8th Notes Chapter 1 Continue (11 May 2024)
8th Notes Chapter 1 Continue (11 May 2024)
Notes
(1)
data into packets before they are sent and for reassembling the
packets when they arrive at the destination. IP is a set of
specifications that determines the best route for the packets across
the Internet so that the packets reach their destination address.
• HTTPS (Hyper Text Transfer Protocol Secure): HTTPS is an extension
of HTTP. It is encrypted to ensure secure communication over
internet.
NETWORK SECURITY
A computer on a network can be accessed by many users. Security
measures have to be taken to protect networks from unauthorized access
and to prevent data or information theft.
Threats to Computer
Files can be shared between the computers on a network. This makes a
computer vulnerable to attacks by viruses, worms, Trojan horses and so
on that can easily spread because of the underlying network. Some
common threats are:
(2)
• Trojan Horse : A computer program that appears to be a useful
software but actually causes damage once installed or executed
onto your computer system is known as a Trojan horse or a Trojan.
Computer Security:
(3)
Mobile networks:
Starting with the 1G (First generation) networks that used analog
technology and offered only voice-based services, the wireless
communication technology has evolved to 4G (fourth generation) and 5G
(fifth generation) network that offer stable connectivity with extremely high
speeds.
(4)