chapter 7

33
Technology in Technology in Action Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Upload: networkingcentral

Post on 27-Jun-2015

286 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter 7

Technology in ActionTechnology in Action

Chapter 7

Networking and Security:Connecting Computers and Keeping Them Safe from

Hackers and Viruses

Page 2: Chapter 7

Chapter Seven ObjectivesChapter Seven Objectives• Networks

– Client/Server– Main components– Common types

• Hackers and harm

• Firewall

• Viruses

• Protection

Page 3: Chapter 7

Networking FundamentalsNetworking Fundamentals

• Definition

• Benefits

• Internet share

Page 4: Chapter 7

Network ArchitecturesNetwork Architectures

• Nodes

• Peer-to-peer

• Client/Server

Page 5: Chapter 7

Networks and DistanceNetworks and Distance

• LAN

• WAN

Page 6: Chapter 7

Data Transmission MediaData Transmission Media

• Twisted pair

• Coaxial

• Fiber optic

Page 7: Chapter 7

Data Navigation DevicesData Navigation Devices

• Packets

• Routers

• Hubs

Page 8: Chapter 7

Networking SoftwareNetworking SoftwareFor peer-to-peer

For client/server

Page 9: Chapter 7

Peer-to-Peer Network TypesPeer-to-Peer Network Types

• Power line

• Phone line

• Ethernet

• Wireless

Page 10: Chapter 7

Power Line NetworksPower Line Networks

• Uses house wiring– Max at 14 Mbps

• Power line network adapter– USB or Ethernet

• Plug and play– Software

• Routers and hubs • Uses phone lines

and jacks– Sharing with

phones– Max at 10 Mbps

• HPNA adapter or USB

• Routers and hubs

Page 11: Chapter 7

Ethernet Networks Ethernet Networks

• Most efficient– Usual speed at 100 Mbps

• Use unshielded twisted pair cable (UTP)

• Use routers and hubs

• Use NICS (network interface cards)

Page 12: Chapter 7

Ethernet CablingEthernet Cabling

• Installation, distance

• UTP categories

Cable CategoryMaximum Data Transfer Rate

Category 5 (CAT 5) 100 Mbps

Category 5E (CAT 5E) 200 Mbps

Category 6 (CAT 6) 1000 Mbps (1 Gbps)

Fig 7.11

Page 13: Chapter 7

Ethernet ArchitectureEthernet Architecture

• Hubs

• Routers– DSL/cable routers

• Internet

Page 14: Chapter 7

Wireless NetworksWireless Networks

• Radio waves, not cabling

• Wi-Fi – Several IEEE standards

• Wireless network adapter

• Transceiver

Page 15: Chapter 7

Wireless ConsiderationsWireless Considerations

• Range, signal degradation

• Node positions– Wireless access point

• Internet connection– Wireless DSL/cable routers

Page 16: Chapter 7

Peer-to-Peer QuestionsPeer-to-Peer Questions

• Existing wiring?

• Wireless also?

• How fast?

• Budget?

Page 17: Chapter 7

Comparing Home Networks Comparing Home Networks

Factors: Power Line

Phone Line

Ethernet

Wireless

Maximum data transfer rate (throughput)

14 Mbps

10 Mbps

100 to 1000 Mbps

11 to 54 Mbps

Approximate cost to network two computers (adapters and wiring only)

$160 $120 $135 $225

Additional cost for adding Internet connection sharing

$80 $120 $0 $40

Approximate cost to add a computer to network

$80 $60 $40 $60

Page 18: Chapter 7

Configuring Home Network Configuring Home Network SoftwareSoftware

• With XP

• With OS mix

• Without XP

Page 19: Chapter 7

Computer SafetyComputer Safety

• Cybercrime

• Cybercriminals

Page 20: Chapter 7

Computer Threats: Hackers Computer Threats: Hackers

• White hat

• Black hat

• Script kiddies

Why Hack?Credit cards

Packet sniffer

Identity theft

Page 21: Chapter 7

Safety TipsSafety Tips

• Hide passwords, pins

• Personal info

• Passwords:– Numbers and letters

– Obscure letter combinations

• FTC Identity Theft

Page 22: Chapter 7

Hacker ActivitiesHacker Activities• Trojan horses

– Far-reaching damage

– Back-door programs

• Denial of service

• Distributed DOS• Hacker access:

– Directly– Via logical ports

Page 23: Chapter 7

Firewall ProtectionFirewall Protection

Software– Easy, port protection

Hardware

Page 24: Chapter 7

Firewalls…Firewalls…

• Block ports

• Hide network address

• Use packet-filtering

• Use NAT

Page 25: Chapter 7

Computer-At-Risk TestingComputer-At-Risk Testing

• Free test fromGibson Research Corporation

Page 26: Chapter 7

Computer VirusesComputer Viruses

• Definition

• Kinds of damage

• Virus sources

Page 27: Chapter 7

Computer Viruses: TypesComputer Viruses: Types

• Grouped by behavior and method of transmission– Boot sector

– Logic bombs

– Worms

– Script and macro

– Trojan Horses

Page 28: Chapter 7

How Viruses Avoid DetectionHow Viruses Avoid Detection

• Polymorphic

• Multi-partite

• Stealth

Page 29: Chapter 7

Antivirus SoftwareAntivirus Software

• Norton

Page 30: Chapter 7

Antivirus SoftwareAntivirus Software

• Virus signatures

• Known viruses

• “Signature” updates

Page 31: Chapter 7

Other Security MeasuresOther Security Measures

• Update OS– System updates

– Security patches

Page 32: Chapter 7

Networking and Security Networking and Security Topic SummaryTopic Summary

• What is a network– Advantages

• Difference between a client/server network

and a peer-to-peer (P2P)

• Main network components

• Common home networks

• Power line networks

• Phone line networks

Page 33: Chapter 7

Networking and Security Networking and Security Topic SummaryTopic Summary

• Ethernet networks

• Wireless networks

• How hackers attack– Harm

• Firewall– How does it keep a computer safe

• Viruses

• Protection