technology in actionstaff · •thief steals your name, address, social security number, and/or...

37
1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Upload: others

Post on 07-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

1

Technology in Action

Chapter 7

Networking and Security:

Connecting Computers and Keeping

Them Safe from Hackers and Viruses

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 2: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

2

Peer-to-Peer Networks

• Nodes communicate

with each other

– Peers

• Share peripheral

devices

• Used in home and

small office networks

• Poor Security

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 3: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

3

Client/Server Networks

• Client computers

– Users who make requests

• Server computers

– Provide resources to

clients

– Central network control

• Internet

– A large, multiserver,

multiclient network.

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 4: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

4

LANs and WANs

• Local area network (LAN)– Nodes are within a small geographic region

– Less than a mile across• Homes

• School Campus

• Commercial Campus

• Wide area network (WAN)– LANs connected over long distances

• A few miles to thousands of miles

• Use telecommunications lines

• Use microwave towers, satellites

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 5: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

5

MANs

• Metropolitan area network (MAN)

– Nodes are within a specific geographic region,

such as a city

– Sponsored by a government entity to provide

access to city residents and/or visitors

– Usually Wi-Fi service

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 6: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

6

Network Components

• Transmission media

• Network communication

devices

• Software

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 7: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

7

Transmission Media

• Provide communications channel between nodes

• Forms of media– Twisted pair

– Coaxial cable

– Fiber-optic cable

– Radio waves

– (Bluetooth)

– Microwave (Wi-Fi)

• Bandwidth– Data transfer rate

– Throughput

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

• Provide communications channel between nodes

• Forms of media– Twisted pair

– Coaxial cable

– Fiber-optic cable

– Radio waves

– (Bluetooth)

– Microwave (Wi-Fi)

• Bandwidth (frequencies)– Data transfer rate

– Throughput

Page 8: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

8

Network Adapters

• Devices connected to or installed in nodes

– Network interface cards (NICs)--Ethernet

– External or internal network adapters

• Enable communication between nodes

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 9: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

9

Network Navigation Devices

• Devices that help make data flow

possible

• Routers

– Route data between networks

• Switches

– Receive data and retransmit it to nodes

on the same network

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 10: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

10

Networking Software

• Peer-to-peer software

– Built into operating systems that support

networking

• Windows

• Mac OS

• Client/server software

– Network operating system (NOS) software

• Windows Server 2008

• SUSE Linux Enterprise

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 11: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

11

Types of Peer-to-Peer Networks

• Wired Ethernet networks

• Wireless Ethernet networks

• Power-line networks

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 12: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

12

Wired Ethernet Networks

• Ethernet network

adapters are used to

connect nodes– NIC card

– PC card

– USB adapter

• Computers are

connected to each

other using unshielded

twisted pair cable

Ethernet

Phone

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

RJ45 RJ11

Page 13: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

13

Ethernet Switches

• Keep track of data packets

• Amplify and retransmit signals

• Keep the network running efficiently

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 14: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

14

Ethernet Routers

• Transfer packets from one

network to another

• Home Internet routers

transfer data from the

Internet to the home

network (Wi-Fi capable).

• Allows for network-ready

devices such as network

printers or NAS (network

attached storage)

Router

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 15: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

15

Wireless Ethernet Networks

• Use micro waves to connect nodes

• Basically Ethernet networks that use micro waves instead of wires

• Based on the IEEE 802.11 standard, also known as Wi-Fi (Wireless Fidelity)

• Each node requires a wireless network adapter– Transceivers (dongle)

– WEP—no security

– WPA—no security

– WPA2—safe as of 2009

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 16: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

Wireless Challenges

• 802.11n standard not yet standardized

• 802.11g maximum range of 250 feet

• As distance increases, throughput

decreases.

• 802.11g works on a bandwidth of 2.4 Ghz

(the same as many cordless phones).

• Obstacles such as walls and metal objects

cause interference.

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 16

Page 17: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

Wireless Access Point (WAP)

• Device added to a wireless network to

extend the range of the network

• Must connect to either a switch, a router,

or a node on the network

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 17

Page 18: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

18

Power-Line Networks• Computers are

connected to a house’s electrical wiring to create a network.

• A power-line network adapter is used to connect nodes to electrical outlets.

• Security OK

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 19: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

19

Choosing a Peer-to-Peer Network

• Things to consider- Whether you want wireless communications

- How fast you want your network connection to be

- Whether existing wiring is available

- How much money you can spend on your network

- How much security needed

Comparing the Major Types of Home Networks

Wired

Ethernet

Wireless

802.11g

Wireless

Enhanced G

Wireless

802.11n

Maximum data

Transfer rate

(bandwidth)

100 Mbps to

1,000 bps

(1 gigabit)

54 Mbps 108 Mbps 540 Mbps

Relative installation

and equipment costs

for networking

two computers

$ $ $$ $$

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 20: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

20

Configuring Software

for a Home Network

• Windows

– Windows Vista Home versions

• Network Setup Wizard

– Wired or wireless

– Windows XP

• Network Setup Wizard

– Windows 98

• Configure manually

– Help has a clear instructionCopyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 21: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

21

Computer Threats

• Cybercrimes are criminal acts conducted

through the use of computers by

cybercriminals.

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 22: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

22

Hackers

• Anyone who unlawfully accesses a

computer system

• Types of hackers

– White hat

– Black hat

– Script kiddies

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 23: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

23

What Hackers Do

• Steal information from computers

– Credit card numbers

– Bank account numbers

• Internet packet sniffing

(eaves dropping)

• Commit identity theft

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 24: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

Identity Theft

• Thief steals your name, address, social security number, and/or bank account and credit card information

• Can result in credit problems and refusal of healthcare service if policy limits are exceeded

• Can be stolen using computer, theft of wallets and purses, mail, credit statements, or pretense of being a bank or credit company official

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 24

Page 25: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

Preventing Identity Theft

1. Never reveal password or PIN.

2. Never reveal personal information without first verifying you are dealing with a legitimate representative.

3. Create hard-to-guess passwords. Use a combination of letters and numbers

Avoid using obvious passwords

4. When shopping online, beware of unfamiliar merchants.

5. If you are a victim of identity theft, freeze credit history or place an extended fraud alert.

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 25

Page 26: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

26

How Computers Are Attacked

• Trojan horse (game,

screensaver)

• Backdoor program

– Zombies

• Denial of service

attacks (DoS)

• Distributed denial of

service attacks

(DDoS)

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 27: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

27

How Hackers Gain Access

• Direct access (physically present)

– Install Hacking

software

• Indirect access

– Internet connection

– Logical ports

(router prevents)

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 28: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

28

Computer Safeguards:

Firewalls

• Software programs or hardware designed

to close logical ports to invaders

– A firewall is built into Windows Vista.

– More robust firewalls are available from

other vendors.

– Firewalls are critical if you have an always-

on broadband connection.

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 29: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

29

Protecting a Wireless Network

• Wireless network range doesn’t stop at the

property line.

• Default device and network ID settings

allow intruders to enter the network.

• Internet bandwidth can be stolen.

• Computers can be vulnerable to hacker

intrusion and takeover.

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 30: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

30

Computer Threats: Viruses

• A virus is a program that attaches itself to

another program and spreads itself to

other computers.

• Viruses are hidden within the code of a

host program.

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 31: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

31

How Does a Computer

Catch a Virus?• Viruses copy

themselves

• Infect a file on your computer

• Spread by sharing disks or flash drives

• E-mail attachments are the most likely source of a virus

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 32: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

32

What Viruses Do

• Replicate themselves

– Slow down networks

• Secondary objectives

– Display annoying messages

– Delete files on the hard drive

– Change computer settings

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 33: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

33

Types of Viruses

• Boot-sector viruses– Replicate themselves in the boot sector of the

hard drive

• Logic bombs– Activate when certain conditions are met

• Time bombs– Triggered by the passage of time or on a

certain date

• Worms– Travel between systems through networks

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 34: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

34

Types of Viruses• Script viruses

– Hidden on Web pages as mini programs

• Macro viruses– Attached to Word documents or Excel

spreadsheets

– Series of commands

• E-mail viruses– Use e-mail address books to distribute the

virus

• Encryption viruses– Compress files using a complex encryption key

– User must pay to get the files unlocked

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 35: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

35

Virus Classifications

• Polymorphic viruses

– Periodically rewrite themselves to avoid

detection

• Multipartite viruses

– Infect multiple file types

• Stealth viruses

– Erase their code from the hard drive and

reside in the active memory

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Page 36: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

36

Antivirus Software• Programs designed to

detect viruses– Scan files looking for virus

signatures (unique code)

– Provide options for deleting or fixing infected files

– Inoculate files against further infection

• Detects known viruses

• Needs to be updated frequently

• Norton, McAfee, Eset

• AVG—free at download.com

l

Page 37: Technology in Actionstaff · •Thief steals your name, address, social security number, and/or bank account and credit card information •Can result in credit problems and refusal

Other Security Measures

• Keep operating system (OS) up to date.

• Load security patches as soon as they are

available.

• Enable automatic updates.

• Use the latest version of your Web

browser.

Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 37