Computer Communication and Security
Computer Communication and Security
Computer Communication
and Security
Chapter 3 Objectives
Communications
and Network
terminology and
applications
Various
communications
devices, media,
and procedures
Type of Computer
Networks
Identify ways to
safeguard against
Network-based
attacks
Techniques to
prevent Network
Attacks
Communications
What are computer communications?
Process in which two or more computers or devices transfer data, instructions, and
information
Communications
What is needed for successful communications?
Sending device
Initiates instruction to transmit data, instructions, or information. Commonly in software
forms
Communications device
Connects the sending device to the communications channel
Communications channel
Media on which data, instructions, or information travel
Communications device
Connects the communications channel to the receiving device
Receiving device
Communication Software
What is communications software?
Programs that help users
establish connection to
Internet, other network,
or another computer
Communication Devices
What are examples of communications
devices?
Common types are [dial-up modems, ISDN & DSL
modems, broadband/cable modems] For
Internet Communication, and [network cards,
wireless access points, routers, and
hub/switches] for General Computer Network
Communications
Communication Devices
What is a modem?
Dial Up Modems
Communications Devices
What is a network card?
Adapter card, PC Card, or
compact flash card that
enables computer or
device to access network
Sometimes called network
interface card (NIC)
Communications Devices
What is a wireless access
point?
Central communications
device that allows
computers and devices to
transfer data wirelessly
among themselves or to
wired network
Communications Devices
What is a router?
Connects computers and
transmits data to correct
destination on network
Routers forward data on
Internet using fastest
available path
Communications Devices
Communications Devices
What is a switch/hub?
Device that provides
central point for cables in
network
Communications Channel
What is a channel?
Transmission media on which data travels in
communications system
Transmission media
are materials
capable of carrying
one or more signals
Bandwidth is
amount of data
that can travel
over channel
Transmission Media
Physical
Optical Fiber
Twisted Pair
Cables
Coaxial Cable
Wireless
Communications
Sattelite
Microwave Radio
Cellular Radio (2G,
2,5G, 3G, etc)
Broadcast Radio
(Wi-fi, Bluetooth)
Infrared
Computer Network
What is a network?
Collection of computers
and devices connected
via communications
devices and
transmission
media
Computer Network
What is a local area
network (LAN)?
Network in limited
geographical area such
as home or office
building
Metropolitan area
network (MAN)
connects LANs in city or
town
Computer Network
How to Join a computer into a LAN
Computer Network
What is a wide area
network (WAN)?
Network that covers
large geographic area
using many types of
media
Internet is worlds
largest WAN
Computer Network
What is a client/server
network?
One or more computers act
as server and other
computers, or clients, access
server
Computer Network
What is an Intranet?
Internal network that uses Internet technologies
Can spread
and
damage
files
Worm copies
itself repeatedly,
using up
resources
and possibly
shutting down
computer or
network
Does not
replicate
itself on
other
computers
Payload
(destructive
event) that is
delivered when
you open file, run
infected program, or
boot computer with
infected disk
in disk drive
Install an antivirus
program on all of your
computers
Check all
downloaded
programs for
viruses, worms,
or Trojan horses
Never open an
e-mail attachment
unless you are
expecting it and
it is from a
trusted source
Install a personal
firewall program
Spoofing
What is spoofing?
Makes a
network
or Internet
Transmission appear legitimate
Solutions
Best way to prevent spoofing and DOS is to
build a firewall
Solutions
What is firewall?
Security system consisting of hardware and/or
software that prevents unauthorized intrusion
Solutions
What is personal firewall?
Program that protects personal computer and its data from
unauthorized intrusions
Monitors transmissions to and from computer
Informs you of attempted intrusion
Solutions
How to prevent unauthorized access and use?
Make a good use of authorization control
Solutions (Cont.)
How to make good passwords?
GOOD
Example:
@k|_|-@n@6-4L4Y
Longer, alay-er, better
NEVER USE IT
Your birth-day
Your mother/dad/lover name
Very predictable words
Plain, not combinated
characters is weak against
brute-force attacks
Solutions (Cont.)
How to prevent unauthorized access and use?
Disable file and printer sharing on Internet connection
File and
printer
sharing
turned off
enable just
when you need it
Solutions (Cont.)
How to make information thief lifes much
harder?
Use encryption
Safeguards against information theft
Process of converting plaintext (readable data) into
ciphertext (unreadable characters)
Use key to generate cipherkey as combinations
To read the data, the recipient must decrypt, or
decipher, the data
See the demonstration
Username,
Passwords,
Credit cards details
https://ib.bankmandiri.co.id/retail/Login.do?action=form
https://ib.bangmandiri.co.id/retail/Login.do?action=form
Username,
Passwords,
Credit cards details
Crackers Computer
Solutions
Web browsers provide secure data
transmission
Many Web browsers
use encryption
Secure site
Choose Web site that
uses encryption to
secure data
Valid Digital
certificate
Guarantees Web site
is legitimate
Solutions
Provides encryption of
all data that passes
between client and
Internet server
Web addresses
beginning with https
indicate secure
connections
Solutions
Protect yourselves from social engineering
Be educated, aware, and a little bit paranoid.
Never give out:
Usernames / ID numbers
Passwords / PIN numbers
System information
Credit card numbers
Schedules
Other Sensitive data
Be aware of what is being asked
End of Chapter 3