SlideShare uma empresa Scribd logo
1 de 27
Technology in Action Overview of Chapter 7 & 9

By Harbakshish Singh
Fundamentals of Networking
A computer
network has
two or more
computers

There are two
categories of
networks
(LANs and
WANs)

They are
connected via
software and
hardware

Any device
connected to
network is
called node
Advantages of Networks
Share an Internet
connection
Conserve
Resources

Centralized
Administration

Lower cost
licensing

Share printers
and other
peripheral
devices
Share files and
communicate
with computers

Avoid file
duplication and
corruption
Disadvantages of Networks

Viruses

Hacking

Network
failure

Expert
support
required

Cost

Slow service
Ways to classify Networks
PAN (A
personal area
network)

LAN (A local
area network)

MAN (A
metropolitan
area network)

HAN (A home
area network)

WAN (A wide
area network)
What are Layers
Physical
Layer
Application
Layer

Data Link
Layer

Presentation
Layer

Session Layer

Network
Layer

Transport
Layer
Types of Layers and their use
Function of Layers
TCP/IP Model Consists of four layers

Link/Network
Interface

Application

Internet

Transport
Example of TCP/IP
Types Home Networks
Ethernet networks are the most
common networks used in home
networking.

Wired Ethernet home networks
use the gigabit Ethernet
standard.

Most Ethernet networks use a
combination of wired and
wireless connections, depending
on the data throughput required.
Wired connections usually
achieve higher throughput than
wireless connections.
Wireless Ethernet networks are
identified by a protocol
standard: 802.11 a/b/g/n.
• 802.11n is the most current standard.
Connection-oriented vs.
Connectionless Communication
• POP (Popular Post Office Protocol) used for sending
email messages require email client and server
verification
• VoIP (Voice over IP) used to make call without
verifying first whether another device is there.
Example of Connection between e-mail client and server
Example of Connectionless communication
Components of Network
• A means of connecting the nodes on the
net- work (cables or wireless
technology)
• Special hardware devices that allow the
nodes to communicate with each other
and to send data
• Software that allows the network to run
Ways to Connect to Internet
• Cable transmits data over coaxial cable that is also
used for cable television.
• DSL uses twisted-pair wire, similar to that used for
telephones.
• Fiber-optic cable uses glass or plastic strands to
transmit data via light signals.
• Satellite is a connection option for those who do not
have access to faster broadband technologies.
• WiFi allows users to connect to the Internet
wire-lessly but is not as fast as a wired connection.
• Mobile broadband is a 3G or 4G service delivered by
cell-phone networks.
Securing Wireless
Change your
network name
(SSID)

Implement media
access control

Limit your signal
range

Disable SSID
broadcast

Create a passphrase

Apply firmware
upgrade

Change the default
password on your
router

Turn on security
protocols
Some networking facts
A network with computers
acting as both clients and
servers is a peer-to-peer
network

Connection-oriented
communication requires the
client and server to
acknowledge the
transmission

A router connects LANs and
directs packets to the
correct LAN

Ethernet is the standard

A hub repeats frames down
every attached network
cable
Cybercrime and Identity Theft
By Harbakshish Singh
Cybercrime
The computer as a
target- attacking the
computers of others

The computer as
an accessory- using
computer as a
fancy filing cabinet
to store illegal or
stolen information

The computer as a
weapon- using a
computer to
commit crime
Examples of Cybercrime

•
•
•
•
•

Identity theft
Credit Card theft
Computer viruses
Illegal access of computer systems
Auction fraud
Example Cybercrime in current news
Six arrested in $45 million
global cybercrime scheme

The six arrested Monday were
"cashers" in the scheme,
withdrawing approximately
$2.8 million from more than
140 ATMs in New York City

Worldwide ATM heist that
stole $45 million from two
Middle East banks
Cybercrime news article
Types of Viruses

Boot
sector
viruses

Logic
bombs
and time
bombs

Worms

Scripts
and macro
viruses

E-mail
viruses

Encryption
viruses
What is social engineering, and how do I avoid
falling prey to phishing?

Social engineering schemes use human interaction, deception, and trickery to fool people
into revealing sensitive information such as credit card numbers and passwords.

Phishing schemes usually involve e-mails that direct the unwary to a website that appears to
be legitimate, such as a bank site, but that is specifically designed to capture personal
information for committing fraud. To avoid phishing scams, you should never reply directly to
any e-mail asking you for personal information and never click on a link in an e-mail to go to a
website.

Don't fall for scareware scams that attempt to frighten you by pretending there is something
wrong with your computer.
Protect Physical Computer Assets
Computing devices should be kept in clean environments

You should protect all electronic devices from power surges by hooking them up
through surge protectors

Mobile devices can be protected from theft by installing software that will (1) set
off an alarm if the computer is moved; (2) help recover the computer, if stolen, by
reporting the computer's whereabouts when it is connected to the Internet;
and/or (3) allow you to lock or wipe the contents of the digital device remotely.
The End
Presentation By Harbakshish Singh

Mais conteúdo relacionado

Mais procurados (19)

Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Communication devices
Communication devicesCommunication devices
Communication devices
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Chp7 intranet
Chp7 intranetChp7 intranet
Chp7 intranet
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
 
Intranet 47
Intranet 47Intranet 47
Intranet 47
 
W13poster
W13posterW13poster
W13poster
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
12 Tait Hybridsecurity
12 Tait Hybridsecurity12 Tait Hybridsecurity
12 Tait Hybridsecurity
 
Network security
 Network security Network security
Network security
 
ALA Tech Seminar
ALA Tech SeminarALA Tech Seminar
ALA Tech Seminar
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
 
Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and development
 
Computer network
Computer networkComputer network
Computer network
 
Internet
InternetInternet
Internet
 

Destaque

Progetto didattico acquistare e vendere su ebay in sicurezza
Progetto didattico acquistare e vendere su ebay in sicurezzaProgetto didattico acquistare e vendere su ebay in sicurezza
Progetto didattico acquistare e vendere su ebay in sicurezzaViola Anesin
 
Fa13 7718-ch8-farmer
Fa13 7718-ch8-farmerFa13 7718-ch8-farmer
Fa13 7718-ch8-farmerMary-Jo Apigo
 
Fa13 7718-ch2-mayers
Fa13 7718-ch2-mayersFa13 7718-ch2-mayers
Fa13 7718-ch2-mayersMary-Jo Apigo
 
Informatica - Gli Automi
Informatica - Gli AutomiInformatica - Gli Automi
Informatica - Gli AutomiViola Anesin
 
Fa13 7718-ch3-harris
Fa13 7718-ch3-harrisFa13 7718-ch3-harris
Fa13 7718-ch3-harrisMary-Jo Apigo
 
Lessons in failure entrepreneurship is a journey through zeroes
Lessons in failure   entrepreneurship is a journey through zeroesLessons in failure   entrepreneurship is a journey through zeroes
Lessons in failure entrepreneurship is a journey through zeroesKevin Li
 
CóMo Hacer Una Flor De Primavera
CóMo Hacer Una Flor De PrimaveraCóMo Hacer Una Flor De Primavera
CóMo Hacer Una Flor De Primaveralalieta
 
10 strumenti «tecnologici»
10 strumenti «tecnologici»10 strumenti «tecnologici»
10 strumenti «tecnologici»Viola Anesin
 
Xml - progettazione unità didattica
Xml - progettazione unità didatticaXml - progettazione unità didattica
Xml - progettazione unità didatticaViola Anesin
 
L‘Infinito in matematica
L‘Infinito in matematicaL‘Infinito in matematica
L‘Infinito in matematicaViola Anesin
 
West Update-LACCD ATD Retreat
West Update-LACCD ATD RetreatWest Update-LACCD ATD Retreat
West Update-LACCD ATD RetreatMary-Jo Apigo
 
Lessons in failure entrepreneurship is a journey through zeroes - typos fixed
Lessons in failure   entrepreneurship is a journey through zeroes - typos fixed Lessons in failure   entrepreneurship is a journey through zeroes - typos fixed
Lessons in failure entrepreneurship is a journey through zeroes - typos fixed Kevin Li
 
Matematica Nella Divina Commedia
Matematica Nella Divina CommediaMatematica Nella Divina Commedia
Matematica Nella Divina CommediaViola Anesin
 
Unità Didattica Addizione
Unità Didattica AddizioneUnità Didattica Addizione
Unità Didattica AddizioneViola Anesin
 

Destaque (19)

Fa13 7718-ch3-kim
Fa13 7718-ch3-kimFa13 7718-ch3-kim
Fa13 7718-ch3-kim
 
Progetto didattico acquistare e vendere su ebay in sicurezza
Progetto didattico acquistare e vendere su ebay in sicurezzaProgetto didattico acquistare e vendere su ebay in sicurezza
Progetto didattico acquistare e vendere su ebay in sicurezza
 
Fa13 7718-ch2-brown
Fa13 7718-ch2-brownFa13 7718-ch2-brown
Fa13 7718-ch2-brown
 
Fa13 7718-ch8-farmer
Fa13 7718-ch8-farmerFa13 7718-ch8-farmer
Fa13 7718-ch8-farmer
 
Fa13 7718-ch2-mayers
Fa13 7718-ch2-mayersFa13 7718-ch2-mayers
Fa13 7718-ch2-mayers
 
Informatica - Gli Automi
Informatica - Gli AutomiInformatica - Gli Automi
Informatica - Gli Automi
 
Fa13 7718-ch3-harris
Fa13 7718-ch3-harrisFa13 7718-ch3-harris
Fa13 7718-ch3-harris
 
Lessons in failure entrepreneurship is a journey through zeroes
Lessons in failure   entrepreneurship is a journey through zeroesLessons in failure   entrepreneurship is a journey through zeroes
Lessons in failure entrepreneurship is a journey through zeroes
 
Report Examples
Report ExamplesReport Examples
Report Examples
 
Cellulari
CellulariCellulari
Cellulari
 
1:World@Haverford
1:World@Haverford1:World@Haverford
1:World@Haverford
 
CóMo Hacer Una Flor De Primavera
CóMo Hacer Una Flor De PrimaveraCóMo Hacer Una Flor De Primavera
CóMo Hacer Una Flor De Primavera
 
10 strumenti «tecnologici»
10 strumenti «tecnologici»10 strumenti «tecnologici»
10 strumenti «tecnologici»
 
Xml - progettazione unità didattica
Xml - progettazione unità didatticaXml - progettazione unità didattica
Xml - progettazione unità didattica
 
L‘Infinito in matematica
L‘Infinito in matematicaL‘Infinito in matematica
L‘Infinito in matematica
 
West Update-LACCD ATD Retreat
West Update-LACCD ATD RetreatWest Update-LACCD ATD Retreat
West Update-LACCD ATD Retreat
 
Lessons in failure entrepreneurship is a journey through zeroes - typos fixed
Lessons in failure   entrepreneurship is a journey through zeroes - typos fixed Lessons in failure   entrepreneurship is a journey through zeroes - typos fixed
Lessons in failure entrepreneurship is a journey through zeroes - typos fixed
 
Matematica Nella Divina Commedia
Matematica Nella Divina CommediaMatematica Nella Divina Commedia
Matematica Nella Divina Commedia
 
Unità Didattica Addizione
Unità Didattica AddizioneUnità Didattica Addizione
Unità Didattica Addizione
 

Semelhante a Fa13 7718-ch7 9-singh

NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfMr. Moms
 
Networking And Security5
Networking And Security5Networking And Security5
Networking And Security5guest4a9cdb
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityDustin Pytko
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.RAVI RAJ
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaArpit Bhatia
 
Ist264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournalIst264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournalHarold Sowards
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techcheqala5626
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxadolphoyonker
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networkingtsmithnasd
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignmentBijay Bista
 

Semelhante a Fa13 7718-ch7 9-singh (20)

NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdf
 
Networking And Security5
Networking And Security5Networking And Security5
Networking And Security5
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Beekman5 std ppt_09
Beekman5 std ppt_09Beekman5 std ppt_09
Beekman5 std ppt_09
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
Ist264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournalIst264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournal
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Ijecet 06 09_008
Ijecet 06 09_008Ijecet 06 09_008
Ijecet 06 09_008
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Fg c
Fg cFg c
Fg c
 
Wlan security
Wlan securityWlan security
Wlan security
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Fa13 7718-ch7 9-singh

  • 1. Technology in Action Overview of Chapter 7 & 9 By Harbakshish Singh
  • 2. Fundamentals of Networking A computer network has two or more computers There are two categories of networks (LANs and WANs) They are connected via software and hardware Any device connected to network is called node
  • 3. Advantages of Networks Share an Internet connection Conserve Resources Centralized Administration Lower cost licensing Share printers and other peripheral devices Share files and communicate with computers Avoid file duplication and corruption
  • 5. Ways to classify Networks PAN (A personal area network) LAN (A local area network) MAN (A metropolitan area network) HAN (A home area network) WAN (A wide area network)
  • 6. What are Layers Physical Layer Application Layer Data Link Layer Presentation Layer Session Layer Network Layer Transport Layer
  • 7. Types of Layers and their use
  • 9. TCP/IP Model Consists of four layers Link/Network Interface Application Internet Transport
  • 11. Types Home Networks Ethernet networks are the most common networks used in home networking. Wired Ethernet home networks use the gigabit Ethernet standard. Most Ethernet networks use a combination of wired and wireless connections, depending on the data throughput required. Wired connections usually achieve higher throughput than wireless connections. Wireless Ethernet networks are identified by a protocol standard: 802.11 a/b/g/n. • 802.11n is the most current standard.
  • 12. Connection-oriented vs. Connectionless Communication • POP (Popular Post Office Protocol) used for sending email messages require email client and server verification • VoIP (Voice over IP) used to make call without verifying first whether another device is there.
  • 13. Example of Connection between e-mail client and server
  • 14. Example of Connectionless communication
  • 15. Components of Network • A means of connecting the nodes on the net- work (cables or wireless technology) • Special hardware devices that allow the nodes to communicate with each other and to send data • Software that allows the network to run
  • 16. Ways to Connect to Internet • Cable transmits data over coaxial cable that is also used for cable television. • DSL uses twisted-pair wire, similar to that used for telephones. • Fiber-optic cable uses glass or plastic strands to transmit data via light signals. • Satellite is a connection option for those who do not have access to faster broadband technologies. • WiFi allows users to connect to the Internet wire-lessly but is not as fast as a wired connection. • Mobile broadband is a 3G or 4G service delivered by cell-phone networks.
  • 17. Securing Wireless Change your network name (SSID) Implement media access control Limit your signal range Disable SSID broadcast Create a passphrase Apply firmware upgrade Change the default password on your router Turn on security protocols
  • 18. Some networking facts A network with computers acting as both clients and servers is a peer-to-peer network Connection-oriented communication requires the client and server to acknowledge the transmission A router connects LANs and directs packets to the correct LAN Ethernet is the standard A hub repeats frames down every attached network cable
  • 19. Cybercrime and Identity Theft By Harbakshish Singh
  • 20. Cybercrime The computer as a target- attacking the computers of others The computer as an accessory- using computer as a fancy filing cabinet to store illegal or stolen information The computer as a weapon- using a computer to commit crime
  • 21. Examples of Cybercrime • • • • • Identity theft Credit Card theft Computer viruses Illegal access of computer systems Auction fraud
  • 22. Example Cybercrime in current news Six arrested in $45 million global cybercrime scheme The six arrested Monday were "cashers" in the scheme, withdrawing approximately $2.8 million from more than 140 ATMs in New York City Worldwide ATM heist that stole $45 million from two Middle East banks
  • 24. Types of Viruses Boot sector viruses Logic bombs and time bombs Worms Scripts and macro viruses E-mail viruses Encryption viruses
  • 25. What is social engineering, and how do I avoid falling prey to phishing? Social engineering schemes use human interaction, deception, and trickery to fool people into revealing sensitive information such as credit card numbers and passwords. Phishing schemes usually involve e-mails that direct the unwary to a website that appears to be legitimate, such as a bank site, but that is specifically designed to capture personal information for committing fraud. To avoid phishing scams, you should never reply directly to any e-mail asking you for personal information and never click on a link in an e-mail to go to a website. Don't fall for scareware scams that attempt to frighten you by pretending there is something wrong with your computer.
  • 26. Protect Physical Computer Assets Computing devices should be kept in clean environments You should protect all electronic devices from power surges by hooking them up through surge protectors Mobile devices can be protected from theft by installing software that will (1) set off an alarm if the computer is moved; (2) help recover the computer, if stolen, by reporting the computer's whereabouts when it is connected to the Internet; and/or (3) allow you to lock or wipe the contents of the digital device remotely.
  • 27. The End Presentation By Harbakshish Singh

Notas do Editor

  1. A personal area network (PAN) is used for communication among personal mobile devices using Bluetooth or WiFi wireless technologies.A local area network (LAN) connects nodes that are located in a small geographic area.A home area network (HAN) is a specific type of LAN located in a home.A metropolitan area network (MAN) is a large network in a specific geographic area.A wide area network (WAN) spans a large physical distance.