35
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc. 1 Chapter 6 Summary Chapter 6 Summary Questions Questions How can I determine whether I should How can I determine whether I should upgrade my existing computer or buy upgrade my existing computer or buy a new one? a new one? What does the CPU do and how can I What does the CPU do and how can I evaluate its performance? evaluate its performance? How does memory work and how can I How does memory work and how can I evaluate how much memory I need? evaluate how much memory I need? What are the computer’s main storage What are the computer’s main storage devices and how can I evaluate devices and how can I evaluate whether they match my needs? whether they match my needs? NEXT SLIDE

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Embed Size (px)

Citation preview

Page 1: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 1

Chapter 6 Summary QuestionsChapter 6 Summary QuestionsChapter 6 Summary QuestionsChapter 6 Summary Questions

• How can I determine whether I should How can I determine whether I should upgrade my existing computer or buy a upgrade my existing computer or buy a new one?new one?

• What does the CPU do and how can I What does the CPU do and how can I evaluate its performance?evaluate its performance?

• How does memory work and how can I How does memory work and how can I evaluate how much memory I need?evaluate how much memory I need?

• What are the computer’s main storage What are the computer’s main storage devices and how can I evaluate whether devices and how can I evaluate whether they match my needs?they match my needs?

• How can I determine whether I should How can I determine whether I should upgrade my existing computer or buy a upgrade my existing computer or buy a new one?new one?

• What does the CPU do and how can I What does the CPU do and how can I evaluate its performance?evaluate its performance?

• How does memory work and how can I How does memory work and how can I evaluate how much memory I need?evaluate how much memory I need?

• What are the computer’s main storage What are the computer’s main storage devices and how can I evaluate whether devices and how can I evaluate whether they match my needs?they match my needs?

NEXT SLIDE

Page 2: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 2

Chapter 6 Summary QuestionsChapter 6 Summary QuestionsChapter 6 Summary QuestionsChapter 6 Summary Questions

• What components affect the output of What components affect the output of video and how can I evaluate whether video and how can I evaluate whether they are meeting my needs?they are meeting my needs?

• What components affect the quality of What components affect the quality of sound and how can I evaluate whether sound and how can I evaluate whether they are meeting my needs?they are meeting my needs?

• What components affect the output of What components affect the output of video and how can I evaluate whether video and how can I evaluate whether they are meeting my needs?they are meeting my needs?

• What components affect the quality of What components affect the quality of sound and how can I evaluate whether sound and how can I evaluate whether they are meeting my needs?they are meeting my needs?

NEXT SLIDE

Page 3: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 3

Technology In ActionTechnology In ActionTechnology In ActionTechnology In Action

Chapter 7Chapter 7

Networking and Security: Connecting Networking and Security: Connecting Computers and Keeping Them Safe from Computers and Keeping Them Safe from

Hackers and VirusesHackers and Viruses

Chapter 7Chapter 7

Networking and Security: Connecting Networking and Security: Connecting Computers and Keeping Them Safe from Computers and Keeping Them Safe from

Hackers and VirusesHackers and Viruses

NEXT SLIDE

Page 4: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 4

TopicsTopicsTopicsTopics

• Networking fundamentalsNetworking fundamentals• Network architectureNetwork architecture• Network componentsNetwork components• Peer-to-peer networksPeer-to-peer networks• Computer threatsComputer threats• Computer safeguardsComputer safeguards• Computer virusesComputer viruses

• Networking fundamentalsNetworking fundamentals• Network architectureNetwork architecture• Network componentsNetwork components• Peer-to-peer networksPeer-to-peer networks• Computer threatsComputer threats• Computer safeguardsComputer safeguards• Computer virusesComputer viruses

NEXT SLIDENEXT SLIDE

Page 5: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 5

Networking FundamentalsNetworking FundamentalsNetworking FundamentalsNetworking Fundamentals

• Computer network:Computer network:– Two or more computers connected togetherTwo or more computers connected together– Nodes Nodes

• Benefits of a network:Benefits of a network:– Sharing resourcesSharing resources– Transferring filesTransferring files– Sharing internetSharing internet

• Computer network:Computer network:– Two or more computers connected togetherTwo or more computers connected together– Nodes Nodes

• Benefits of a network:Benefits of a network:– Sharing resourcesSharing resources– Transferring filesTransferring files– Sharing internetSharing internet

NEXT SLIDE

Page 6: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 6

Network ArchitectureNetwork ArchitectureNetwork ArchitectureNetwork Architecture

• Network designs:Network designs:– Locally controlled:Locally controlled:

Peer-to-peer (P2P)Peer-to-peer (P2P)

– Centrally controlled:Centrally controlled:Client/serverClient/server

• Network designs:Network designs:– Locally controlled:Locally controlled:

Peer-to-peer (P2P)Peer-to-peer (P2P)

– Centrally controlled:Centrally controlled:Client/serverClient/server

Peer-to-peer

Client/server

NEXT SLIDE

Page 7: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 7

Peer-to-Peer NetworksPeer-to-Peer NetworksPeer-to-Peer NetworksPeer-to-Peer Networks

• Nodes communicate Nodes communicate with each other:with each other:– PeersPeers

• Share peripheral Share peripheral devices:devices:– PrintersPrinters– Scanners Scanners

• Home and small office Home and small office networks networks

• Nodes communicate Nodes communicate with each other:with each other:– PeersPeers

• Share peripheral Share peripheral devices:devices:– PrintersPrinters– Scanners Scanners

• Home and small office Home and small office networks networks

NEXT SLIDE

Page 8: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 8

Client/Server NetworksClient/Server NetworksClient/Server NetworksClient/Server Networks

• Client computers:Client computers:– Users Users

• Server computers:Server computers:– Provide resources to clientsProvide resources to clients– Central control unitCentral control unit

• InternetInternet

• Client computers:Client computers:– Users Users

• Server computers:Server computers:– Provide resources to clientsProvide resources to clients– Central control unitCentral control unit

• InternetInternet

NEXT SLIDE

Page 9: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 9

LANs and WANsLANs and WANsLANs and WANsLANs and WANs

• Local area network (LAN):Local area network (LAN):– Nodes are within a small geographic region:Nodes are within a small geographic region:

HomesHomesSchoolsSchoolsSmall businessesSmall businesses

• Wide area network (WAN):Wide area network (WAN):– LANs connected over long distances:LANs connected over long distances:

A few miles to thousands of milesA few miles to thousands of milesUse telecommunications linesUse telecommunications lines

• Local area network (LAN):Local area network (LAN):– Nodes are within a small geographic region:Nodes are within a small geographic region:

HomesHomesSchoolsSchoolsSmall businessesSmall businesses

• Wide area network (WAN):Wide area network (WAN):– LANs connected over long distances:LANs connected over long distances:

A few miles to thousands of milesA few miles to thousands of milesUse telecommunications linesUse telecommunications lines

NEXT SLIDE

Page 10: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 10

Network ComponentsNetwork ComponentsNetwork ComponentsNetwork Components

• Transmission mediaTransmission media• Network adaptersNetwork adapters• Navigation devicesNavigation devices• Network softwareNetwork software

• Transmission mediaTransmission media• Network adaptersNetwork adapters• Navigation devicesNavigation devices• Network softwareNetwork software

NEXT SLIDE

Page 11: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 11

Transmission MediaTransmission MediaTransmission MediaTransmission Media

• Provides communications channel Provides communications channel between nodesbetween nodes

• Forms of media:Forms of media:– Telephone wire:Telephone wire:

Twisted pairTwisted pair

– Coaxial cableCoaxial cable– Fiber-optic cableFiber-optic cable– Radio waves:Radio waves:

WirelessWireless

• Bandwidth:Bandwidth:– Data transfer rate, throughputData transfer rate, throughput

• Provides communications channel Provides communications channel between nodesbetween nodes

• Forms of media:Forms of media:– Telephone wire:Telephone wire:

Twisted pairTwisted pair

– Coaxial cableCoaxial cable– Fiber-optic cableFiber-optic cable– Radio waves:Radio waves:

WirelessWireless

• Bandwidth:Bandwidth:– Data transfer rate, throughputData transfer rate, throughput

NEXT SLIDE

Page 12: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 12

Network AdaptersNetwork AdaptersNetwork AdaptersNetwork Adapters

• Devices connected to or installed in nodes:Devices connected to or installed in nodes:– Network interface cards (NIC)Network interface cards (NIC)– External network adapterExternal network adapter

• Enable communication between nodesEnable communication between nodes

• Devices connected to or installed in nodes:Devices connected to or installed in nodes:– Network interface cards (NIC)Network interface cards (NIC)– External network adapterExternal network adapter

• Enable communication between nodesEnable communication between nodes

NICExternal adapter

NEXT SLIDE

Page 13: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 13

Network Navigation DevicesNetwork Navigation DevicesNetwork Navigation DevicesNetwork Navigation Devices• Devices that help make data flow possibleDevices that help make data flow possible

– PacketsPackets

• Routers:Routers:– Route data between networksRoute data between networks

• Hubs:Hubs:– Receive data and retransmit it to nodes on the Receive data and retransmit it to nodes on the

networknetwork

• Devices that help make data flow possibleDevices that help make data flow possible– PacketsPackets

• Routers:Routers:– Route data between networksRoute data between networks

• Hubs:Hubs:– Receive data and retransmit it to nodes on the Receive data and retransmit it to nodes on the

networknetworkHub Router

NEXT SLIDE

Page 14: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 14

Networking SoftwareNetworking SoftwareNetworking SoftwareNetworking Software

• Software needed:Software needed:– Peer-to-peer:Peer-to-peer:

Operating systems that support networkingOperating systems that support networkingWindowsWindowsMac OSMac OS

– Client/server:Client/server:Network operating system (NOS) softwareNetwork operating system (NOS) softwareWindows XP ProfessionalWindows XP ProfessionalWindows Server 2003Windows Server 2003Novell NetwareNovell Netware

Page 15: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 15

Types of Peer-to-Peer NetworksTypes of Peer-to-Peer NetworksTypes of Peer-to-Peer NetworksTypes of Peer-to-Peer Networks

• Power linePower line• Phone linePhone line• EthernetEthernet• Wireless Wireless

• Power linePower line• Phone linePhone line• EthernetEthernet• Wireless Wireless

Page 16: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 16

Power Line NetworksPower Line NetworksPower Line NetworksPower Line Networks

• Computers are connected to a house’s Computers are connected to a house’s electrical wiring to create a networkelectrical wiring to create a network

• Power line network adapter is used to Power line network adapter is used to connect nodes to electrical outletsconnect nodes to electrical outlets

• Computers are connected to a house’s Computers are connected to a house’s electrical wiring to create a networkelectrical wiring to create a network

• Power line network adapter is used to Power line network adapter is used to connect nodes to electrical outletsconnect nodes to electrical outlets

NEXT SLIDE

Page 17: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 17

Phone Line NetworksPhone Line NetworksPhone Line NetworksPhone Line Networks

• Computers are connected Computers are connected to a house’s telephone to a house’s telephone wiring to create a networkwiring to create a network

• Home phone line network Home phone line network adapter is used to adapter is used to connect nodes to phone connect nodes to phone jacksjacks

• Computers are connected Computers are connected to a house’s telephone to a house’s telephone wiring to create a networkwiring to create a network

• Home phone line network Home phone line network adapter is used to adapter is used to connect nodes to phone connect nodes to phone jacksjacks

NEXT SLIDE

Page 18: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 18

Ethernet NetworksEthernet NetworksEthernet NetworksEthernet Networks• Computers are connected to each other Computers are connected to each other

using unshielded twisted pair cable (UTP)using unshielded twisted pair cable (UTP)– Cat 5 (100Mbps), Cat 5E(200Mbps), Cat 6(1Gbps)Cat 5 (100Mbps), Cat 5E(200Mbps), Cat 6(1Gbps)

• Ethernet network adapters are used to Ethernet network adapters are used to connect nodesconnect nodes– NICNIC– PC cardPC card– USB adapterUSB adapter

• Computers are connected to each other Computers are connected to each other using unshielded twisted pair cable (UTP)using unshielded twisted pair cable (UTP)– Cat 5 (100Mbps), Cat 5E(200Mbps), Cat 6(1Gbps)Cat 5 (100Mbps), Cat 5E(200Mbps), Cat 6(1Gbps)

• Ethernet network adapters are used to Ethernet network adapters are used to connect nodesconnect nodes– NICNIC– PC cardPC card– USB adapterUSB adapter

NEXT SLIDE

RJ-45

conn

ecto

r

PC card

NIC card

USB

adap

ter

Page 19: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 19

Ethernet HubsEthernet HubsEthernet HubsEthernet Hubs

• Keep track of data packetsKeep track of data packets• Amplify and retransmit signalsAmplify and retransmit signals• Keep the network running efficientlyKeep the network running efficiently

• Keep track of data packetsKeep track of data packets• Amplify and retransmit signalsAmplify and retransmit signals• Keep the network running efficientlyKeep the network running efficiently

NEXT SLIDE

Page 20: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 20

Ethernet RoutersEthernet RoutersEthernet RoutersEthernet Routers

• Route packets of data between networksRoute packets of data between networks• Router needed to send data between the Router needed to send data between the

network and the Internetnetwork and the Internet

• Route packets of data between networksRoute packets of data between networks• Router needed to send data between the Router needed to send data between the

network and the Internetnetwork and the Internet

NEXT SLIDE

Page 21: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 21

Wireless NetworksWireless NetworksWireless NetworksWireless Networks• Use radio waves to connect nodesUse radio waves to connect nodes• 802.11 standard (Wi-Fi: Wireless Fidelity)802.11 standard (Wi-Fi: Wireless Fidelity)

– 802.11b (11Mbps), 802.11g(54Mbps)802.11b (11Mbps), 802.11g(54Mbps)

• Basically an Ethernet network that uses Basically an Ethernet network that uses radio waves instead of wiresradio waves instead of wires

• Each node requires a wireless network Each node requires a wireless network adapter:adapter:– Transceiver Transceiver

• Use radio waves to connect nodesUse radio waves to connect nodes• 802.11 standard (Wi-Fi: Wireless Fidelity)802.11 standard (Wi-Fi: Wireless Fidelity)

– 802.11b (11Mbps), 802.11g(54Mbps)802.11b (11Mbps), 802.11g(54Mbps)

• Basically an Ethernet network that uses Basically an Ethernet network that uses radio waves instead of wiresradio waves instead of wires

• Each node requires a wireless network Each node requires a wireless network adapter:adapter:– Transceiver Transceiver

NEXT SLIDE

Page 22: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 22

LimitationLimitationLimitationLimitation

• Maximum range: 250 feetMaximum range: 250 feet• Interference with other wireless devicesInterference with other wireless devices• Obstacles between wireless nodesObstacles between wireless nodes

– WallWall– Large metal objectsLarge metal objects

• Wireless DSL/cable routerWireless DSL/cable router

• Maximum range: 250 feetMaximum range: 250 feet• Interference with other wireless devicesInterference with other wireless devices• Obstacles between wireless nodesObstacles between wireless nodes

– WallWall– Large metal objectsLarge metal objects

• Wireless DSL/cable routerWireless DSL/cable router

Page 23: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 23

Choosing a Peer-to-Peer NetworkChoosing a Peer-to-Peer NetworkChoosing a Peer-to-Peer NetworkChoosing a Peer-to-Peer Network

• Things to consider:Things to consider:– Existing wiringExisting wiring– Wireless or wiredWireless or wired– Speed of the networkSpeed of the network– Cost of the networkCost of the network

• Things to consider:Things to consider:– Existing wiringExisting wiring– Wireless or wiredWireless or wired– Speed of the networkSpeed of the network– Cost of the networkCost of the network

NEXT SLIDE

Page 24: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 24

ComparisonComparisonComparisonComparison

Page 25: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 25

Configuring Software for a Home Configuring Software for a Home NetworkNetwork

Configuring Software for a Home Configuring Software for a Home NetworkNetwork

• Windows operating system:Windows operating system:– Windows XP:Windows XP:

Network setup wizardNetwork setup wizard

– Windows ME:Windows ME:Network setup wizardNetwork setup wizard

– Windows 98:Windows 98:Configure manuallyConfigure manually

• Windows operating system:Windows operating system:– Windows XP:Windows XP:

Network setup wizardNetwork setup wizard

– Windows ME:Windows ME:Network setup wizardNetwork setup wizard

– Windows 98:Windows 98:Configure manuallyConfigure manually

NEXT SLIDE

Page 26: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 26

Computer ThreatsComputer ThreatsComputer ThreatsComputer Threats

• Cyber-crimeCyber-crime• Hackers:Hackers:

– Who they areWho they are– What they doWhat they do– How they gain accessHow they gain access

• Cyber-crimeCyber-crime• Hackers:Hackers:

– Who they areWho they are– What they doWhat they do– How they gain accessHow they gain access

NEXT SLIDE

Page 27: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 27

Cyber-crimes and Cyber-criminalsCyber-crimes and Cyber-criminalsCyber-crimes and Cyber-criminalsCyber-crimes and Cyber-criminals

• Cyber-crimes are criminal Cyber-crimes are criminal acts conducted through acts conducted through the use of a computer:the use of a computer:– FraudFraud– Identity theftIdentity theft

• Cyber-criminals are Cyber-criminals are individuals who use a individuals who use a computer to commit a computer to commit a crimecrime

• Cyber-crimes are criminal Cyber-crimes are criminal acts conducted through acts conducted through the use of a computer:the use of a computer:– FraudFraud– Identity theftIdentity theft

• Cyber-criminals are Cyber-criminals are individuals who use a individuals who use a computer to commit a computer to commit a crimecrime

NEXT SLIDE

Page 28: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 28

Hackers Hackers Hackers Hackers

• Anyone who unlawfully accesses a Anyone who unlawfully accesses a computer systemcomputer system

• Types of hackers:Types of hackers:– Cracker Cracker – White-hatWhite-hat– Black-hatBlack-hat– Script kiddiesScript kiddies

• Anyone who unlawfully accesses a Anyone who unlawfully accesses a computer systemcomputer system

• Types of hackers:Types of hackers:– Cracker Cracker – White-hatWhite-hat– Black-hatBlack-hat– Script kiddiesScript kiddies

NEXT SLIDE

Page 29: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 29

What Hackers DoWhat Hackers DoWhat Hackers DoWhat Hackers Do

• Steal information from computers:Steal information from computers:– Credit card numbersCredit card numbers– Bank account numbersBank account numbers

• Internet packet sniffingInternet packet sniffing• Commit identity theftCommit identity theft• Create widespread computer attacks:Create widespread computer attacks:

– Backdoor programs (Trojan horse)Backdoor programs (Trojan horse)– Zombies Zombies

• Denial of service attacks (DoS)Denial of service attacks (DoS)• Distributed denial of service (DDoS) attacksDistributed denial of service (DDoS) attacks

NEXT SLIDE

Page 30: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 30

How Hackers Gain AccessHow Hackers Gain AccessHow Hackers Gain AccessHow Hackers Gain Access

• Direct access:Direct access:– Hacking softwareHacking software

• Indirect access:Indirect access:– Internet connectionInternet connection– Logical portsLogical ports

HTTP: 80HTTP: 80SMTP: 25SMTP: 25

• Direct access:Direct access:– Hacking softwareHacking software

• Indirect access:Indirect access:– Internet connectionInternet connection– Logical portsLogical ports

HTTP: 80HTTP: 80SMTP: 25SMTP: 25

NEXT SLIDE

Page 31: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 31

Computer SafeguardsComputer SafeguardsComputer SafeguardsComputer Safeguards

• Firewalls Firewalls • Viruses and antivirus softwareViruses and antivirus software

• Firewalls Firewalls • Viruses and antivirus softwareViruses and antivirus software

NEXT SLIDE

Page 32: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 32

Firewalls Firewalls Firewalls Firewalls

• Software programs or hardware designed Software programs or hardware designed to close logical ports to invadersto close logical ports to invaders

• Types of firewalls:Types of firewalls:– Norton Personal FirewallNorton Personal Firewall– McAfee FirewallMcAfee Firewall– Zone AlarmZone Alarm– BlackICE PC ProtectionBlackICE PC Protection– Network routersNetwork routers

• Software programs or hardware designed Software programs or hardware designed to close logical ports to invadersto close logical ports to invaders

• Types of firewalls:Types of firewalls:– Norton Personal FirewallNorton Personal Firewall– McAfee FirewallMcAfee Firewall– Zone AlarmZone Alarm– BlackICE PC ProtectionBlackICE PC Protection– Network routersNetwork routers

NEXT SLIDE

Page 33: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 33

Is your computer secure?Is your computer secure?Is your computer secure?Is your computer secure?

• Gibson Research CorporationGibson Research Corporation– www.grc.comwww.grc.com– ShieldsUPShieldsUP– LeakTestLeakTest

• QualysQualys– http://http://browsercheck.qualys.combrowsercheck.qualys.com

• Gibson Research CorporationGibson Research Corporation– www.grc.comwww.grc.com– ShieldsUPShieldsUP– LeakTestLeakTest

• QualysQualys– http://http://browsercheck.qualys.combrowsercheck.qualys.com

Page 34: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 34

Chapter 7 Summary QuestionsChapter 7 Summary QuestionsChapter 7 Summary QuestionsChapter 7 Summary Questions

• What is a network and what are the What is a network and what are the advantages of setting up one?advantages of setting up one?

• What is the difference between a What is the difference between a client/server network and a peer-to-peer client/server network and a peer-to-peer network?network?

• What are the main components of every What are the main components of every network?network?

• What are the most common home What are the most common home networks?networks?

• What is a network and what are the What is a network and what are the advantages of setting up one?advantages of setting up one?

• What is the difference between a What is the difference between a client/server network and a peer-to-peer client/server network and a peer-to-peer network?network?

• What are the main components of every What are the main components of every network?network?

• What are the most common home What are the most common home networks?networks?

NEXT SLIDE

Page 35: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 35

Chapter 7 Summary QuestionsChapter 7 Summary QuestionsChapter 7 Summary QuestionsChapter 7 Summary Questions

• What are power line networks?What are power line networks?• What are phone line networks?What are phone line networks?• What are Ethernet networks?What are Ethernet networks?• What are wireless networks?What are wireless networks?• How can hackers attack a network and How can hackers attack a network and

what harm can they cause?what harm can they cause?• What is a firewall and how does it keep my What is a firewall and how does it keep my

computer safe from hackers?computer safe from hackers?

• What are power line networks?What are power line networks?• What are phone line networks?What are phone line networks?• What are Ethernet networks?What are Ethernet networks?• What are wireless networks?What are wireless networks?• How can hackers attack a network and How can hackers attack a network and

what harm can they cause?what harm can they cause?• What is a firewall and how does it keep my What is a firewall and how does it keep my

computer safe from hackers?computer safe from hackers?

NEXT SLIDE