chapter 7
TRANSCRIPT
![Page 1: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/1.jpg)
Technology in ActionTechnology in Action
Chapter 7
Networking and Security:Connecting Computers and Keeping Them Safe from
Hackers and Viruses
![Page 2: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/2.jpg)
Chapter Seven ObjectivesChapter Seven Objectives• Networks
– Client/Server– Main components– Common types
• Hackers and harm
• Firewall
• Viruses
• Protection
![Page 3: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/3.jpg)
Networking FundamentalsNetworking Fundamentals
• Definition
• Benefits
• Internet share
![Page 4: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/4.jpg)
Network ArchitecturesNetwork Architectures
• Nodes
• Peer-to-peer
• Client/Server
![Page 5: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/5.jpg)
Networks and DistanceNetworks and Distance
• LAN
• WAN
![Page 6: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/6.jpg)
Data Transmission MediaData Transmission Media
• Twisted pair
• Coaxial
• Fiber optic
![Page 7: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/7.jpg)
Data Navigation DevicesData Navigation Devices
• Packets
• Routers
• Hubs
![Page 8: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/8.jpg)
Networking SoftwareNetworking SoftwareFor peer-to-peer
For client/server
![Page 9: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/9.jpg)
Peer-to-Peer Network TypesPeer-to-Peer Network Types
• Power line
• Phone line
• Ethernet
• Wireless
![Page 10: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/10.jpg)
Power Line NetworksPower Line Networks
• Uses house wiring– Max at 14 Mbps
• Power line network adapter– USB or Ethernet
• Plug and play– Software
• Routers and hubs • Uses phone lines
and jacks– Sharing with
phones– Max at 10 Mbps
• HPNA adapter or USB
• Routers and hubs
![Page 11: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/11.jpg)
Ethernet Networks Ethernet Networks
• Most efficient– Usual speed at 100 Mbps
• Use unshielded twisted pair cable (UTP)
• Use routers and hubs
• Use NICS (network interface cards)
![Page 12: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/12.jpg)
Ethernet CablingEthernet Cabling
• Installation, distance
• UTP categories
Cable CategoryMaximum Data Transfer Rate
Category 5 (CAT 5) 100 Mbps
Category 5E (CAT 5E) 200 Mbps
Category 6 (CAT 6) 1000 Mbps (1 Gbps)
Fig 7.11
![Page 13: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/13.jpg)
Ethernet ArchitectureEthernet Architecture
• Hubs
• Routers– DSL/cable routers
• Internet
![Page 14: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/14.jpg)
Wireless NetworksWireless Networks
• Radio waves, not cabling
• Wi-Fi – Several IEEE standards
• Wireless network adapter
• Transceiver
![Page 15: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/15.jpg)
Wireless ConsiderationsWireless Considerations
• Range, signal degradation
• Node positions– Wireless access point
• Internet connection– Wireless DSL/cable routers
![Page 16: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/16.jpg)
Peer-to-Peer QuestionsPeer-to-Peer Questions
• Existing wiring?
• Wireless also?
• How fast?
• Budget?
![Page 17: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/17.jpg)
Comparing Home Networks Comparing Home Networks
Factors: Power Line
Phone Line
Ethernet
Wireless
Maximum data transfer rate (throughput)
14 Mbps
10 Mbps
100 to 1000 Mbps
11 to 54 Mbps
Approximate cost to network two computers (adapters and wiring only)
$160 $120 $135 $225
Additional cost for adding Internet connection sharing
$80 $120 $0 $40
Approximate cost to add a computer to network
$80 $60 $40 $60
![Page 18: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/18.jpg)
Configuring Home Network Configuring Home Network SoftwareSoftware
• With XP
• With OS mix
• Without XP
![Page 19: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/19.jpg)
Computer SafetyComputer Safety
• Cybercrime
• Cybercriminals
![Page 20: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/20.jpg)
Computer Threats: Hackers Computer Threats: Hackers
• White hat
• Black hat
• Script kiddies
Why Hack?Credit cards
Packet sniffer
Identity theft
![Page 21: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/21.jpg)
Safety TipsSafety Tips
• Hide passwords, pins
• Personal info
• Passwords:– Numbers and letters
– Obscure letter combinations
• FTC Identity Theft
![Page 22: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/22.jpg)
Hacker ActivitiesHacker Activities• Trojan horses
– Far-reaching damage
– Back-door programs
• Denial of service
• Distributed DOS• Hacker access:
– Directly– Via logical ports
![Page 23: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/23.jpg)
Firewall ProtectionFirewall Protection
Software– Easy, port protection
Hardware
![Page 24: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/24.jpg)
Firewalls…Firewalls…
• Block ports
• Hide network address
• Use packet-filtering
• Use NAT
![Page 25: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/25.jpg)
Computer-At-Risk TestingComputer-At-Risk Testing
• Free test fromGibson Research Corporation
![Page 26: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/26.jpg)
Computer VirusesComputer Viruses
• Definition
• Kinds of damage
• Virus sources
![Page 27: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/27.jpg)
Computer Viruses: TypesComputer Viruses: Types
• Grouped by behavior and method of transmission– Boot sector
– Logic bombs
– Worms
– Script and macro
– Trojan Horses
![Page 28: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/28.jpg)
How Viruses Avoid DetectionHow Viruses Avoid Detection
• Polymorphic
• Multi-partite
• Stealth
![Page 29: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/29.jpg)
Antivirus SoftwareAntivirus Software
• Norton
![Page 30: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/30.jpg)
Antivirus SoftwareAntivirus Software
• Virus signatures
• Known viruses
• “Signature” updates
![Page 31: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/31.jpg)
Other Security MeasuresOther Security Measures
• Update OS– System updates
– Security patches
![Page 32: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/32.jpg)
Networking and Security Networking and Security Topic SummaryTopic Summary
• What is a network– Advantages
• Difference between a client/server network
and a peer-to-peer (P2P)
• Main network components
• Common home networks
• Power line networks
• Phone line networks
![Page 33: Chapter 7](https://reader035.vdocuments.us/reader035/viewer/2022070321/558e5ded1a28ab01548b472d/html5/thumbnails/33.jpg)
Networking and Security Networking and Security Topic SummaryTopic Summary
• Ethernet networks
• Wireless networks
• How hackers attack– Harm
• Firewall– How does it keep a computer safe
• Viruses
• Protection