2013 - Networksx - swd2011

homuskratNetworking and Communications

Nov 20, 2013 (3 years and 8 months ago)

66 views

CHAPT ER

2

NETWORKS

HOMEWORK


Complete Chapter 2 end of book questions.


Questions



1,3,6,9,11,12


13,14,15,16, 17,18


23,24,25


34,35,36,37


38,39


40,43


CONTENTS


Types of Networks


Network Topologies


Network Security Threats


Network Protection


TYPES OF NETWORKS


LAN


Local Area Network


Own personal private internet


P2P


Peer to Peer


Kazaa
,
Emule
,
etc


Each computer stores it’s own data and information


Client
-
Server


Minecraft
, World of
Warcraft

etc


Host acts as servers and clients rely on server for resources.


WAN


Wide Area Networks


The Internet


Combined medium and networks.

NETWORKS TOPOLOGIES


Bus Networks


Share single data path



Star Networks


All computers connect

to a central switch/router



Hybrids


Star networks connected


by bus



NETWORK SECURITY THREATS


Accidental Threats






Deliberate Threats




ACCIDENTAL THREATS


Delete Files


Lost/dropped USB drive


Misuse


Corrupt Files


Damage HDD


Power surges


DELIBERATE THREATS


Hackers


Encryption cracking


P
assword cracking


Brute Force


Dictionary etc.


Packet interception


Port Spoofing or Scanning


DoS

(Denial of Service) and
dDos

(distributed
DoS
)


Malware


Viruses


Replicating, corrupting, requires human intervention


Worms


Replicating, consume bandwidth, requires network
activity


Trojans/Backdoors


opening access to outsiders


Spyware


Rootkits, Key
-
loggers, relay personal details online


WHAT IS AN ENCRYPTION?


Modify information in a secret way



Eg



NSI FNT JUD MBT TJT CPS JOH BTI FMM


encrypted data



NSIFNTJUDMBTTJTCPSJOHBTIFMM


“one letter back”


MRHEMSITCLASSISBORINGASHELL




MR HEMS IT CLASS IS BORING AS HELL



JGZ PRX PSL PVU HJW FNF BUI VNC TVQ


encypted

data


Work it out




MORE NETWORKS AND SERVERS


VPN (Virtual Private Network)


Encryption tunnel through network


Eg

proxy servicer,
hamachi


Proxy Server


Act as an in between server


Web Server


Servers that are available in the internet


NAS (Networked Attached Storage)


Storage device connected to the network (
eg
. Router or
hub) so all Computers can access.


NETWORK PROTECTION


User Profiles and Passwords


Wireless Security (WEP, WPA, WPA2)


Anti
-
Malware Scanners


Anti Virus


Anti Spam


Anti Spyware etc.


Firewalls


Hardware
eg
. Home routers, restrict MAC access


Software

eg
. Windows Firewall