Professional Documents
Culture Documents
Networking Security
Networking Security
– Transferring files
3 4
1
Peer-to-Peer Networks Client/Server Networks
• Nodes communicate • Client computers:
with each other: – Users who make
requests
– Peers
• Server computers:
• Share peripheral – Provide resources to
devices clients
• Used in home and – Central network control
small office networks • Internet
– A large, multiserver,
multiserver,
multiclient network.
5 6
2
Transmission Media Network Adapters
• Provides communications channel between
nodes • Devices connected to or installed in nodes:
• Forms of media: – Network interface cards (NICs
(NICs))
– Twisted pair
– External network adapters
– Coaxial cable
– Fiber-optic cable • Enable communication between nodes
– Radio waves:
• Wireless
• Bandwidth:
– Data transfer rate
– Throughput
9 10
3
Types of Peer-to-Peer Networks Wired Ethernet Networks
• Ethernet network
• Wired Ethernet networks
adapters are used to
• Wireless Ethernet networks connect nodes
• Power-line networks – NIC card
– PC Card
– USB adapter
• Computers are Ethernet
connected to each
other using unshielded
twisted pair cable Phone
13 14
15 16
4
Wireless Ethernet Networks Power-Line Networks
• Uses radio waves to connect nodes • Computers are
• Basically an Ethernet network that uses radio connected to a
waves instead of wires house’
house’s electrical
• Each node requires a wireless network adapter: wiring to create a
– Transceivers network
• Power-line network
adapter is used to
connect nodes to
electrical outlets
17 18
19 20
5
Computer Threats Hackers
• Cybercrimes are criminal acts conducted through
• Anyone who unlawfully accesses a
the use of computers by cybercriminals.
cybercriminals.
computer system
• Types of hackers:
– White-hat
– Black-hat
– Script kiddies
21 22
23 24
6
Computer Safeguards:
How Hackers Gain Access
Firewalls
• Direct access: • Software programs or hardware
– Hacking software designed to close logical ports to
• Indirect access: invaders
– Internet connection – A firewall is built into Windows Vista
– Logical ports – More robust firewalls are available from
other vendors
– Firewalls are critical if you have an always-
on broadband connection
25 26
27 28
7
How Does a Computer
What Viruses Do
Catch a Virus?
• Viruses copy • Replicate themselves:
themselves – Slow down networks
• Infect a file on
your computer • Secondary objectives:
• Spread by sharing – Display annoying messages
disks or flash – Delete files on the hard drive
drives – Change computer settings
• E-mail
attachments are
the most likely
source of a virus
29 30
31 32
8
Virus Classifications Antivirus Software
• Polymorphic viruses: • Programs designed to detect viruses:
– Scan files looking for virus signatures (unique code)
– Periodically rewrite themselves to avoid – Provide options for deleting or fixing infected files
detection – Inoculate files against further infection
• Detect known viruses
• Multipartite viruses: • Antivirus programs need to be updated frequently
– Infect multiple file types
• Stealth viruses:
– Erase their code from the hard drive and
reside in the active memory
33 34