47
© 2009 Prentice-Hall, Inc. 1 1

© 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

  • View
    215

  • Download
    2

Embed Size (px)

Citation preview

Page 1: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 1 1

Page 2: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 2

Technology in ActionTechnology in Action

Chapter 7Chapter 7

Networking and Security: Networking and Security:

Connecting Computers and Keeping Connecting Computers and Keeping

Them Safe from Hackers and VirusesThem Safe from Hackers and Viruses

Page 3: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 3

Chapter TopicsChapter Topics

• Networking fundamentalsNetworking fundamentals• Network architectureNetwork architecture• Network componentsNetwork components• Peer-to-peer networksPeer-to-peer networks• Ethernet networksEthernet networks• Computer threatsComputer threats• Computer safeguardsComputer safeguards• Computer virusesComputer viruses

Page 4: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 4

Networking FundamentalsNetworking Fundamentals

• Computer network:Computer network:– Two or more computers connected togetherTwo or more computers connected together– Devices connected to networks: nodes Devices connected to networks: nodes

• Benefits of a network:Benefits of a network:– Sharing resourcesSharing resources– Transferring filesTransferring files

Page 5: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 5

Network ArchitectureNetwork Architecture

• Network designs:Network designs:– Locally administered:Locally administered:

• Peer-to-peer (P2P)Peer-to-peer (P2P)

– Centrally administered:Centrally administered:• Client/serverClient/server

Page 6: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 6

Peer-to-Peer NetworksPeer-to-Peer Networks

• Nodes communicate Nodes communicate with each other:with each other:– PeersPeers

• Share peripheral Share peripheral devicesdevices

• Used in home and Used in home and small office networks small office networks

Page 7: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 7

Client/Server NetworksClient/Server Networks

• Client computers:Client computers:– Users who make Users who make

requests requests

• Server computers:Server computers:– Provide resources to Provide resources to

clientsclients– Central network controlCentral network control

• InternetInternet– A large, multiserver,A large, multiserver,

multiclient network.multiclient network.

Page 8: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 8

LANs and WANsLANs and WANs

• Local area network (LAN):Local area network (LAN):– Nodes are within a small geographic region:Nodes are within a small geographic region:

• HomesHomes• SchoolsSchools• Small businessesSmall businesses

• Wide area network (WAN):Wide area network (WAN):– LANs connected over long distances:LANs connected over long distances:

• A few miles to thousands of milesA few miles to thousands of miles• Use telecommunications linesUse telecommunications lines

Page 9: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 9

Network ComponentsNetwork Components• Transmission mediaTransmission media• Network communication Network communication

devicesdevices• SoftwareSoftware

Page 10: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 10

Transmission MediaTransmission Media• Provides communications channel between Provides communications channel between

nodesnodes• Forms of media:Forms of media:

– Twisted pairTwisted pair– Coaxial cableCoaxial cable– Fiber-optic cableFiber-optic cable– Radio waves:Radio waves:

• WirelessWireless

• Bandwidth:Bandwidth:– Data transfer rateData transfer rate– ThroughputThroughput

Page 11: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 11

Network AdaptersNetwork Adapters

• Devices connected to or installed in nodes:Devices connected to or installed in nodes:– Network interface cards (NICs)Network interface cards (NICs)– External network adaptersExternal network adapters

• Enable communication between nodesEnable communication between nodes

Page 12: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 12

Network Navigation DevicesNetwork Navigation Devices• Devices that help make data flow possibleDevices that help make data flow possible• Routers:Routers:

– Route data between networksRoute data between networks

• Switches:Switches:– Receive data and retransmit it to nodes on the Receive data and retransmit it to nodes on the

same networksame network

Page 13: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 13

Networking SoftwareNetworking Software

• Peer-to-Peer SoftwarePeer-to-Peer Software• Built into operating systems that support Built into operating systems that support

networkingnetworking– WindowsWindows– Mac OSMac OS

• Client/Server Software Client/Server Software • Network operating system (NOS) softwareNetwork operating system (NOS) software

– Windows XP ProfessionalWindows XP Professional– Windows Server 2003Windows Server 2003– Novell NetwareNovell Netware– Windows Vista EnterpriseWindows Vista Enterprise

Page 14: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 14

Types of Peer-to-Peer NetworksTypes of Peer-to-Peer Networks

• Wired Ethernet networksWired Ethernet networks

• Wireless Ethernet networksWireless Ethernet networks

• Power-line networksPower-line networks

Page 15: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 15

Wired Ethernet NetworksWired Ethernet Networks

• Ethernet network Ethernet network adapters are used to adapters are used to connect nodesconnect nodes– NIC cardNIC card– PC CardPC Card– USB adapter USB adapter

• Computers are Computers are connected to each connected to each other using unshielded other using unshielded twisted pair cabletwisted pair cable

Ethernet

Phone

Page 16: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 16

Ethernet SwitchesEthernet Switches

• Keep track of data packetsKeep track of data packets

• Amplify and retransmit signalsAmplify and retransmit signals

• Keep the network running efficientlyKeep the network running efficiently

Page 17: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 17

Ethernet RoutersEthernet Routers

• Transfer packets from one network to anotherTransfer packets from one network to another• Home Internet routers transfer data from the Home Internet routers transfer data from the

Internet to the home network.Internet to the home network.

Router

Page 18: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 18

Wireless Ethernet NetworksWireless Ethernet Networks

• Uses radio waves to connect nodesUses radio waves to connect nodes• Basically an Ethernet network that uses radio Basically an Ethernet network that uses radio

waves instead of wireswaves instead of wires• Each node requires a wirelessEach node requires a wireless network adapter:network adapter:

– TransceiversTransceivers

Page 19: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 19

Power-Line NetworksPower-Line Networks

• Computers are Computers are connected to a connected to a house’s electrical house’s electrical wiring to create a wiring to create a networknetwork

• Power-line network Power-line network adapter is used to adapter is used to connect nodes to connect nodes to electrical outletselectrical outlets

Page 20: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 20

Choosing a Peer-to-Peer Choosing a Peer-to-Peer NetworkNetwork

• Things to consider:Things to consider:- - Whether you want wireless communicationsWhether you want wireless communications

- - How fast you want your network connection to beHow fast you want your network connection to be

- - Whether existing wiring is availableWhether existing wiring is available

- How much money you can spend on your network

Comparing the Major Types of Home Networks

Wired Ethernet

Wireless 802.11g

Wireless Enhanced

G

Wireless802.11n

Maximum dataTransfer rate (bandwidth)

100 Mbps to

1,000 bps (1 gigabit)

54 Mbps 108 Mbps 100 to 630 bps

Relative installation

and equipment costs

for networkingtwo computers

$ $ $$ $$$

Page 21: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 21

Configuring Software Configuring Software for a Home Networkfor a Home Network

• Windows Windows – Windows Vista home versionsWindows Vista home versions

• Network setup wizardNetwork setup wizard– Wired or wirelessWired or wireless

– Windows XPWindows XP• Network setup wizardNetwork setup wizard

– Windows 98Windows 98• Configure manuallyConfigure manually

– Help has a clear instructionHelp has a clear instruction

Page 22: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 22

Computer ThreatsComputer Threats• Cybercrimes are criminal acts conducted through Cybercrimes are criminal acts conducted through

the use of computers by cybercriminals.the use of computers by cybercriminals.

Page 23: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 23

Hackers Hackers

• Anyone who unlawfully accesses a Anyone who unlawfully accesses a computer systemcomputer system

• Types of hackers: Types of hackers: – White-hatWhite-hat– Black-hatBlack-hat– Script kiddiesScript kiddies

Page 24: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 24

What Hackers DoWhat Hackers Do

• Steal information from computers:Steal information from computers:– Credit card numbersCredit card numbers– Bank account numbersBank account numbers

• Internet packet sniffingInternet packet sniffing

• Commit identity theftCommit identity theft

Page 25: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 25

How Computers Are AttackedHow Computers Are Attacked

• Trojan horseTrojan horse• Backdoor Backdoor

program program – ZombiesZombies

• Denial of Denial of service attacksservice attacks

Page 26: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 26

How Hackers Gain AccessHow Hackers Gain Access

• Direct access:Direct access:– Hacking softwareHacking software

• Indirect access:Indirect access:– Internet connectionInternet connection– Logical portsLogical ports

Page 27: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 27

Computer Safeguards:Computer Safeguards:FirewallsFirewalls

• Software programs or hardware designed Software programs or hardware designed to close logical ports to invadersto close logical ports to invaders– A firewall is built into Windows VistaA firewall is built into Windows Vista– More robust firewalls are available from More robust firewalls are available from

other vendorsother vendors– Firewalls are critical if you have an always-Firewalls are critical if you have an always-

on broadband connectionon broadband connection

Page 28: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 28

Protecting a Wireless NetworkProtecting a Wireless Network

• Wireless network range doesn’t stop at the Wireless network range doesn’t stop at the property lineproperty line

• Default device and network ID settings Default device and network ID settings allow intruders to enter the networkallow intruders to enter the network

• Internet bandwidth can be stolenInternet bandwidth can be stolen

• Computers can be vulnerable to hacker Computers can be vulnerable to hacker intrusion and takeoverintrusion and takeover

Page 29: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 29

Computer Threats: VirusesComputer Threats: Viruses

• A program that attaches itself to another A program that attaches itself to another program and spreads itself to other program and spreads itself to other computerscomputers

• Viruses are hidden within the code of a Viruses are hidden within the code of a host programhost program

Page 30: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 30

How Does a Computer How Does a Computer Catch a Virus?Catch a Virus?

• Viruses copy Viruses copy themselves themselves

• Infect a file on your Infect a file on your computercomputer

• Spread by sharing Spread by sharing disks disks or flash drives

• E-mail attachments E-mail attachments are the most likely are the most likely source of a virussource of a virus

Page 31: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 31

What Viruses DoWhat Viruses Do

• Replicate themselves:Replicate themselves:– Slow down networksSlow down networks

• Secondary objectives:Secondary objectives:– Display annoying messagesDisplay annoying messages– Delete files on the hard driveDelete files on the hard drive– Change computer settingsChange computer settings

Page 32: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 32

Types of VirusesTypes of Viruses

• Boot-sector virusesBoot-sector viruses– Replicate themselves in the boot sector of the hard Replicate themselves in the boot sector of the hard

drivedrive• Logic bombsLogic bombs

– Activate when certain conditions are metActivate when certain conditions are met• Time bombsTime bombs

– Viruses that are triggered by the passage of time or Viruses that are triggered by the passage of time or on a certain dateon a certain date

• WormsWorms– Travel between systems through networksTravel between systems through networks

Page 33: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 33

Types of VirusesTypes of Viruses

• Script viruses:Script viruses:– Hidden on Web pages as mini programs Hidden on Web pages as mini programs

• Macro viruses:Macro viruses:– Attached to documentsAttached to documents– Series of commandsSeries of commands

• E-mail virusE-mail virus– Use e-mail address book to distribute the virusUse e-mail address book to distribute the virus

• Encryption virusesEncryption viruses– Compresses files using a complex encryption key Compresses files using a complex encryption key – User must pay to get the files unlockedUser must pay to get the files unlocked

Page 34: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 34

Virus ClassificationsVirus Classifications

• Polymorphic viruses:– Periodically rewrite themselves to avoid

detection

• Multipartite viruses:– Infect multiple file types

• Stealth viruses:– Erase their code from the hard drive and

reside in the active memory

Page 35: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 35

Antivirus SoftwareAntivirus Software

• Programs designed to detect viruses:Programs designed to detect viruses:– Scan files looking for virus signatures (unique code)Scan files looking for virus signatures (unique code)– Provide options for deleting or fixing infected filesProvide options for deleting or fixing infected files– Inoculate files against further infectionInoculate files against further infection

• Detect known virusesDetect known viruses• Antivirus programs need to be updated frequentlyAntivirus programs need to be updated frequently

Page 36: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 36

Chapter 7 Summary QuestionsChapter 7 Summary Questions

• What is a network, and what are the What is a network, and what are the advantages of setting up one?advantages of setting up one?

Page 37: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 37

Chapter 7 Summary QuestionsChapter 7 Summary Questions

• What is the difference between a What is the difference between a client/server network and a peer-to-peer client/server network and a peer-to-peer network?network?

Page 38: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 38

Chapter 7 Summary QuestionsChapter 7 Summary Questions

• What are the main components of every What are the main components of every network?network?

Page 39: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 39

Chapter 7 Summary QuestionsChapter 7 Summary Questions

• What are the most common home What are the most common home networks?networks?

Page 40: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 40

Chapter 7 Summary QuestionsChapter 7 Summary Questions

• What are wired Ethernet networks, and What are wired Ethernet networks, and how are they created? how are they created?

Page 41: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 41

Chapter 7 Summary QuestionsChapter 7 Summary Questions

• What are wireless Ethernet networks, and What are wireless Ethernet networks, and how are they created? how are they created?

Page 42: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 42

Chapter 7 Summary QuestionsChapter 7 Summary Questions

• How are power-line networks created, and How are power-line networks created, and are they viable alternatives to Ethernet are they viable alternatives to Ethernet networks?networks?

Page 43: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 43

Chapter 7 Summary QuestionsChapter 7 Summary Questions

• How can hackers attack a network, and How can hackers attack a network, and what harm can they cause? what harm can they cause?

Page 44: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 44

Chapter 7 Summary QuestionsChapter 7 Summary Questions

• What is a firewall, and how does it keep What is a firewall, and how does it keep my computer safe from hackers? my computer safe from hackers?

Page 45: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 45

Chapter 7 Summary QuestionsChapter 7 Summary Questions

• Why are wireless networks more Why are wireless networks more vulnerable than wired networks, and what vulnerable than wired networks, and what special precautions are required to ensure special precautions are required to ensure my wireless network is secure?my wireless network is secure?

Page 46: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 46

Chapter 7 Summary QuestionsChapter 7 Summary Questions

• From which types of viruses do I need to From which types of viruses do I need to protect my computer? protect my computer?

Page 47: © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

© 2009 Prentice-Hall, Inc. 47

Chapter 7 Summary QuestionsChapter 7 Summary Questions

• What can I do to protect my computer from What can I do to protect my computer from viruses? viruses?