Você está na página 1de 87

1

MBE 13203
Information Technology in TVET

Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses

Chapter Topics (part 1)


Networking fundamentals Network architecture Network components Peer-to-peer networks Ethernet networks Power-line networks Configuring software Wireless security

Chapter Topics (part 2)


Computer virus types Protecting computers from viruses Hackers Firewalls Passwords and password management Biometrics Spyware and spam Backup methods Protecting physical assets

Networking Fundamentals
Computer network
Two or more computers connected together Devices connected to networks: nodes

Benefits of a network
Sharing resources and peripherals Transferring files Sharing of broadband connection with use of a router

Network Architecture
Network designs
Locally administered
Peer-to-peer (P2P)

Centrally administered
Client/server

Peer-to-Peer Networks
Nodes communicate with each other
Peers

Share peripheral devices Common in home networks

Client/Server Networks
Client computers
Users who make requests

Server computers
Provide resources to clients Central network control

Internet
A large, multiserver, multiclient network

HANs and LANs


Home area network (HAN)
Connects digital devices within a home

Local area network (LAN)


Nodes are within a small geographic region
Schools Small businesses

10

WANs and MANs


Wide area network (WAN)
LANs connected over long distances
A few miles to thousands of miles Uses telecommunications lines

Metropolitan area network (MAN)


Provides access within a specific geographic region, such as a city

11

Network Components
Transmission media Network communication devices Software

12

Transmission Media
Provide communications channel between nodes Forms of media
Twisted pair cable Coaxial cable Fiber-optic cable Radio waves (wireless)

Bandwidth

Data transfer rate Throughput

13

Network Adapters
Devices connected to or installed in nodes
Network interface cards (NICs) External or internal network adapters

Enable communication between nodes

Network Navigation Devices


Devices that help make data flow possible Routers
Route data between networks

Switches
Receive data and retransmit it to nodes on the same network

14

15

Networking Software
Peer-to-peer software
Built into operating systems that support networking
Windows Mac OS Linux

16

Networking Software
Client/server software
Network operating system (NOS) software
Windows Server 2008 SUSE Linux Enterprise

17

Types of Peer-to-Peer Networks


Wired Ethernet networks Wireless Ethernet networks Power-line networks

18

Wired Ethernet Networks


Ethernet network adapters are used to connect nodes
NIC card ExpressCard USB adapter

Computers are connectedEthernet to each other using unshielded twisted pair cable

Phone

19

Ethernet Switches
Keep track of data packets Amplify and retransmit signals Keep the network running efficiently

20

Ethernet Routers
Transfer packets from one network to another Home Internet routers transfer data from the Internet to the home network Allows for network-ready devices such as network printers or network attached storage (NAS)

Wireless Ethernet Networks


Ethernet networks that use radio waves instead of wires to connect nodes Based on the IEEE 802.11 standard, also known as Wi-Fi Each node requires a wireless network adapter
Transceivers

21

22

Wireless Access Point (WAP)


Device added to a wireless network to extend the range of the network Must connect to either a switch, a router, or a node on the network

23

Power-Line Networks
Computers are connected to a houses electrical wiring to create a network A power-line network adapter connects nodes to electrical outlets

24

Choosing a Peer-to-Peer Network


Things to consider
Whether existing wiring is available Whether you want wireless communications How fast you want your network connection to be How much money you can spend on your network
Comparing the Major Types of Home Networks Wired Ethernet Maximum data transfer rate (bandwidth) Relative installation and equipment costs for networking two computers 100 Mbps to 1 Gbps $ PowerLine 200 Mbps $$ Wireless 802.11g 54 Mbps $ Wireless 802.11n 540 Mbps $$

25

Configuring Software for Your Home Network


Windows Vista and later versions
Use wizards launched from Network and Sharing Center in Control Panel

Before running wizards:


1. Install network adapters on each node. 2. For a wired network, plug all the cables into the router, network adapters, and so on.

26

Configuring Software for Your Home Network


3. Make sure your cable/DSL modem is connected to your router and the Internet. 4. Turn on your equipment in the following order:

a. Cable/DSL modem b. Router c. All computers and peripherals (printers, scanners, and so on)

27

Networking Multiple Versions of Windows


Set up Windows 7 and Vista machines first

Automatically detect other computers running Windows on network Windows XP will need adjustment to see other versions of Windows

Give each Windows computer a unique name Place all computers in the same workgroup

28

Configuring a Router to Connect to the Internet


Contact ISP for special settings Access router from Web browser Enter username and password Use routers wizard to set up connection using settings and info provided by ISP Test Internet connection speed
Speedtest.net

29

Securing Wireless Networks


Wireless network range doesnt stop at the property line Default device and network ID settings allow intruders to enter the network Internet bandwidth can be stolen Computers can be vulnerable to hacker intrusion and takeover

30

Securing Wireless Networks


To secure a wireless network, do the following:
Change your network name (SSID) Disable SSID broadcast Change the default password on your router Turn on security protocols Implement media access control Limit your signal range Apply firmware upgrades

31

Chapter 7 Summary Questions


What is a network, and what are the advantages of setting one up?

32

Chapter 7 Summary Questions


What is the difference between a client/server network and a peer-to-peer network?

33

Chapter 7 Summary Questions


What are the main hardware components of every network?

34

Chapter 7 Summary Questions


What are the most common home networks?

35

Chapter 7 Summary Questions


What are wired Ethernet networks, and how are they created?

36

Chapter 7 Summary Questions


What are wireless Ethernet networks, and how are they created?

37

Chapter 7 Summary Questions


How are power-line networks created, and are they a viable alternative to Ethernet networks?

38

Chapter 7 Summary Questions


How do I configure my computers software to set up a network?

39

Chapter 7 Summary Questions


Why are wireless networks more vulnerable than wired networks, and what special precautions are required to ensure my wireless network is secure?

40

41

PART 2

3/6/2014

Computer Threats
Cybercrimes are criminal acts conducted by cybercriminals through the use of computers Computer users need to protect themselves from becoming victims of cybercriminals

Types of Cybercrime
Fraud-related (58 percent of cybercrime)
Auction fraud Nondelivery of ordered items Credit and debit card fraud

Non-fraud-related
Computer intrusions Unsolicited e-mail Child pornography

Computer Threats: Viruses


Virus: A program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host program

What Viruses Do
Replicate themselves
Slow down networks

Secondary objectives
Display annoying messages Delete files on the hard drive Change computer settings

How Does a Computer Catch a Virus?


Viruses copy themselves and infect a file on your computer Spread by
Sharing disks or flash drives Opening an e-mail attachment Downloading infected audio or video files

Types of Viruses
Boot-sector viruses Logic bombs
Replicate themselves in the boot sector of the hard drive
Activate when certain conditions are met Triggered by the passage of time or on a certain date

Time bombs
Worms

Travel between systems through networks

Types of Viruses
Script viruses Macro viruses
Hidden on Web pages as miniprograms
Attached to documents

E-mail viruses

Encryption viruses

Use e-mail address books to distribute themselves


Compress files using a complex encryption key

Virus Classifications
Polymorphic viruses
Periodically rewrite themselves to avoid detection

Multipartite viruses
Infect multiple file types

Stealth viruses
Erase their code from the hard drive and reside in the active memory

Antivirus Software
Programs designed to detect viruses
Scan files looking for virus signatures (unique code) Provide options for deleting or fixing infected files Inoculate files against further infection

Needs to be updated frequently

Dealing with an Infected Computer


1. Boot computer with antivirus DVD/CD in DVD drive. 2. Run directly from DVD/CD. 3. Allow software to delete or quarantine infected files. 4. Research viruses found to ensure further manual steps are not needed.

Prevent Instant Messaging Viruses


Allow contact from Buddy or Friends List users only. Never automatically accept transfers of data. Avoid using instant messaging programs on public computers.

Other Ways to Protect Your System


Keep your antivirus and operating system (OS) software up to date Load security patches as soon as they are available Enable automatic updates

Hackers
Anyone who unlawfully accesses a computer system Types of hackers
White hat Black hat Script kiddies

What Hackers Steal


Hackers try to steal data stored on hard drives:
Credit card numbers Bank account numbers

Also can steal information through packet sniffing Use information to commit identity theft

How Computers Are Attacked


Trojan horse Backdoor program
Zombies

Denial of service attacks (DoS) Distributed denial of service attacks (DDoS)

How Hackers Gain Access


Direct access
Hacking software

Indirect access
Internet connection Logical ports

Firewalls
Software programs or hardware designed to close logical ports to invaders
A software firewall is built into Windows 7 Other software firewalls are available from vendors Network routers can contain a hardware firewall

Firewalls are critical if you have an alwayson broadband connection Test your computers vulnerability

Bluetooth Attacks
Bluesnarfing
Exploits flaw in access software to steal information contained on the device

Bluebugging
Hacker takes control of the device

Make your device invisible

Wireless Networks on the Road


Beware
Evil twins Free Internet access in paid locations

Protect yourself
Check with authorized personnel for official name of hot spot Do not use free access from unknown sources

Passwords
Create a strong password
At least 14 characters, including numbers, symbols, and upper- and lowercase letters Not a single word or a word from a dictionary Not easily associated with you (birthday, name of pet, nickname) Use different passwords for different sites Do not tell anyone or write down password Change password regularly (every month)

Password Managers
Remember all your different passwords Built into
Operating systems Web browsers Some security packages

Anonymous Web Surfing


Public computers
Shared computers risk subsequent user viewing your data Might already have viruses or hacking tools installed

Portable privacy devices Linux OS on a flash drive

Biometric Authentication Devices


Read unique personal characteristics
Fingerprint Iris patterns Voice patterns Face patterns

Malware
Software that has a malicious intent
Grayware (nondestructive)
Adware Spyware

Viruses (destructive)

SPAM or SPIM
SPAM: Unwanted or junk e-mail
To avoid SPAM
Create free Web-based e-mail account for filling out online forms or making online purchases Use a spam filter Do not try to unsubscribe from spam e-mails Use an e-mail forwarding service

SPIM: Unsolicited instant messages

Cookies
A Web site assigns an ID number to your computer, stored in a cookie file Each time you log in to the site, it notes the visit and keeps track of it in a database Provide info about browsing habits Identify user preferences Pose some privacy risks, but low security threat

Backing Up Your Data


Backup
A copy of a file that can be used to replace the original

Types of files to back up


Program Data

Backup routine
Frequency Changed files

Backing Up Your Data


Software programs for easy backup
Schedule automatic backups Can back up files, folders, or entire drives Back up to USB device, CD, or DVD

Entire system backup software


Takes an image of the entire system Stores on a separate hard drive In case of failure, a new drive is inserted

Backing Up Your Data


Store backups offsite Online backups
Store backup files on Internet servers Fees for the service

Social Engineering
Uses social skills to generate human interaction to entice individuals to reveal sensitive information
Usually does not use a computer or face-to-face interaction Pretexting

Phishing and Pharming

Phishing
Uses e-mail to lure user to fake Web sites Tricks user into revealing private data

Pharming
Malicious code changes Web browsers ability to find Web addresses

Hoaxes
An attempt to make someone believe something that is untrue
Target large audiences Practical joke, agents of social change, or time wasters Mostly e-mail

Protect Physical Assets


Environmental factors
Avoid
Sudden movement Excessive heat or cold Dust Food and liquids

Use padded case for notebooks

Power Surges
Occur when electrical current is supplied in excess of normal voltage (120 volts in the United States) Caused by:
Old or faulty wiring Downed power lines Malfunctions at electric substations Lightning strikes

Use surge protectors

Deterring Theft
Alarms Locks and surrounds Software alerts

Chapter 9 Summary Questions


From which types of viruses do I need to protect my computer?

Chapter 9 Summary Questions


What can I do to protect my computer from viruses?

Chapter 9 Summary Questions


How can hackers attack my computing devices, and what harm can they cause?

Chapter 9 Summary Questions


What is a firewall, and how does it keep my computer safe from hackers?

Chapter 9 Summary Questions


How do I create secure passwords and manage all of my passwords?

Chapter 9 Summary Questions


How can I surf the Internet anonymously and use biometric authentication devices to protect my data?

Chapter 9 Summary Questions


How do I manage online annoyances such as spyware and spam?

Chapter 9 Summary Questions


What data do I need to back up, and what are the best methods for doing so?

Chapter 9 Summary Questions


What is social engineering, and how do I avoid falling prey to phishing and hoaxes?

Chapter 9 Summary Questions


How do I protect my physical computing assets from environmental hazards, power surges, and theft?

87

Você também pode gostar