Professional Documents
Culture Documents
Web Application-class-XI-Unit1-Basics of Networking
Web Application-class-XI-Unit1-Basics of Networking
Web Application-class-XI-Unit1-Basics of Networking
Unit-1
BASICS OF NETWORKING AND WEB
ARCHITECTURE
Basic Networking Concepts
Figure 1.2 Network interface card Figure 1.3 Network interface card
Network Terminologies
Some terminologies commonly used in networking.
1. Nodes (Workstations) : A computer becomes a node (also called a workstation) as soon as it
is attached to a network. Each user on a network works on a workstation. If there are no
nodes there would be no network.
Figure 2.6 RJ 45
Network Devices
Ethernet Card
• Ethernet card, also known as network interface card (NIC), is a hardware component used
by computers to connect to Ethernet LAN and communicate with other devices on the LAN.
• The earliest Ethernet cards were external to the system and needed to be installed manually.
In modern computer systems, it is an internal hardware component.
• The NIC has RJ45 socket where network cable is physically plugged in.
– Virus - A computer virus is a type of computer program that, when executed, replicates itself by
modifying other computer programs and inserting its own code. When this replication succeeds, the
affected areas are then said to be "infected" with a computer virus.
– Worm - A computer worm is a type of malware that spreads copies of itself
from computer to computer. A worm can replicate itself without any human interaction, and it does
not need to attach itself to a software program in order to cause damage.
– Trojan Horse - A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate
but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general
inflict some other harmful action on your data or network.
Eavesdropping
Eavesdropping is the act of secretly or stealthily listening to the
private conversation or communications of others without
their consent in order to gather information. The practice is
widely regarded as unethical, and in many jurisdictions is
illegal.
Denial of Service
A Denial-of-Service (DoS) attack is an attack meant to shut down
a machine or network, making it inaccessible to its intended
users.
A denial-of-service attack is a security event that occurs when an
attacker prevents legitimate users from accessing specific
computer systems, devices, services or other IT resources.
Denial-of-service (DoS) attacks typically flood servers, systems
or networks with traffic in order to overwhelm the victim's
resources and make it difficult or impossible for legitimate
users to access them.
Phishing
Phishing is a cybercrime in which a target or targets are
contacted by email, telephone or text message by someone
posing as a legitimate institution to lure individuals into
providing sensitive data such as personally identifiable
information, banking and credit card details, and passwords.
Cyber Crime
Cybercrime, or computer-oriented crime, is a crime that involves a computer
and a network. The computer may have been used in the commission of a
crime, or it may be the target. Cybercrime may threaten a person,
company or a nation's security and financial health.
Here are some specific examples of the different types of cybercrime:
• Email and internet fraud.
• Identity fraud (where personal information is stolen and used).
• Theft of financial or card payment data.
• Theft and sale of corporate data.
• Cyberextortion (demanding money to prevent a threatened attack).
• Ransomware attacks (a type of cyberextortion).
• Cryptojacking (where hackers mine cryptocurrency using resources they do not own).
Cryptojacking is the malicious use of a person or persons' computing power to mine
cryptocurrencies without consent. Often the victim has no idea their device is being used.
Cryptojacking has quickly become one the most common forms of malware.
• Cyberespionage (where hackers access government or company data).
Cyber Law
Cyber law is the part of the overall legal system that deals with
the Internet, cyberspace, and their respective legal issues.
Cyber law covers a fairly broad area, encompassing several
subtopics including freedom of expression, access to and
usage of the Internet, and online privacy. Generically, cyber
law is referred to as the Law of the Internet.
Cyber offence under IT Act
• Tampering with computer source document – Section 65
• Hacking – Section 66
• Publishing of information which is obscene in electronic form Section - 67
Intellectual Property Rights (IPR) Issues
Intellectual property rights are the rights given to persons over
the creations of their minds. They usually give the creator an
exclusive right over the use of his/her creation for a certain
period of time.
• Trademarks – Used to protect brand logos, company names, phrases, and
symbols.
• Patents – Used to protect manufacturing or design processes.
• Copyrights – Used to protect original works, such as art, dances, or
literature.
Network Security Tools and Services
• Firewall is a network security system that monitors and controls incoming
and outgoing network traffic based on predetermined security rules. A
firewall typically establishes a barrier between a trusted network and an
un-trusted network, such as the Internet.
• Antivirus Software that is created specifically to help detect, prevent and
remove malware (malicious software). Antivirus is a kind of software used
to prevent, scan, detect and delete viruses from a computer.
• Password Manager is a computer program that allows users to store,
generate, and manage their personal passwords for online services. A
password manager assists in generating and retrieving
complex passwords, potentially storing such passwords in
an encrypted database or calculating them on demand.