Revolution of Computer Networks and Modern Computer Networks
Revolution of Computer Networks and Modern Computer Networks
The revolution of computer networks has produced various facts about computer networking.
The revolution began in the early 1960s and has led for today’s technology. The internet has
grown like a plant where it was invented for military purposes and now it has expanded to the
purpose of communication.
Cybersecurity plays a major role in computer networking because it safeguards all kinds of
data categories from damage and theft. An overview of types of cyber security are;
operational security, denial of service attacks(DOS), malware, password attacks and etc.
Cybersecurity are used by undertaking to safe against unauthorized access to data center. It is
designed to make sure the maintainence of data availability securely. It requires domain
knowledge about attacks and capability of threats.
Network Hackers and Crackers are security risk. Hacking is breaking into a computer system,
so that the user’s personal data can lead to identity theft because data can be deleted, changed
either corrupted. It is the main act of illegal access to a computer system. Whereas cracking is
someone edits a program source code, as it is usually done foe a malicious purpose. They are
unethical and benefit themselves from illegal tasks, usually crackers do not make new tools
but use someone else and damage the network. Compared to hacking cracking is always and
totally illegal, where it is extremely damaging.
Data encryption is used to protect data if the data is been hacked, it won’t prevent hacking,
nevertheless it makes the data meaningless unless the recipient has the necessary decryption
tools. There are two types of encryption, symmetric and asymmetric or public key.
Decryption is known as the conversion of encrypted data into its original form. Which mean
it is the reverse process of encryption. The user can only decrypt the data because it requires a
key.
Data science, it focus more on mathematical concepts of understanding we could observe that
how data can be used to study on how the data that will be stored and manipulated. It mainly
stick to the analytics sector.
Firewall can be software or hardware. It usally sits between the user’s computer and an
external network. Where it controls the incoming and outgoing network traffic between the
user’s computer and a public network. It checks wheather the data meets a given set of
criteria, But if the data fails the given criteria the firewall will block the traffic and the data
user will be given a warning sign that there can be a security issue occurred. However in
certain circumstances, firewall can’t prevent potential harmful traffic. It helps to prevent
viruses or hackers entering the user’s computer
DHCP and DNS, Dynamic Hust Configuration Protocol (DHCP) Which enables users to
dynamically and transparently assign reusable IP address to clients. This server reduces the
chance of common errors occurring when IP addresses are assigned manually. It allows you
to move easily connect your computer to the university network from any participating URL.
Domain Names Server (DNS) is a device that locates the internet domain names and
translates them into internet protocol addresses. This helps the computer to understand easily;
it also provides a list of mail servers which accept emails for each domain name.
A computer send data across the internet by dividing the data into small chunks called
packets, this all happens without doing anything to the web browser, etc. They travel from
one machine to another until they reach their destination. The data also goes through an
encryption algorithm.