33
Technology in Technology in Action Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Embed Size (px)

Citation preview

Page 1: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Technology in ActionTechnology in Action

Chapter 7

Networking and Security:Connecting Computers and Keeping Them Safe from

Hackers and Viruses

Page 2: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Chapter Seven ObjectivesChapter Seven Objectives• Networks

– Client/Server– Main components– Common types

• Hackers and harm

• Firewall

• Viruses

• Protection

Page 3: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Networking FundamentalsNetworking Fundamentals

• Definition

• Benefits

• Internet share

Page 4: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Network ArchitecturesNetwork Architectures

• Nodes

• Peer-to-peer

• Client/Server

Page 5: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Networks and DistanceNetworks and Distance

• LAN

• WAN

Page 6: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Data Transmission MediaData Transmission Media

• Twisted pair

• Coaxial

• Fiber optic

Page 7: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Data Navigation DevicesData Navigation Devices

• Packets

• Routers

• Hubs

Page 8: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Networking SoftwareNetworking SoftwareFor peer-to-peer

For client/server

Page 9: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Peer-to-Peer Network TypesPeer-to-Peer Network Types

• Power line

• Phone line

• Ethernet

• Wireless

Page 10: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Power Line NetworksPower Line Networks

• Uses house wiring– Max at 14 Mbps

• Power line network adapter– USB or Ethernet

• Plug and play– Software

• Routers and hubs • Uses phone lines

and jacks– Sharing with

phones– Max at 10 Mbps

• HPNA adapter or USB

• Routers and hubs

Page 11: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Ethernet Networks Ethernet Networks

• Most efficient– Usual speed at 100 Mbps

• Use unshielded twisted pair cable (UTP)

• Use routers and hubs

• Use NICS (network interface cards)

Page 12: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Ethernet CablingEthernet Cabling

• Installation, distance

• UTP categories

Cable CategoryMaximum Data Transfer Rate

Category 5 (CAT 5) 100 Mbps

Category 5E (CAT 5E) 200 Mbps

Category 6 (CAT 6) 1000 Mbps (1 Gbps)

Fig 7.11

Page 13: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Ethernet ArchitectureEthernet Architecture

• Hubs

• Routers– DSL/cable routers

• Internet

Page 14: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Wireless NetworksWireless Networks

• Radio waves, not cabling

• Wi-Fi – Several IEEE standards

• Wireless network adapter

• Transceiver

Page 15: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Wireless ConsiderationsWireless Considerations

• Range, signal degradation

• Node positions– Wireless access point

• Internet connection– Wireless DSL/cable routers

Page 16: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Peer-to-Peer QuestionsPeer-to-Peer Questions

• Existing wiring?

• Wireless also?

• How fast?

• Budget?

Page 17: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Comparing Home Networks Comparing Home Networks

Factors: Power Line

Phone Line

Ethernet

Wireless

Maximum data transfer rate (throughput)

14 Mbps

10 Mbps

100 to 1000 Mbps

11 to 54 Mbps

Approximate cost to network two computers (adapters and wiring only)

$160 $120 $135 $225

Additional cost for adding Internet connection sharing

$80 $120 $0 $40

Approximate cost to add a computer to network

$80 $60 $40 $60

Page 18: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Configuring Home Network Configuring Home Network SoftwareSoftware

• With XP

• With OS mix

• Without XP

Page 19: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Computer SafetyComputer Safety

• Cybercrime

• Cybercriminals

Page 20: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Computer Threats: Hackers Computer Threats: Hackers

• White hat

• Black hat

• Script kiddies

Why Hack?Credit cards

Packet sniffer

Identity theft

Page 21: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Safety TipsSafety Tips

• Hide passwords, pins

• Personal info

• Passwords:– Numbers and letters

– Obscure letter combinations

• FTC Identity Theft

Page 22: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Hacker ActivitiesHacker Activities• Trojan horses

– Far-reaching damage

– Back-door programs

• Denial of service

• Distributed DOS• Hacker access:

– Directly– Via logical ports

Page 23: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Firewall ProtectionFirewall Protection

Software– Easy, port protection

Hardware

Page 24: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Firewalls…Firewalls…

• Block ports

• Hide network address

• Use packet-filtering

• Use NAT

Page 25: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Computer-At-Risk TestingComputer-At-Risk Testing

• Free test fromGibson Research Corporation

Page 26: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Computer VirusesComputer Viruses

• Definition

• Kinds of damage

• Virus sources

Page 27: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Computer Viruses: TypesComputer Viruses: Types

• Grouped by behavior and method of transmission– Boot sector

– Logic bombs

– Worms

– Script and macro

– Trojan Horses

Page 28: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

How Viruses Avoid DetectionHow Viruses Avoid Detection

• Polymorphic

• Multi-partite

• Stealth

Page 29: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Antivirus SoftwareAntivirus Software

• Norton

Page 30: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Antivirus SoftwareAntivirus Software

• Virus signatures

• Known viruses

• “Signature” updates

Page 31: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Other Security MeasuresOther Security Measures

• Update OS– System updates

– Security patches

Page 32: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Networking and Security Networking and Security Topic SummaryTopic Summary

• What is a network– Advantages

• Difference between a client/server network

and a peer-to-peer (P2P)

• Main network components

• Common home networks

• Power line networks

• Phone line networks

Page 33: Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Networking and Security Networking and Security Topic SummaryTopic Summary

• Ethernet networks

• Wireless networks

• How hackers attack– Harm

• Firewall– How does it keep a computer safe

• Viruses

• Protection