connecting computers and keeping them safe from hackers and viruses bradie britzmann and courtney...
TRANSCRIPT
Britzmann & Hughes
Networking and SecurityConnecting Computers and Keeping them safe from Hackers and Viruses
Bradie Britzmann and Courtney Hughes
Britzmann & Hughes
What is a Network?A computer network is simply two or more
computers that are connected using software and hardware so that they can communicate
Britzmann & Hughes
What are the Advantages of setting up a Network?Networks allow users to:1. Share peripherals2. Transfer files easily3. Share an internet connection
Britzmann & Hughes
What is a client/server network?Most networks that have ten or more nodes
are client/server networksContain two types of computers1. Client computer on which users
accomplish specific tasks2. A server computer that provides resources
to the clients and central control for the network
Britzmann & Hughes
What is a peer-to-peer network?In peer-to-peer networks, each node
connected to the network can communicate directly with every other node instead of having a separate device exercise central control over the network
Peer-to-peer networks are the most common installed in homes
Britzmann & Hughes
What are the main hardware components of every network?1. transition media (cables or radio waves) to
connect and establish communication between nodes
2. Network adaptors that allow the nodes on the network to communicate
3. Network navigation devices ( routers and hubs) that move data around the network
4. software that allows the network to run
Britzmann & Hughes
What are the most common home networks?The two most common home networks are
wired ethernet and wireless ethernetModern powerline networks, boasting faster
data through, are now a viable option in certain situations
The major difference in these networks is the transition media by which the nodes are connected
Britzmann & Hughes
What are wired ethernet networks?Ethernet networks use the ethernet protocol
as the means by which the nodes on the network communicate
This protocol ethernet networks efficient but also slightly complex
Because of this complexity, additional devices (switchers and routers) are required in ethernet networks
Britzmann & Hughes
How are ethernet networks created?To create a wired ethernet network, you
connect or install network adaptors or NICs to each network node
Network adaptors connect via cables to a central network navigation device such as a switch or router
Data flows through the navigation device to the nodes on the network
Britzmann & Hughes
What are wireless ethernet networks?A wireless network uses radio waves instead
of wires or cable as its transition mediaCurrent wireless protocols provide for
networks with a maximun of 108 Mbps
Britzmann & Hughes
How to create a wireless ethernet networkTo create a wireless network, you install or
attach wireless network adaptors to the nodes that will make up the network
If the nodes are unable to communicate because of distance, then you can add a wireless access point to the network to help relay the data between nodes.
Wireless networks are susceptible to inference from other wireless devices such as phones
Britzmann & Hughes
How are powerline networks created?Powerline networks use electrical wiring in
your home to connect the nodes in the network
To create a powerline network, you connect special network adaptors to each node on the network
These adaptors are then plugged in to an electrical outlet, and data is transmitted through the electrical wires
Britzmann & Hughes
How do I configure my computers software to set up a network?Windows vista and XP both feature software
wizards that facilitate the setup of both wire and wireless networks
Plug in the modem, routers, and all cables and then switch on the modem, router, and computers
Run the wizards which should guide you through the process
Make sure each computer has a distinct name and insure that all computers are in the same work group
Britzmann & Hughes
How can hackers hack a network?A hacker is defined as anyone who breaks
into a computer system unlawfullyHackers can use software to break into
almost any computer connected to the internet
Once hackers gain access to a computer, they can potentially steal personal information, damage and destroy data, or use the computer to attack other computers
Britzmann & Hughes
What is a firewall and how does it keep my computer safe from hackers?Firewalls are software programs or hardware
devices designed to keep computers safe from hackers
By using a personal firewall, you can close open logical ports to invaders and potentially make your computer invisible to other computers on the internet
Britzmann & Hughes
Why are wireless networks more vulnerable than wired networks?Wireless networks are even more susceptible
to hacking than wired networks because the signal of most wireless networks extend beyond the walls of your home.
Neighbors may unintentionally or intentionally connect to the internet through your wireless connection and hackers may try to access it
Britzmann & Hughes
What special precautions are required to insure my wireless network is secure?To prevent unwanted intrusions into your
network, you should change the default password on your router, use a hard to guess SSID, turn off SSID broadcasting, and enable security protocols such as WPA or WED
Britzmann & Hughes
From which types of viruses do I need to protect my computer?A computer virus is a program that attaches itself
to another program and attempts to spread itself to other computers when files are exchanged.
Computer viruses can be grouped into 6 categories
1. boot-sector viruses2. logic bombs and time bombs3. worms4. scripts and macros5. encryption viruses6. trojan horses
Britzmann & Hughes
What can I do to protect my computer from viruses?The best defense against viruses is to install
antivirus software.You should update the software on a regular
basis and configure it to examine all email attachments for viruses.
You should periodically run a complete virus scan on your computer to ensure that no viruses have made it onto your hard drive.
Britzmann & Hughes
https://www.youtube.com/watch?v=sxal31zIKdE
Britzmann & Hughes
1. What is the term for anyone who breaks into a computer system unlawfully?HackerHackers can use software to break into
almost any computer connected to the internet
Britzmann & Hughes
2. Explain what fiber-optic, twisted-pair cable, and coaxial cable is and which is able to transmit data the fastest?
Fiber optic cable: a cable that transmits data at close to the speed of light along glass or plastic fibers
Twisted-pair cable: cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket
Coaxial cable: a single copper wire surrounded by layers of plastic insulation and sheathing used mainly in cable tv and cable internet
Britzmann & Hughes
3. What program appears to be something useful or desirable, but at the same time, does something malicious in the background?Trojan Horse
Britzmann & Hughes
4. What have denial of service (DDoS) attacks been associated with?Scientology campaign called Project
Chanology, ex. Ebay, Amazon, online games
Britzmann & Hughes
5. What is a firewall and what is its main purpose?Firewalls are software programs or hardware
devices designed to keep computers safe from hackers