect files • Always running Computer networks
Types of viruses • Trojan horse • looks like a good program • Key logger • records your keyboard activity (to get passwords) • Back door • opens a port on your computer (to let external users in) • Adware • displays advertisement • Spyware • spies your activity (to get passwords or for spam targeting) Computer networks
Spam • “unsolicited” “unwanted” “bulk” email • Advertisement: gambling, pornographic websites, medicines, risky investments, software… • Chain letters • Frauds • Phishing • Sender is always counterfeited • Do not click on links! Do not answer!!! • Where do they get my email address? • Antispam and blacklists Computer networks
Phishing Computer networks
Phishing Computer networks
Phishing example • 2,000,000 emails sent • 5% arrive to existing users: 100,000 • 5% of users read the email: 5,000 • 2% of readers believe in the email: 100 • $1,200 from each user • Gain: $120,000 • In 2005 Mr. David Levi gained $360,000 from 160 people using Phishing on eBay website Computer networks
Safe navigating • Navigation security • Phishing • Viruses • Download Save Antivirus Open • Avoid visiting and downloading from untrustworthy websites • Keep Explorer and Windows up-to-date • Intercept your data • Secure connection SSL: httpS Computer networks
Attacks from outside • Denial of Service • zombie computers • Firewall • which internal program • which external address • what amount of traffic • which kind of data • Windows Seven Firewall Computer networks
Backup • Why backup? Source: The Cost of Lost Data. The importance of investing in that “ounce of prevention” by David M. Smith Computer networks
Backup • Law 196/2003 • backup every week • What to backup? • Your data files • emails, contacts, calendar • Program configuration files • Difficult-to-find stuff • Where to backup? • another hard disk • online backup systems: Dropbox, GoogleDrive, Box, Amazon • RAID techniques Computer networks
RAID – Redundant Array of Independent Disks • JBOD – Just a Bunch Of Disks • 2 disks • RAID 0 • 2 disks, fast • RAID 1 • 2 disks but space as for 1, safe vs crash, 24h service • Most common solution • RAID 10 • 4 disks but space as for 2, fast, safe vs crash , 24h service • None of these techniques is safe versus viruses or human errors! Computer networks
JBOD Computer networks
RAID 1 Computer networks
RAID 0 Computer networks
RAID 10 Computer networks