SlideShare uma empresa Scribd logo
1 de 11
How peripherals can be connected to
a computer
&
how to connect a computer to an
existing wireless network
• Who knows what a network is?
• How are they used and made secure?
• What connections can be on a computer?
• USB
• Firewire
• Wi-fi
• Bluetooth
• Infrared
• Service Set Identifier (SSID)
• firewall
• Wired Equivalent Privacy (Wep)
• Wi-fi Protected Access (WPA & WPA2)
• To understand what connections are on a
computer.
• To understand how to secure a wireless network.
• To understand what a network is.
http://www.youtube.com/watch?v=BjpZoFsR2h8
http://www.youtube.com/watch?v=A88XB7_Jz7s
http://www.plus.net/support/broadband/wirele
ss_broadband/wireless_connect_win7.shtml
We are going to design and create our own revision materials based on the
topic of connections and networks.
I want you to work in teams to produce a resource that will help explain what
connections are on a computer as well as how to connect to a wireless network
and what security is needed and why.
You can create:
• A podcast
• A PowerPoint
• A video
• A animation
The choice is yours
Create a set of personal rules for network security
that someone would need to follow in order to
make sure their network is kept secure.
You can use the internet to help you with this.
In pairs you have 2 minutes to share one thing
you have learnt in today’s lesson and how it will
help you.
That’s 1 minute each to talk about what you
have learnt in todays lesson.
Peripherals

Mais conteúdo relacionado

Semelhante a Peripherals

IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014Brian Knopf
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionCASCouncil
 
The Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListThe Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListSecurity Weekly
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home networkclcewing
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?Daniel Appelquist
 
Building Intelligent Cloud with Microsoft Azure
Building Intelligent Cloud with Microsoft AzureBuilding Intelligent Cloud with Microsoft Azure
Building Intelligent Cloud with Microsoft AzureWinWire Technologies Inc
 
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Tom Moore
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+PlatformFYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+PlatformTianwei_liu
 
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+PlatformFYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platformwebuiltit
 
FYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android PlatformFYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android Platformwebuiltit
 
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+PlatformFYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+PlatformTianwei_liu
 
FYP%3A+P2P+Bluetooth+Communication+Framework+on+Android%0A
FYP%3A+P2P+Bluetooth+Communication+Framework+on+Android%0AFYP%3A+P2P+Bluetooth+Communication+Framework+on+Android%0A
FYP%3A+P2P+Bluetooth+Communication+Framework+on+Android%0ATianwei_liu
 
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+PlatformFYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platformwebuiltit
 
Can a browser become an IoT Gateway?
Can a browser become an IoT Gateway?Can a browser become an IoT Gateway?
Can a browser become an IoT Gateway?Sooraj Sanker
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksAltaware, Inc.
 

Semelhante a Peripherals (20)

IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
 
Technical Report
Technical ReportTechnical Report
Technical Report
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
 
The Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListThe Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted List
 
Pace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO NetworkPace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO Network
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
Building Intelligent Cloud with Microsoft Azure
Building Intelligent Cloud with Microsoft AzureBuilding Intelligent Cloud with Microsoft Azure
Building Intelligent Cloud with Microsoft Azure
 
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
heng+hong
heng+hongheng+hong
heng+hong
 
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+PlatformFYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
 
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+PlatformFYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
 
FYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android PlatformFYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android Platform
 
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+PlatformFYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
 
FYP%3A+P2P+Bluetooth+Communication+Framework+on+Android%0A
FYP%3A+P2P+Bluetooth+Communication+Framework+on+Android%0AFYP%3A+P2P+Bluetooth+Communication+Framework+on+Android%0A
FYP%3A+P2P+Bluetooth+Communication+Framework+on+Android%0A
 
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+PlatformFYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communications+Framework+on+Android+Platform
 
Can a browser become an IoT Gateway?
Can a browser become an IoT Gateway?Can a browser become an IoT Gateway?
Can a browser become an IoT Gateway?
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 

Mais de Jimmy Edwards

Tutor program term 2
Tutor program term 2Tutor program term 2
Tutor program term 2Jimmy Edwards
 
Tutor program term 1
Tutor program term 1Tutor program term 1
Tutor program term 1Jimmy Edwards
 
Creative i media r082 new brief
Creative i media r082   new briefCreative i media r082   new brief
Creative i media r082 new briefJimmy Edwards
 
Creative i media r087
Creative i media r087Creative i media r087
Creative i media r087Jimmy Edwards
 
Creative i media r086
Creative i media r086Creative i media r086
Creative i media r086Jimmy Edwards
 
Creative i media r081
Creative i media r081Creative i media r081
Creative i media r081Jimmy Edwards
 
Creative i media r085
Creative i media r085Creative i media r085
Creative i media r085Jimmy Edwards
 
Creative i media r082
Creative i media r082Creative i media r082
Creative i media r082Jimmy Edwards
 
The penrice experience 9
The penrice experience 9The penrice experience 9
The penrice experience 9Jimmy Edwards
 
The penrice experience 8
The penrice experience 8The penrice experience 8
The penrice experience 8Jimmy Edwards
 
The penrice experience 7
The penrice experience 7The penrice experience 7
The penrice experience 7Jimmy Edwards
 
The penrice experience 8
The penrice experience 8The penrice experience 8
The penrice experience 8Jimmy Edwards
 
The penrice experience 6
The penrice experience 6The penrice experience 6
The penrice experience 6Jimmy Edwards
 
The penrice experience 5
The penrice experience 5The penrice experience 5
The penrice experience 5Jimmy Edwards
 
The penrice experience 4
The penrice experience 4The penrice experience 4
The penrice experience 4Jimmy Edwards
 
The penrice experience 3
The penrice experience 3The penrice experience 3
The penrice experience 3Jimmy Edwards
 
The penrice experience 2
The penrice experience 2The penrice experience 2
The penrice experience 2Jimmy Edwards
 
The penrice experience 24
The penrice experience 24The penrice experience 24
The penrice experience 24Jimmy Edwards
 
The penrice experience 23
The penrice experience 23The penrice experience 23
The penrice experience 23Jimmy Edwards
 
The penrice experience 22
The penrice experience 22The penrice experience 22
The penrice experience 22Jimmy Edwards
 

Mais de Jimmy Edwards (20)

Tutor program term 2
Tutor program term 2Tutor program term 2
Tutor program term 2
 
Tutor program term 1
Tutor program term 1Tutor program term 1
Tutor program term 1
 
Creative i media r082 new brief
Creative i media r082   new briefCreative i media r082   new brief
Creative i media r082 new brief
 
Creative i media r087
Creative i media r087Creative i media r087
Creative i media r087
 
Creative i media r086
Creative i media r086Creative i media r086
Creative i media r086
 
Creative i media r081
Creative i media r081Creative i media r081
Creative i media r081
 
Creative i media r085
Creative i media r085Creative i media r085
Creative i media r085
 
Creative i media r082
Creative i media r082Creative i media r082
Creative i media r082
 
The penrice experience 9
The penrice experience 9The penrice experience 9
The penrice experience 9
 
The penrice experience 8
The penrice experience 8The penrice experience 8
The penrice experience 8
 
The penrice experience 7
The penrice experience 7The penrice experience 7
The penrice experience 7
 
The penrice experience 8
The penrice experience 8The penrice experience 8
The penrice experience 8
 
The penrice experience 6
The penrice experience 6The penrice experience 6
The penrice experience 6
 
The penrice experience 5
The penrice experience 5The penrice experience 5
The penrice experience 5
 
The penrice experience 4
The penrice experience 4The penrice experience 4
The penrice experience 4
 
The penrice experience 3
The penrice experience 3The penrice experience 3
The penrice experience 3
 
The penrice experience 2
The penrice experience 2The penrice experience 2
The penrice experience 2
 
The penrice experience 24
The penrice experience 24The penrice experience 24
The penrice experience 24
 
The penrice experience 23
The penrice experience 23The penrice experience 23
The penrice experience 23
 
The penrice experience 22
The penrice experience 22The penrice experience 22
The penrice experience 22
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Peripherals

  • 1. How peripherals can be connected to a computer & how to connect a computer to an existing wireless network
  • 2. • Who knows what a network is? • How are they used and made secure? • What connections can be on a computer?
  • 3. • USB • Firewire • Wi-fi • Bluetooth • Infrared • Service Set Identifier (SSID) • firewall • Wired Equivalent Privacy (Wep) • Wi-fi Protected Access (WPA & WPA2)
  • 4. • To understand what connections are on a computer. • To understand how to secure a wireless network. • To understand what a network is.
  • 8. We are going to design and create our own revision materials based on the topic of connections and networks. I want you to work in teams to produce a resource that will help explain what connections are on a computer as well as how to connect to a wireless network and what security is needed and why. You can create: • A podcast • A PowerPoint • A video • A animation The choice is yours
  • 9. Create a set of personal rules for network security that someone would need to follow in order to make sure their network is kept secure. You can use the internet to help you with this.
  • 10. In pairs you have 2 minutes to share one thing you have learnt in today’s lesson and how it will help you. That’s 1 minute each to talk about what you have learnt in todays lesson.