Cie CH 4
Cie CH 4
• Networks
• Network issues and communication
Networks
What is a Network?
The main objective of a router is to connect various types The main objective of a bridge is to connect
of network together LANs together
Routers scan a device’s IP address Bridges scan a device’s MAC address
Data is sent out using data packets Data is sent out using data packets
Connected networks will use different protocols Connects networks together that use the same protocols
A routing table is used to direct data packets to the Bridges do not make use of routing tables
correct device
A router has more than two ports A bridge has only two ports
Tick (✓) the appropriate box to indicate whether it refers to a router, hub or switch.
Other Hardware
Gateway
• A gateway is a network point ( or node) that acts as an entrance to another network.
Network cables
• Many computer systems use wi-Fi, network cables are still used because
they have the following advantages over Wi-Fi:
• faster data transfer rates
• can be more secure than wireless networks.
• The cables can be either copper or fibre optics - offers higher data
transfer rates and better security.
Wi-Fi and Bluetooth
Bluetooth
• Bluetooth sends and receives radio waves in a band of 79 different frequencies (known as
channels).
• If the channel is already being used, it randomly picks another channel.
• This is known as spread-spectrum frequency hopping.
• It is useful
- when transferring data between two or more devices that are very close together
- for low-bandwidth applications
• Bluetooth creates a secure wireless personal area network (WPAN) based on key encryption.
Cloud computing (storage)
• Cloud computing is a method of data storage where data is stored on remote servers – there may
be thousands of servers in many different locations.
• The same data is stored on more than one server in case of maintenance or repair, allowing clients
to access data at any time.
• This is known as data redundancy.
• There are three common cloud storage systems:
Public cloud – this is a storage environment where the customer/client and cloud storage provider
are different companies.
Private cloud – this is storage provided by a dedicated environment behind a company firewall;
customer/client and cloud storage provider are integrated and operate as a single entity.
Hybrid cloud – this is a combination of the two previous environments; some data resides in the
private cloud and less-sensitive/less-commercial data can be accessed from a public cloud storage
provider.
Advantages of cloud computing (storage)
• can be accessed at any time, from any device, anywhere in the world
• no need for a customer/client to carry an external storage device
• provides the user with remote backup of data (data loss/disaster recovery)
• If a customer/client has a failure of their hard disk or backup device, cloud storage will allow
recovery of their data.
• The cloud system offers almost unlimited storage capacity (at a price!).
Disadvantages of cloud computing (storage)
• If the customer/client has a slow or unstable internet connection, they could have many problems
accessing or downloading their data/files.
• Costs can be high if a large storage capacity or high download/upload data transfer is required.
• The potential failure of the cloud storage company is always possible – this poses a risk of loss of
all backup data.
Network type
• LAN covers a small area (normally confined to one building or within a close proximity)
• LAN consists of number of computers and devices that usually connect to a switch which is
connected to a router.
• Advantages:
The sharing of resources
Ease of communication between users.
A network administrator to control and monitor all aspects of the network
• Disadvantages:
Easier spread of viruses
Slower access to external networks
Increased security risk
Wide area networks (WANs)
• A WAN is Wide Area Network is a network that extends over a large geographical area (e.g. in
a different city or country).
• A WAN is often created by joining several LANs together.
• Routers are used to connect LAN networks to form a WAN Network.
Wireless LANs (WLANs)
• A wireless LAN (WLAN) is a LAN that uses radio signals (WiFi) to connect computers instead of
cables.
• Devices know Access Points (AP) are connected to the wired network at fixed locations.
• These devices provide the wireless access to devices on the network.
• It is much more convenient to use wireless connections instead of running long wires all over a
building.
Wireless LANs (WLANs)
• Advantages:
Can access the same services and resources from anywhere within range of the APs
There is no cabling there is a safety improvement and increased flexibility
Adding new computers and devices is very easy and the costs are reduced since extra cabling isn't
needed.
• Disadvantages:
Security can be a big issue.
There may be problems of interference, which can affect the signal.
The data transfer rate is slower than in a wired LAN.
Accessing the Internet
• Hacking
• Phishing
• Pharming
• Viruses
Passwords
• There are many more instances when you might need to type in a password and, in many cases, a
user ID.
• It is important that passwords are protected.
Passwords
• Some ways of doing this are described below
Run anti-spyware software to make sure that your passwords are not being relayed back to whoever put the
spyware on your computer
Change passwords on a regular basis in case it has come into the possession of another user illegally or
accidentally.
Passwords should not be easy to crack (e.g. your favourite colour, name of a pet or favourite rock group)
Passwords are grouped as either strong or weak.
Strong passwords should contain:
– at least one capital letter
– at least one numerical value
– at least one other keyboard character (such as @, *, & etc.).
An example of a strong password is: Sy12@#TT90kj=0
An example of a weak password is: GREEN1
Passwords
Q. Describe the difference between a weak password and a strong password?
• A weak password is easy to guess and includes few characters and consists of all letters or all digits.
• A weak password typically relates to the user for example their favorite color.
• A strong password is difficult to guess and contains many characters.
• Also a strong password uses mixture of upper case letters, digits and symbols.
Which of the following are weak passwords and which
are strong passwords?
1. 25-May-2000
2. Pas5word
3. ChapTer@15
4. AbC*N55!
5. 12345X
Other authentication methods
• Authentication is used to verify that data comes from a secure and trusted source.
zero login
biometrics
magnetic stripes
smart cards
physical tokens
electronic tokens
Zero login and biometrics
• Zero login means you do not need to supply your normal login details such as user ID and
password to access your device, the internet, your bank details, etc.
• Zero login essentially relies on devices being smart and secure enough to instantly recognize a
user by a number of features based on:
» biometrics
» behavioural patterns.
• Biometrics is already used on many smartphones as a way of logging into the phone.
» fingerprint
» face recognition
Zero login and biometrics
• Behavioural patterns include: how you walk, your typing speed, your normal location, how you
swipe the screen, and so on.
• The advantages of zero login are :
enhanced security (it is difficult to copy biometrics and behavioural patterns)
an easier
much quicker way to login to a system
• The magnetic stripe cards are used to gain access to the system by swiping the card into the
reader
• Data such as name, ID number, gender, and date of birth may be contained on a magnetic stripe
when used as a security device to allow entry to a building, for example.
• Some ID cards also use a holographic image (hologram).
• Another form of security is to have a photographic image of the card user printed onto the card
surface.
Advantages of Magnetic stripe cards
• Less secure than, for example, biometric methods (no encryption is used and the stripe contents can
be copied fairly easily).
• The cards wear out with a lot of use.
• Magnetic readers often fail to read the cards on first attempt.
Smart cards
• By inserting a tag (chip and antenna) into a security card, it can act as a smart contactless card
(that is, it can be read from a distance and does not have to be swiped through a card reader).
• The chip on the smart card can store data such as name, security number, gender, date of birth
and a PIN.
• Smart cards can be used as a security device.
• If the card is in a wallet or a pocket as the owner of the card walks up to a security gate, readers
on either side of the gate quickly scan the security data stored on the RFID tag embedded in the
card.
• The user will then be invited to enter a PIN on the keypad.
• If all details match, then access will be allowed.
Physical tokens
• A physical (or hardware) token is a form of authentication in the form of a physical, solid object.
• The user’s interaction with a login system is used to prove that the user has possession of the token.
• Physical tokens contain internal clocks and when a PIN and other authentication details are
entered, then a one-time password (OTP) is generated.
• The OTP is shown on a small screen.
• The code changes on a regular basis and is usually only valid for less than a minute.
Physical tokens
• Electronic (software) tokens are software installed on a user’s device, such as a smartphone.
• The app generates a one-time password (OTP) which is valid for less than a minute.
• The user enters this OTP when prompted by the website, together with some other form of
authentication, such as PIN, touch ID or face ID.
• The website server runs the same software as the app.
• Because both the server and smartphone have synchronised clocks, they will generate the same
numbers.
• Once the OTP and other form of authentication are verified by the website, the user will be
allowed access.
Anti-malware software
• Anti-malware software, known as anti-virus software, to protect devices against a potential virus
attack.
• Running anti-virus software in the background on a computer will constantly check for virus attacks.
• Although various types of anti-virus software work in different ways they all have the following
common features:
They check software or files before they are run or loaded on a computer.
Anti-virus software compares a possible virus against a database of known viruses.
They carry out heuristic checking – this is the checking of software for types of behaviour that could
indicate a possible virus; this is useful if software is infected by a virus not yet on the database.
Anti-malware software
Any possible files or programs which are infected are put into quarantine which:
– allows the virus to be automatically deleted, or
– allows the user to make the decision about deletion
Anti-virus software needs to be kept up to date because new viruses are constantly being discovered.
Full system checks need to be carried out once a week, for example, because some viruses lie dormant
and would only be picked up by this full system scan.
Data protection acts
• Data protection Act applies to paper based or electronic forms of data stored on a computer.
• The data protection act is to protect rights of the individual who the data is obtained from.
Principles of the Data Protection Act
Electronic Faxing
• Electronic Fax is sent via a internet connection.
• No need to buy a fax machine, ink or paper.
• Electronic Fax documents are sent to an email which will ensure the correct person will receive the
fax – less chance of document being intercepted.
• Electronic Fax's can also be sent directly to a fax machine.
• Send fax's from any location with an internet connection.
• No additional cost to send fax over internet network.
Network communication
Email Communication
• Can send multiple attachments.
• Can send to multiple recipients in one message.
• Emails can be received instantly and accessed on many platforms including tablets and phones.
Disadvantage
• Email attachments may include viruses.
• May receive spam (unwanted mail).
• May receive phishing (scam) emails to obtain personal data.
Electronic conferencing
• Video conferencing is a communication method that uses both video and sound using an internet
connection.
• It is a substitute for face-to-face conferences between a number of people, who may be in a
different part of the country or live overseas.
• It is carried out in real time and makes use of some form of network.
• The basic hardware includes:
» webcams
» large monitors/television screens
» microphones
» speakers.
Video conferencing
Advantages
• No need to travel to have meetings which would cut down on travelling costs (including flights and
hotel) and travelling time.
• Video conference can be held at short notice.
• Facilitates long distance learning – students can access live lectures without travelling.
Video conferencing
Disadvantages
• Technical problems with the internet or hardware could effect the quality of the video conference.
• Set up costs to purchase hardware/software and to provide relevant training to staff.
• Lack of personal contact you would have if it was a face to face meeting.
• Different time zones could make it difficult to find a suitable time to have a meeting.
• Not possible to sign documents.
Audio conferencing
• Audio conference can be done over the telephone network or using a computer making use of
VOIP.
• The basic hardware includes:
» Telephone
» microphones
» speakers.
Audio conferencing
1. The organizer of the phone conference is given a unique Pin which can be shared participants.
2. For Participants to join they have to dial the conference phone number.
3. Then they would have to enter a PIN.
Web conferencing