0% found this document useful (0 votes)
11 views18 pages

2011 Chapter3 Handout

Uploaded by

galma jaldesa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views18 pages

2011 Chapter3 Handout

Uploaded by

galma jaldesa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Introduction to ICT Chapter 3

3. Data Communications, Networks, Internet & Security


Chapter 3 provides an introduction to the way information is shared across the world and the
unique security issues associated with the data and communication channels. It also provides
an overview of the internet. The chapter is divided into four sections:
 Data Communications
 Computer Networks
 The Internet
 Computer Security

3.1. Data Communication

Section objectives
After completing this section the learner should be able to:
 define data communication
 describe data transmission modes
 identify data communication media
 discuss different cable types and their importance

The term communication can be defined as the process of transferring messages between
entities. Based on what these two entities are, there are three basic types of communication:
 Human-to-Human
 Computer-to-computer
 Human-to-Computer

In all the three cases, three basic elements can be identified.


 Source (the sender)
 Medium (the channel)
 Destination

For exchange of information the information should be transmitted from the source to the
destination through a transmission media called a channel.

The following figure shows the different components and processes of data communication.

Sende Encoding Transmission Decoding Destinatio


r n

A message should first be encoded in such a way that it can be transmitted through a channel
(medium), it is then transmitted, and finally, it is decoded into a form that can be understood by
the destination at the other end. This holds true for voice communication, or data
communication.

1
Introduction to ICT Chapter 3

Data communication involves transporting data from one point to another. This is an instance
of computer-to-computer communication, i.e., both the source and the destination are
computer devices, and the transmission media may be telephone lines, satellite links,
microwave links, etc.

Information is transmitted in the form of analog or digital. Most communication lines are
designed to carry analog signals. Digital transmission is rarely used for telecommunications.
There is a need of converting between analog and digital signals. So a technique must be used
to represent a digital signal or an analog carrier
 Modulation: Converting digital signals into analog signals.
 Demodulation: Converting analog signals back into digital signals.
 Modem: Short for modulator/demodulator: A communications device that converts one
form of a signal to another that is suitable for transmission over communication circuits,
typically from digital to analog and then from analog to digital.

3.1.1.Modes of Data Transmission


When data is transmitted from one point to another, three modes of transmission can be
identified:
 Simplex
 Half Duplex
 Full Duplex

Simplex
In this mode, transmission can take place only in one direction. The device at either end is
either a send-only or receive-only device.

The flow of data is unidirectional.


Simplex
Sender Receiver

Half-Duplex
In this mode, data can be transmitted in both directions, but only in one direction at a time. This
is good for transmissions in which case the receiver has to acknowledge that it has received the
message back to the sender. Thus, half-duplex line can alternately send and receive data. Two
wires are usually required. Voice communication (telephone) is normally an instance of half-
duplex mode of transmission.

Half Duplex
Sender Receiver
(receiver) (Sender)

2
Introduction to ICT Chapter 3

Full-Duplex
Full-duplex transmission mode allows simultaneous transmission in both directions. When high-
speed transmission is required, full-duplex transmission is the ideal choice. This transmission
mode requires four wires.

Full Duplex
Sender Receiver
(receiver) (Sender)

Activity:
Select any communication mechanism. Can you classify them as Simplex, Half-Duplex or
Full-Duplex

3.1.2.Types of Transmission Media (channel)


Transmission Medium is the physical path between transmitter and receiver in a data
communication system. The information or signal transmitted from one device to another is
through electromagnetic signals. Electromagnetic signals include power, voice, radio, waves,
infrared light, visible light, ultraviolet light, X-rays, and gamma rays. These signals can travel
trough vacuum, air or any other transmission medium.

The measurement of the quantity of data that can be passed down (transmitted) a
communication link in a given time is done in terms of bandwidth. Generally, bandwidth refers
to the maximum volume of information that can be transferred over any communication
medium. In digital circuits, bandwidth is measured in bits per second (bps). The rate of data
transmission is directly proportional to the bandwidth.

In digital context, the level of bandwidth falls into three categories:


1. Narrow Band
2. Wide band
3. Broad band

Factors to be considered in selecting data transmission media include:


 Bandwidth – the amount of data that can be transmitted through the medium
 Interference: ability to avoid cross talks (cross talks are signal exchanges between
signals at close frequency ranges).

There are two broad categories of transmission media, guided and unguided.
1) Guided transmission media: - uses a cabling system that guides the data signals along a
specific path. The data signals are bound by the cabling system. Guided media is also
known as bound media.
 Example: twisted pair, optical fiber, coaxial cable, etc.

3
Introduction to ICT Chapter 3

2) Unguided Transmission media (Wireless transmission):- Data transmission through


air/space (i.e., wireless system). Nothing guides the data transmission along a specific
path. The data signals are not bound to a cabling media and are therefore often called
unbound media. In unguided media, transmission and reception are achieved by means
of an antenna.
 Example: Microwave, Satellite, Infrared (e.g. Bluetooth)

3.2. Computer Networks

Section Objectives
After completing this section the learner should be able to:
 define computer networks
 identify networking devices
 classify networks based on their size
 define network topology
 identify the advantages and disadvantages of different topologies

When a computer system is processing data all by itself, without any interaction or
interconnection with any other computer system, it is called a Stand-Alone Computer System. A
Network System is where two or more computers are connected to each other for the purpose
of data communication and sharing of resources.

A computer network is a combination of hardware and software that allows computers to


exchange data and share software and devices, such as printers. Networks are widely used by
businesses, universities, and other organizations.

Some of the most important advantages of a computer network system are:


 Data sharing between different users of computers with appropriate data security and
access control
 Sharing of software application systems – software applications installed on remote
computers can be used from any other computer on the network
 Distribution of computing load – a task that has to be processed will be divided among
different computers to reduce the load of a single computer
 Sharing of high power computing resources situated at a central location on a need basis
 Sharing of costly special devices by several computer users

3.2.1.Network Devices
Server(s)
 High capacity computers that function as the central repository of resources/services
the network provides.
 Usually the server is also responsible for controlling which users on which computers in
the network are granted access to a service.

4
Introduction to ICT Chapter 3

Workstations
 A place where the services of the server are used (This is where the user is working)
 Any computer where user is working; does not have to be high capacity computer

Cabling
 Cables that interconnect the different devices on the network
 Various types of cables are used, including coaxial cable, twisted-pair cable and fiber-
optic cables
 Wireless networks do not require physical cables

Network Interface Card (NIC)


 NIC is located in every workstation on the network as well as in the servers
 Card that plugs into one of the expansion slots on the motherboard of a network device,
provides connector on computer back to connect device to network
 Acts as “transmitter” and “receiver” and therefore can be referred to as transceiver

Other Networking Devices


 Modern networks require special purpose devices to connect workstations and servers
on the network
 Some commonly used devices include:
o Network Repeater: connects two segments of the network cable; retimes and
regenerates the signals to proper amplitudes and sends to the other segments
o Hubs: devices that connect other devices (workstations, servers, printers, etc) to
each other; suitable for small networks (<16 devices on the network)
o Switches: devices that serves same function as hubs, but are faster, more expensive
and used in large networks
o Routers: devices used to interconnect different networks. If a company has different
networks at different sites, routers are used to connect the networks
o Firewall: devices used to protect a network from unauthorized access from a
different site

3.2.2.Types of Networks
Based on the geographic span of coverage, computer networks are broadly classified into three
major categories.
 Local Area Network
 Metropolitan Network
 Wide Area Network

Local Area Network (LAN)


 Computer network that connects computers and other devices located within close
physical proximity (like in a building)

5
Introduction to ICT Chapter 3

 Since all equipment is located within a single establishment, LAN’s are normally
installed and maintained by an organization; also called private data networks
 Example: computer network installed in Hawassa University

Metropolitan Area Network (MAN)


 Larger version of a LAN
 May span several corporate offices or an entire city

Wide Area Network (WAN)


 Covers a large geographical area
 Devices may exist in different sites and even different continents
 Connection may be through telephone lines, microwaves and satellites
 May span a country, a continent or the entire globe
 Example: the Internet

3.2.3.Network Topology
The way in which devices on the network are connected is called the topology of the network.

Network topology specifically refers to the physical layout of the network, especially the
locations of the devices and how the cable is run between them. It is important to select the
right topology for how the network will be used. Each topology has its own strengths and
weaknesses. Four of the most common topologies are bus, ring, star and mesh.

3.2.3.1. Bus Topology


The bus type topology is a network configuration that has a single high-speed data transmission
line (called a bus) shared by nodes and stations. In this type of network, data transmitted by a
station through its node is "broadcast" bi-directionally. All nodes receive the signals. One of the
nodes, recognizing that the signal is addressed to it, accepts the data and forwards it to the station
attached. All signals set bi-directionally are properly terminated at both ends of the bus, and one
failed node will not affect the communication capability of other stations. Unlike the ring topology,
the data travels by the nodes and does not have to go through each node.

6
Introduction to ICT Chapter 3

Advantages:
 Uses the least amount of cable
 Wiring layout is simple
 Has a resilient architecture; its simplicity makes it very reliable
 Very easy to extend
Disadvantages:
 Fault diagnosis and isolation is difficult

3.2.3.2. Ring Topology


The ring type consists of a network configuration that connects nodes at certain intervals on a
ring-shaped, high-speed data transmission line. All nodes share the ring - the ring is connected
separately to the transmitting and receiving sections of each node. Data placed on the ring by a
station makes its round on the ring. Each node receives the data and checks to see if the data is
addressed to it. When the data is received by the node to which it is addressed, the node accepts
and responds accordingly. Otherwise, the node reproduces and repeats the data for transmission
to the next node.

Token ring access method can be described as follows:


 An idle token rotates around the ring
 A sending computer takes the token and attaches the message to be sent on it
 The token passes to the neighboring computer and so forth
 The receiving computer takes the token and copies the message and leaves the token to
rotate
 The sender again takes the token and removes the massage from the token to make the
token empty

The token ring technology creates opportunity for acknowledging receipt of messages by the
receivers.
Advantages
 The overall cable length is short
 The shorter cable means lower cabling costs
 No wiring closet space is required

7
Introduction to ICT Chapter 3

Disadvantages
 A single node failure causes network failure
 It is more difficult to diagnose faults
 Network modifications/recognition is more difficult and disrupts network operation

3.2.3.3. Star Topology


The Star type topology has a controller (hub) at its centre that is connected in a star shape to
stations via dedicated transmission lines. The controller or hub is the focal point of the star, and
all network traffic must pass through the hub as the centre controls all communications between
stations. Accordingly, as and when the central controller fails, the entire network communication
will be disabled.

Advantages
 Cable layouts are easy to modify
 Workstations can be added to the network easily
 Centralized control/problem diagnosis resulting from defective communication lines
is easily identified.
Disadvantages
 Large amounts of cable are required
 More cable means greater expense
 A centralized hub means a single point for potential for network failure

3.2.3.4. Mesh Topology


 Every node connected to every other node
 This is when we use the three networks together.
 No center of network

8
Introduction to ICT Chapter 3

By modifying and combining some of the characteristics of these “pure” network topologies,
“hybrid” topologies result that can often provide greater efficiency.

3.2.3.5. Star-Wired Ring Topology


 The star-wired ring combines the attributes of both the star and ring topologies. In
essence, the hub of this topology, referred to as a wiring center, constitutes a ring.
 This wiring center can be in one location or several locations throughout the network
and must make a complete physical connection.
 If the ring of the wiring center is broken, the network fails. Workstations are attached to
this ring, radiating outward from the ring’s wiring center.
 The radiating workstations constitute the star section of this star-wired topology.

3.2.3.6. Extended Star Topology


 Made of a number of star networks, whose centers are connected together by another
central device.
 Used to minimize network traffic among two different networks
 Typical of today’s networks

3.3. The Internet

Section objectives
After completing this section learners should be able to:
 define the Internet
 discuss the use of Internet
 identify services provided over the Internet
 define Internet protocols and addressing

The Internet is a term used to describe a worldwide network of computer networks connecting
millions of computers around the world.
 It is a "network of networks" that consists of millions of smaller domestic, academic,
business, and government networks, which together carry various information and
services.
 It is a group of two or more networks that are
o Interconnected physically
o Capable of communicating and sharing data with each other
o Able to act together as a single network
 The Internet connects millions of computers globally and provides worldwide
communications to businesses, homes, schools, and governments.

Individuals and organizations make information available through the Internet for a variety of
reasons. Some of this information is freely available to the general public, while some of it is
restricted to a particular user community.

9
Introduction to ICT Chapter 3

The following are some of the people who put information on the Internet, and the types of
information they make freely available.
 Governments often have a mandate to make information freely available to their
citizens, and are publishing a wealth of statistical and other information on the web.
 University researchers, educators and students make available various types of
academic information, including “unpublished” articles.
 Non-profit organizations post information on various topics.
 provide useful supplementary information on their commercial web sites, Commercial
companies sometimes providing the general public with limited access to databases.
 Publishers provide excerpts of their print publications, usually periodical issues. There
are also a growing number of free e-zines and e-journals.
 are digitizing publications for which copyright has expired and making them Archives
and Libraries available on the web.
 Libraries also often make catalogues of their holdings freely available.
 Individuals post information about topics of personal interest.

3.3.1.Advantages of the Internet


To Get Information
You can get information about people, products, organizations, research data, electronic versions
of the printed media, etc. from the Internet. You can get easy access to a wealth of information
and entertainment. As such it is often described as the prototype for a world wide information
"superhighway".

To Provide Information
Most of what you want to provide could be considered global advertising. Using the internet is one
of the best and most inexpensive ways to let people know who you are, what you are doing or
have done and how to reach/find you.
 Publishing: including full test articles, reports, abstracts, computer programs, and
demonstrations
 Teaching: The possibilities here include both distance learning and assistance for
students
 Sharing/exchanging information with the outside world

Ability to Communicate
 The Internet gives people the ability to communicate with other connected computer
users through electronic mail and real time typed conversations (bulletin boards,
databases, and discussion groups).
 Users will be able to use electronic mails to transmit messages, announcements and
document/file attachments to other users within the Intranet or over the Internet.

10
Introduction to ICT Chapter 3

3.3.2.Internet Connectivity
You can connect to the Internet in one of two basic ways, dialing into an Internet service
provider’s (ISP) computer, or with a direct connection to an Internet service provider. The
difference is mainly in the speed and cost. In most cases, you connect to your ISP using a
telephone line modem. This type of connection is called the Dial-up connection. Sometimes
you go in for a direct connection.

Dial-up Connection: is type of Internet connection that is made by connecting a plain old
telephone line to the phone jack at the back of a computer which, in turn connects to the
internal modem of the computer, and allows the user to dial a phone number of a service
provider and connect to the Internet.

Direct Connection: is a permanent connection between your computer system and the
Internet. This is sometimes referred to as a leased-line connection because the line is leased
from the telephone company.

You can also get a direct connection to your ISP, where you have a fixed cable or a dedicated
phone line to the ISP. Often the dedicated line is an ISDN (Integrated Services Digital Network)
line that is a higher speed version of the standard phone line.

3.3.3.Applications and Services on the Internet


The Internet is actually very boring since it is nothing more than hardware connections. It is the
Internet applications and services that make the Internet come alive.

Internet applications include


 World Wide Web (WWW),
 Electronic mail
 File Transfer
 Discussion Groups
 Usenet (News Group)
 Internet Relay Chat/Instant Messaging
 Search Services
 Social Media (Facebook, Twitter)

World Wide Web


In simpler terms, the Web is an Internet-based computer network that allows users on one
computer to access information stored on another through the worldwide network.

The WWW is an Internet service that provides a network of interactive documents and the
software to access them. It is based on documents called web pages that combine text,
pictures, forms, sound, animation and hypertext links called hyperlinks. To navigate the WWW,
users “surf” from one page to another by pointing and clicking on the hyperlinks in text or
graphics.

11
Introduction to ICT Chapter 3

E-Mail (electronic mail)


E-Mail is the ability to write a message to someone, using a mail program, and use the
Internet as a means of delivering that message. Email is not a free service. The cost of your
email is covered in your service charge to your provider.
E-mail is the most popular application of computer communication system. For the purpose of our
discussion, we shall adopt the simplest definition of E-mail as follows:
Email (Electronic mail) refers to a computer-based system allowing two or more people to
communicate through the transmission of character coded or graphic information by
electronic means. Electronic mail, or e-mail, allows computer users locally and worldwide
to exchange messages. Each user of e-mail has a mailbox address to which messages are
sent. Messages sent through e-mail can arrive within a matter of seconds.

Usenet
Usenet is internet-based bulletin board that allows reading and posting of "news" in various
"newsgroups." There are thousands of newsgroups covering a myriad of topics.

FTP
FTP stands for File Transfer Protocol. This is both a program and the method used to transfer
files between computers. Anonymous FTP is an option that allows users to transfer files from
thousands of host computers on the Internet to their personal computer account. FTP sites
contain books, articles, software, games, images, sounds, multimedia, course work, data sets,
and more.

3.3.4.Basic Internet Terms


Now let us familiarize ourselves with some basic Internet terms.
 Web page: are files that contain information and links to resources through out the
Internet. A web page (page) is an electronic document written in a computer language
called HTML (HyperText Markup Language). These web pages are linked together trough
a system of connections (called Hypertext links, hyperlinks, or links), which enable the
user to jump from one page to the other by clicking on the link.
 Web site: is a set of related (linked trough hypertext links) web pages, published by an
organization or an individual. For example Addis Ababa University has its own web site
 Home page: is a starting point or a doorway to a web site. Like the table of contents of a
book, the home page usually provides an overview of what could be found at the web
site.
 Internet Service Provider (ISP): is an organization that provides the required software,
which is used to connect to the Internet. For a monthly fee, the ISP provides the user a
software package, username, password, and access phone number(s). Ethiopian
Telecommunication Corporation (ETC) is the only ISP in Ethiopia.
 Download and Upload: Download refers to the activity of moving or copying a
document, program or other data from the Internet or other interconnected computer
to one’s own computer. For example, while accessing a web site, the HTML code and

12
Introduction to ICT Chapter 3

graphics must be downloaded from a remote server onto the user’s computer, before
viewing the web site. Upload is just the opposite of download. In case of uploading, the
user moves or copies a document, program or other data from his/her computer to the
Internet.
 Online and Offline: The term online is commonly referred to as “connected to the
WWW via Internet”. When you connect to the Internet, you are online. Offline is just
the opposite of online. Offline means that the user is no longer connected to the remote
computer (Internet).

3.3.5.Internet Protocols
Internet protocols are sets of rules that allow for inter-machine communication on the Internet.

One of the few requirements of a computer connected to the Internet is that it must speak a
common language (or protocol). This protocol, called Transmission Control Protocol / Internet
Protocol (TCP/IP), is what enables small desktop personal computers to converse with huge
super-computers across this entanglement of network connections.

All computers on the Internet communicate with one another using the Transmission Control
Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use
client/server architecture. This means that the remote server machine provides files and
services to the user's local client machine. Software can be installed on a client computer to
take advantage of the latest access technology.

Internet connectivity is impossible without the communications standard TCP/IP Transmission


Control Protocol and Internet Protocol. This universal standard allows different types of
computers to communicate with each other, regardless of their make, model, or operating system.

Some major protocols accessible on the Internet:


 E-mail (Simple Mail Transport Protocol or SMTP) - distributes electronic messages and
files to one or more electronic mailboxes
 Telnet (Telnet Protocol) - facilitates login to a computer host to execute
 FTP (File Transfer Protocol) - Transfers text or binary files between an FTP server and
client

3.3.6.Internet Addressing
Very similar to the postal address system, Internet addressing is a systematic way to identify
people, computer and the Internet resources. On the Internet, the term “address” is used
loosely. Address can mean many different things from an electronic mail address to a URL
(universal resource locator).

When a new site is put online it has a specific network address that looks something like
207.70.128.240. In order to make the site easier to remember, a unique name is correlated
with the number.

13
Introduction to ICT Chapter 3

IP Address An IP address is a unique number that identifies computers on the


Internet; every computer directly connected to the Internet has one. An
IP address consists of four numbers separated by periods. Each number
must be between 0 and 255.
Domain Name Most computers on the Internet have a domain name. A domain name is
the text name corresponding to the numeric IP address of a computer on
the Internet. A domain name must be unique. Internet users access your
website using your domain name.

A domain name always contains two or more components separated by periods, called “dots”.
Some examples of domain names are: ibm.com, nasa.gov, ju.edu.et etc. Once a domain name
has been established, “sub-domains” can be created within the domain. For example, the
domain name for a large company could be “vni.com” and within this domain, sub-domains can
be created for each of the company’s regional offices.
The portion of a domain name after the dot describes the type of organization holding that
name. The major categories are:
 Com – commercial entities
 Edu – educational institutions
 Net – organizations directly involved in the Internet operations, such as network
providers and network information centers.
 Org – miscellaneous organizations that do not fit any other category, such as non-profit
groups
 Gov – united states federal government entities
 Mil – united states military

Country codes: Two-letter abbreviation for a particular country, et for Ethiopia, uk for united
kingdom, fr for france, etc. No country code abbreviation is used for USA.
For example: http://www.google.com/et is the URL for Google Ethiopia.

Exercise
1. What are the three modes of data transmission? Give an example from each
2. What do we mean by guided media?
3. Compare and contrast guided and unguided media
4. Compare and contrast the different network topologies.

14
Introduction to ICT Chapter 3

3.4. Computer Security

Section Objectives
After completing this section the learner should be able to:
 Describe computer security objectives
 Define the key words used to discuss computer security
 Explain the primary mechanisms used to protect computers and their contents
 Define computer viruses & identify some of the most common types
 Identify some ways to prevent or recover from a virus infection

Computer security is a system designed to protect single computers and network-linked


computer systems from any damage; accidental or intentional. This includes damaging or
destroying computer hardware and software, physical loss of data, deception of computer
users and the deliberate access of databases by unauthorized individuals. Prevention measures
help you keep away intruders from accessing any part of your computer system.
3.4.1.Computer Security Objectives
Computers and the information they contain are considered confidential systems because their
use is typically restricted to a limited number of users. In general, there are three distinct
objectives for computer security
 Confidentiality
 Integrity
 Availability

Confidentiality refers to ensuring that there is no deliberate or accidental improper


disclosure of sensitive information.

Integrity refers to protecting against deliberate or accidental corruption of information. It


refers to internal consistency.

Availability refers to protecting against accidental actions that cause information resources
to be unavailable to users when needed (Removal of data).

Computer Security Key Words


There are four key words that come up in discussions of computer security:
 Assets
 Vulnerability
 Threats
 Safeguards

15
Introduction to ICT Chapter 3

Asset is any information, software, personnel, hardware, or computer facility such as


physical location. The value of an asset is determined by its inherent value and the short-
term impacts and long-term consequences of its damage or loss.

Vulnerability is a point where a system is susceptible (exposed) to attack, either because of


a fault in the software, improper system configuration or administration, or some
combination of these problems.

Threat describes the source of probable trouble or attack to a system that could cause
losses. While threats can take on many forms, they generally fall into three broad
categories: person, thing or event a person is the one who uses the system. Because of
careless oversight, poor training, intend to harm or criminal intent it could be a threat to the
system. Sometimes the problems could be the result of the things used in the system such
as faulty equipment, virus, and software failure. The last category of threat is an event.
This includes interruption of electricity, fire, and flood, and network failure. A threat is
possible only because the system is vulnerable to that particular threat. Vulnerability
means errors or problems or other conditions that make a system open to threats.

Safeguard is a technique for protecting against a threat. Thus, computer security is that
part of information resources management which is concerned with applying safeguards
(both technical and administrative) to minimize vulnerabilities with the goal of avoiding or
reducing potential threats.

3.4.2.Protecting Computers
Computer-based information systems are much more exposed to different problems such as
abuse, human errors, and crime etc than the manual system. Organizations, institutions etc
contain very vital information on employees, customers, vendors, etc., and this information
must be protected from being accessed by unauthorized individuals. Many security
mechanisms are used to protect computers and their contents. Some examples include:
Common Security Mechanisms
 Physical Security
 Passwords
 Firewalls
 Codes (encryption)
 Audits
 Backup

Physical security has two main areas of concern. The first is the computer installation,
(central hardware, peripheral and secondary equipment and the functions associated with
it). The second is the necessity of back-up in case the system does fail.

Physical security means use of conventional physical protection measures. Methods to


provide security for physical objects are well developed, and are not unique to computer

16
Introduction to ICT Chapter 3

equipment. Physical security includes door and windows locks, keyboard locks, and so on.
It provides controls over the access and use of computer facilities and equipment and
controls for the prevention of theft. It also includes controls that reduce or eliminate
certain environmental threats such as power fluctuation, humidity, dust, varying
temperature and fire.

Passwords are a confidential sequence of characters that give approved users access to
computers. To be effective, passwords must be difficult to guess. Effective passwords
contain a mixture of characters and symbols that are not real words. If you want even more
protection purchase a special security program for you entire computer. With these
programs, anyone can turn on your computer but they can’t use it until they enter the
correct password.

Firewalls
 Keep internal networks secure while allowing communication with the rest of the
Internet
 Guard against unauthorized access to an internal network.\
 Acts as a gateway with a lock

Codes refers to encrypting software to protect transmitted information. A message is


encrypted by a secret numerical code, called encryption key. The message can be read only
after it has been reconstructed with a matching key.

Audit control Software is used to monitor and record computer transactions as they
happen so auditors can trace and identify suspicious computer activity.

Back ups
 Protection of data by keeping copies of sensitive data in several different locations
 Data recovery insurance is a system of making regular backups
 Destructive computer programs, sabotage, human errors, power losses, machine failure,
fire, flood, lightning and earthquakes can damage or destroy computer data along with
hardware

3.4.3.Computer Viruses
Computer viruses are specific type of programs written deliberately to cause harm to
someone’s computer or to use that computer in unauthorized way.

Virus Program
 Malicious (destructive) program/software that damages computer
 Needs a host to infect; the host is an innocent program
 Reproduces its own code by copying itself onto the host program
 Executes when infected program is executed
 Spreads from program to program or from disk to disk

17
Introduction to ICT Chapter 3

 May damage the files on a computer or attack the system in general

3.4.3.1. Types of Viruses


Worm
 Program that copies itself over and over again causing a computer to crash when it runs
out of RAM/hard disk space
 Does NOT infect other programs

Trojan Horse
 Program that appears to have a useful function but really does not
 Delivery vehicle for some code (logic bomb or virus) on to a computer

Bomb (Logic Bomb):


 Program that waits a certain period of time before executing its code
 Piece of code embedded in a program or the operating system itself that waits for a
particular event to occur

Boot Sector Viruses


 -Infect the boot sector and related areas on a hard or floppy disk
 Is activated every time the machine is powered on

Program Viruses
 Contaminates files that contain computer code specially “.exe” and “.com” files
 Can be spread through any medium used to transport software

3.4.3.2. Prevention of Viruses/Recovering if Infected


 Buying original software from the company that created the software
 Using an antivirus program (some are free, others you have to buy) and making sure
that it is updated regularly
 Back up – Continuous duplicating of important files/documents
 Re-formatting disk to erase boot sector and partition viruses

18

You might also like