Chapter 6 Notes PDF
Chapter 6 Notes PDF
Chapter 6
Part I
Introduction to networks
The main wireless technologies used to form a WLAN are Wi-Fi and Bluetooth.
Hub
Functions:
• Connects number of devices to form a network
• Broadcasts incoming data packets to every computer in the network
Switch
Functions:
• Connects number of devices to form a network
• Sends the data packets to the destination computer(s) only
Bridge
Functions:
• Connects one LAN to another LAN that uses the same protocol
(communication rules)
• Used to connect different parts of a LAN so that they can function as
a single LAN
Router
Functions:
• Connecting networks and devices to the internet
• Storing computer addresses
• Routing data packets
The following diagram shows how routers are placed in the network:
Firewall
Definition:
It is a device/software that sits between the user's computer and an
external network and filters incoming and outgoing traffic based on a
given set of criteria.
Functions:
• Checks whether incoming and outgoing traffic meets a given set of
criteria
• Blocks traffic that doesn’t meet the criteria
• Warns and prevents unauthorized access to the system
• Can prevent viruses being transmitted to the network
• Blocks access to undesirable websites
• Logs all incoming and outgoing traffic
Functions:
• Provides access to the internet for a monthly fee
• Monitors internet usage
• Gives users an IP address
• Provides security services
• Provides access to Email
• Provides storage space to save data on cloud
• Provides web hosting facilities
Chapter 6
Part II
Internet
Intranet
Definition:
• Stands for Internal restricted access network
• It is a private network
• Accessible internally to members of some company or organization
Company uses:
• Send/receiving emails
• Send/receive attachments/files
• Internal file transfer within the company
• Allows the creation of extranets
• Surf internal webpages
• Sharing of applications/resources
The following table shows the differences between the internet and the intranet:
Internet Intranet
Accesses from agreed computers within an
Public access
organization
Not policed as anyone can post information Policed as specific users can post information
Extranet
Definition:
• It is a private network..
• .. that is controlled by a company
• Allows access for authorised customers..
• .. for example partners/vendors/suppliers
Extranets have the same uses and advantages of Intranets, but it can also allow authorized
users outside the organization to have controlled access to some information.
Website
Definition:
It is a collection of webpages related together using hyperlinks.
Hyperlink
Definition:
• Word/phrase/image..
• ..when clicked links to another website or another portion in the same webpage
Content/Structure layer
• Used to specify the webpage layout
Presentation layer
• Used to define the formatting/style of the webpage
Behavior layer
• Used to make a website interactive by allowing the page to respond to user actions
Webserver
Definition:
• Computer that contains webpages
• It has an IP address and a domain (name of the website)
Web browser
Definition:
A program that allows a user to view webpages.
Functions:
• Renders/Translates HTML
• Provides an address bar
• Provides navigation tools
• Allows the use of multiple tabs
• Stores bookmarks and favorites
• Records user history
• Makes use of hyperlinks that allow navigation between websites and web pages
• Manages HTTP and HTTPS protocols
Structure:
protocol://webserver name/path/filename
Protocol: http
Domain name: cie
Domain type: .org
Country code: .uk
Path: gcseict
Filename: giraffe.html
Protocol
Definition:
A set of rules agreed by the sender and the recipient when data is transferred between devices.
Uses:
• In accessing the World Wide Web
• In transferring contents of a webpage to a web browser for veiwing
• In downloading from webservers
Uses:
• Online banking and all online financial transactions
• Online shopping
• Sending and receiving emails
• Using cloud storage facilities
• Intranets and extranets
• Instant messaging
• Voice over Internet Protocol (VoIP) when carrying out video and/or audio chatting over
the internet
Uses:
• Used in tanfserring files from one computer to another over the internet
• Used in downloading from file servers
• FTP upload is used in cases when the file size is very large
Disadvantages of VoIP:
• Quality of the sound is completely reliant on the internet connection
• Security issues
Uses:
• Video conferences
• Audio conferences
• Making phone and/or video calls over the internet
Chapter 6
Part III
Cyber Security
Virus
Definition:
Program that replicates itself.
Possible effects:
• Delete/Corrupt files
• Causes a computer to malfunction or become unresponsive
• Fill the HDD/SSD/RAM with useless data
• Cause software errors
Anti-virus software
Steps to avoid the danger of infecting a computer with a virus from a downloaded file:
1 Download and install an up-to-date antivirus
2 Before downloading the file, the anti-virus software checks files aginst a database of
known viruses
3 If a file is infected, two options appear: Delete the file or Quarantine the file
4 If the quarantine option is chosen, the antivirus attempts to cleanse the infected file
Features:
• Checks software/files before they are run or loaded on a computer
• Scans the storage media before transferring data to a computer
• Can constantly run in background
• Prevents a user from downloading virus
• Can run a scheduled scan
• Notifies user of a possible virus
• Can quarantine a virus
• Can delete a virus
Possible effect:
Gives the originator the access to all data entered by the user’s keyboard including sensitive data.
Hacking
Definition:
The process of gaining unauthorized access to a computer system.
Possible effects:
• Misuse of personal information
• Data can be deleted/corrupted
• Data can be changed
• Data can be copied from a system
Phishing
Definition:
The creator sends out a legitimate looking email that contains a link
when clicked it opens a fake website designed to obtain sensitive data.
Possible effects:
• The creator of the email can gain sensitive data
• Credit card fraud
Smishing
Definition:
The creator sends SMS to the user’s phone that contains a telephone number to call or contains
a link when clicked it opens a fake website to obtain sensitive data.
Possible effects:
• The creator of the SMS can gain sensitive data
• Credit card fraud
Possible effects:
• Creator of vishing scam can gain sensitive data
• Credit card fraud
Pharming
Definition:
A malicious code is installed on the user’s computer that redirects the user to
a fake website designed to obtain sensitive data.
Possible effects:
• The creator of the malicious code can gain sensitive data
• Credit card fraud
Card fraud
Definition:
The illegal use of a credit or debit card.
Shoulder surfing
Definition:
A form of data theft where criminals steal card data from a victim when using it.
Card cloning
Definition:
• The copying of a credit or debit card which uses a magnetic stripe
• Cloning needs an electronic device known as a skimmer
• Skimmers can be placed in ATM slots where they can read all data from a card and then
copying the data to a fake card
Spam
Definition:
• Junk email sent to large numbers of people
• Can be used for advertising
User ID definition:
Identifier for the user.
Example: Sy12@#TT90kj=0
Biometrics systems
Definition:
Systems that rely on certain unique physical characteristics of human beings to identify a user.
Zero login
Definition:
Method of login authentication that identifies a user by combining both
biometric data and behavioral patterns without the need to supply any other
security information.
Smart cards
Definition:
• Security device that uses RFID technology (chip and antenna)
• The chip on the smart card can store data such as name, security
number, gender, date of birth and a PIN
Physical tokens
Definition:
• A form of authentication that uses a hardware device..
• .. that generates a one-time password (OTP)
• This OTP changes on a regular basis and is usually only valid for less than
a minute
Electronic tokens
Definition:
• Software installed on a user’s device, such as a smartphone..
• ..that generates a one-time password (OTP) which valid for less
than one minute
Two-factor authentication
Definition and purpose:
Digital certificate
Definition:
An electronic document sent with an electronic message that is:
• Used to verify the identity of the sender
• Contains a unique key used by sender and receiver that allows computers to exchange
information over the internet securely
Encryption
Definition:
• The process of scrambling characters of a message so that message
becomes meaningless to unauthorized users
• Plain text is encrypted to cypher text using an encryption algorithm and
an encryption key
• Cypher text is decrypted back to plain text using decryption key
Purpose of encryption:
Data becomes meaningless to unauthorized users.
Encryption applications:
• Encryption of data on HDDs/SSDs
• Encryption of emails
• Encryption of data on the cloud
• Used with HTTPS and SSL protocols to encrypt data being transferred over the internet
Firewall
Definition:
It is a device/software that sits between the user's computer and an external network and filters
incoming and outgoing traffic based on a given set of criteria.
Functions:
• Checks whether incoming and outgoing traffic meets a given set of
criteria
• Blocks traffic that doesn’t meet the criteria
• Warns and prevents unauthorized access to the system
• Can prevent viruses being transmitted to the network
• Blocks access to undesirable websites
• Logs all incoming and outgoing traffic