0% found this document useful (0 votes)
1K views55 pages

Grade 12 Cat Theory Notes-Term2 - Network

The document provides an overview of network technologies, internet services, and their implications, focusing on concepts such as WAN, internet access types, and eFiling. It outlines advantages and disadvantages of various internet services and connection types, including ISPs and their offerings. Additionally, it discusses criteria for choosing an internet connection based on factors like speed, cost, and reliability.

Uploaded by

mngunithabiso29
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views55 pages

Grade 12 Cat Theory Notes-Term2 - Network

The document provides an overview of network technologies, internet services, and their implications, focusing on concepts such as WAN, internet access types, and eFiling. It outlines advantages and disadvantages of various internet services and connection types, including ISPs and their offerings. Additionally, it discusses criteria for choosing an internet connection based on factors like speed, cost, and reliability.

Uploaded by

mngunithabiso29
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

© Sirantwi 2020

CAT THEORY NETWORK, INTERNET TECH AND SOCIAL


IMPLICATIONS
BY SIRANTWI
Youtube channel: CAT SIMPLIFIED WITH SIRANTWI

Click this to Subscribe

Playlist/Link URL

GRADE 12
SPREADSHEET PLAYLIST YouTube Link

DATABASE PLAYLIST YouTube Link

MS WORD PLAYLIST YouTube Link

HTML PLAYLIST YouTube Link

PAT PLAYLIST YouTube Link

YouTube Link
THEORY PLAYLIST
SYSTEM TECHNOLOGIES Q/A YouTube Link

TIKTOK Follow me on TikTok

INSTAGRAM Follow me on Instagram

GRADE 11
SPREADSHEET PLAYLIST YouTube Link

DATABASE PLAYLIST YouTube Link

MS WORD PLAYLIST YouTube Link

1
© Sirantwi 2020

HTML PLAYLIST YouTube Link

PAT PLAYLIST

GRADE 11 THEORY YouTube Link


SYSTEM TECHNOLOGIES Q/A YouTube Link

GRADE 10
SPREADSHEET PLAYLIST YouTube Link

MS WORD PLAYLIST YouTube Link

HTML PLAYLIST YouTube Link

PAT PLAYLIST

GRADE 10 THEORY YouTube Link

2
© Sirantwi 2020

GRADE 12 CAT THEORY NOTES


Term 2 Theory Notes. Network Technologies.
TERM 2 Notes

Network Technologies
Topic Concept / Term Explanation / Definition Advantages Disadvantages
WAN A network that spans a large 1.Allows global 1.Expensive to set up
geographical area and connects communication 2.security risks due to
multiple LANs via communication 2.Data sharing public access.
channels. 3.Access to online
➢ Communication methods services.
include cables, microwaves,
radio waves and satellites.

The Internet is the biggest WAN.


Wide Area
Networks
The purpose and role of a
(WAN)
WAN
1.The main purpose of a WAN is to
connect LANs(Local Area Networks)
together.
2.Facilitate communication
between users over a large
distance.
3.Share a central data source

3
© Sirantwi 2020

Topic Concept / Term Explanation / Definition Advantages Disadvantages


Internet A global network of computers that 1.Easy access to 1.Can expose users to
share information. information cybercrime,
OR 2.Global 2.Misinformation,
The huge collection of networks in communication, 3.Distraction.
the world. 3.Entertainment
4.Cloud services.
Internet Services Online services like email, cloud 1.Increases 1.Can consume large
storage, e-commerce, social media, productivity, bandwidth,
and streaming. 2.collaboration 2.not all services are
3.access to services. secure.
Government Services like 1.Convenient, 1.May be difficult for
Internet Services eFiling, 2.time-saving, people without digital skills
license renewals, 3.accessible 24/7. or access.
Home Affairs, 4. No need to stand in
municipal services online. queues 2. Many people don't own
Election information accesible 5.Communication computers, and can't use it.
online, etc between government
and citizens is easier 3. More data is used.
and quicker.
6. Improvement of 4. Not necessarily safer due
green computing to many viruses that can be
7. Citizens can access spread through the
these services internet.
anywhere where
internet access is 5. If there is no internet
available. access, you cannot access
8. Immediate feedback the websites.
is provided.
9. Information is up to 6. The initial cost is
date. expensive

4
© Sirantwi 2020

Topic Concept / Term Explanation / Definition Advantages Disadvantages

7 Two systems need to be


maintained – the
traditional ‘manual’ system
and the electronic ‘self-
service’ system

eFiling (SARS) Definition: A secure online system 1.Convenient – can be 1. Complex for users with
that allows individuals and done from home; little tax knowledge—may
businesses to submit tax returns require assistance.
and perform tax-related functions 2.saves time;
electronically 2. The Digital Divide (the
3.available 24/7;
difference between people
What can be done by efiling
File tax returns, 4.immediate who have easy access to
make payments, submission
the internet and those who
view tax status, confirmation.
receive notices from SARS, register do not) becomes more
for tax. 5. Reduces queues at
noticeable.
SARS offices;

6. improves record
keeping.

Streaming Watching or listening to media 1.No need to 1.Needs a fast, stable


(video/music) in real-time via the download files internet connection;
internet. 2.Access to huge 2.high data usage.
libraries instantly.

5
© Sirantwi 2020

Topic Concept / Term Explanation / Definition Advantages Disadvantages


Informed Comparing connection types like Helps you choose a Can be confusing with
Decisions ADSL, Fibre, LTE, 5G, Satellite. connection suitable for many options and terms.
your usage and
budget.
High-speed internet access that is 1.Fast data 1.Can be more expensive
always on (e.g., Fibre, LTE, 5G, transmission speed than capped or slower
ADSL/SDSL). 2.reliable connection. services.
3. includes wifi 2. May no be available in
your area
Fibre :Uses fibre-optic cables to 1.Very high speed, 1.Availability limited in
transmit data as light signals. 2.stable connection, some areas;
Internet Access One of the fastest internet options. 3. ideal for streaming 2.installation may be
and gaming. costly.
LTE: (Long-Term Evolution) – a 4G 1.Wireless; 1.Speed depends on signal
wireless broadband standard using 2.good speed; strength;
mobile devices. 3.portable (used with 2.affected by network
mobile phones or congestion.
Broadband
routers).
5G: Fifth-generation wireless 1.Ultra-fast speed; 1.Limited coverage
network offering faster speeds and 2.Ideal for IoT, gaming, currently;
lower latency than LTE/4G. and HD streaming; 2.requires 5G-compatible
3.Supports many devices.
devices.
ADSL: Asymmetric Digital 1.Affordable; 1.Slower compared to
Subscriber Line – uses copper 2.widely available in fibre/LTE;
telephone lines for internet; urban areas. 2.Affected by line distance
3.Always on and quality.
Download speed is higher than 4.Includes wifi 3. May not be available in
upload speed. 5.Includes telephone your area
calls 4.Not a mobile solution

6
© Sirantwi 2020

Topic Concept / Term Explanation / Definition Advantages Disadvantages


SDSL : Symmetric Digital Subscriber 1.Good for businesses 1.Less common and more
Line – equal upload and download that need high upload expensive than ADSL;
speeds over copper lines. speeds (e.g., hosting). 2.limited speed.
3. Not a mobile solution
Bandwidth The maximum amount of data 1.Higher bandwidth = 1.Higher bandwidth plans
transfer (measured in Mbps or faster downloads can cost more.
Gbps). 2.smoother streaming. 2. data depletes faster
Throttling ISP intentionally slows down your 1.Helps ISPs manage 1.Slower internet affects
internet speed after reaching your network traffic. streaming and
data limit. downloading.
Shaping Prioritising certain types of internet 1.Ensures critical 1.Slows down less
services (e.g., browsing over services (like email, important traffic.
Data torrents). video calls) run
Management smoothly.
Unshape is equal preferences
given to all internet services
Fair Use Policy Policy that limits "uncapped" users 1.Protects network 1.Speed may drop after
(FUP) to prevent overuse and ensure quality for all users. high usage.
fairness.
Communication Communication Devices like Enable connectivity Can be costly;
Devices modems, and access to the depend on stable
routers, switch internet and apps. networks.
mobile phones, and smartwatches
that send and receive data.
Modem, Switch A modem is a device that connects Allow home or office Modems may need
& Router your computer or network to the networks to function. configuration;
internet by converting digital data routers have limited range.
into a signal that can travel over
phone lines, cable, or other types of
connections

7
© Sirantwi 2020

Topic Concept / Term Explanation / Definition Advantages Disadvantages

Switch connects computers to


network

Router connects networks


together.
A router can also act as a firewall
Wireless Protocols like Wi-Fi, Bluetooth, 5G, Enable wireless Each has range/speed
Standards LTE for wireless communication. connectivity across limitations.
many devices.
NFC Near Field Communication – short- 1.Quick data transfer, 1.Works only at close
range, wireless data exchange (e.g., 2.convenient, range; 2.may not be
tap-to-pay). 3.secure transactions. supported on all devices.
Blurred Devices combining multiple 1.Convenience of all- 1.Shorter battery life;
Technologies functions (e.g., smartphones = in-one devices. 2.more complex to repair.
(Convergence) phone + camera + GPS).
Internet URL Shortener Converts long URLs into short ones 1.Easier sharing, 1.Can obscure the
Technologies (e.g., bit.ly, tinyurl.com). 2.neater links. destination URL—security
risk.
Browser Add- Small tools that enhance browser 1.Improve productivity 1.May slow down the
ons functions (e.g., ad blockers, and security. browser
password managers). 2. cause compatibility
issues.
Productive Using features like bookmarks, 1.Saves time, 1.Requires self-discipline to
Browsing tabs, extensions to manage work. 2.improves avoid distractions.
organisation.
IoT (Internet of objects (fridge, lights, etc.) 1.Smart homes, 1.Security concerns,
Things) connected to the internet to 2.efficiency, 2. reliance on internet.
collect/share data. 3.convenience.

8
© Sirantwi 2020

Topic Concept / Term Explanation / Definition Advantages Disadvantages


Wearables Smart devices worn on the body 1.Track health, 1.Battery-dependent,
(e.g., smartwatches, fitness 2.Quick access to 2.privacy concerns.
trackers). information.

ADVANTAGES AND DISADVANTAGES OF WIRELESS CONNECTIONS


ADVANTAGES Disadvantages and limitations

➢ Mobile access 24/7 to the Internet ➢ Limited or slow access if in area with
from anywhere in the world. poor coverage.
➢ Use smartphone or tablet to access ➢ No cables to connect to the Internet.
the Internet.
➢ Can connect to the Internet from ➢ Never escape communication (such as
anywhere where there is coverage e-mail and browsing).

➢ Online privacy or security could be an


issue. harder to control access to
network.

➢ More expensive per megabyte than


cabled ones.

9
© Sirantwi 2020

Internet Service Provider (ISP)


a company that has a permanent, fast connection to the Internet and sell access and services for a monthly fee

📶 Services and Offers Provided by ISPs


ISPs offer the following services

Service Typical Offers from ISPs


1. Internet Access - Fibre (uncapped/capped: 25–1000 Mbps)
- LTE / Mobile Data
- Free installation

10
© Sirantwi 2020

- Free router
- No-contract options
2. Email Services - Free email address
- Spam filtering
- Webmail access
- Secure mailbox
3. Web Hosting / Domains - Free domain name with hosting
- SSL certificate
- Website builder tools
4. VoIP (Voice Calls) - Free VoIP number
- Low call rates
- VoIP router or handset included
5. Cloud Storage / Backup - Free limited cloud storage (e.g. 5GB–50GB)
- Paid upgrades
- Automatic backups
6. Streaming Services - Bundled Showmax / Netflix
- Free or discounted subscriptions
- Zero-rated data
7. Security Services - Free antivirus trial
- Parental controls
- Add-on security packages

11
© Sirantwi 2020

8. VPN Services - Built-in VPN with internet plans


- Discounts on VPN subscriptions
9. Technical Support & Setup - Free home installation
- 24/7 support
- Remote assistance

Example ISP Offers (South Africa)

ISP Common Offers

Afrihost Free setup, free-to-use router, month-to-month contracts, first month 50% off

Telkom Fibre + mobile bundles, Showmax deals, landline/VoIP calling

Vodacom LTE SIM + router deals, family data sharing, discounted fibre

Rain Unlimited 4G/5G data, fixed wireless internet, no contracts

MTN Fibre + LTE deals, smart home bundles, free mobile data with some packages

12
© Sirantwi 2020

Criteria for Choosing an Internet Connection


Criteria Description / What to Consider
Availability Whether the connection type (e.g. fibre, ADSL, LTE) is available in your area.
Speed The download and upload speeds required (e.g. for streaming, gaming, working from home).
Cost Monthly fees, installation costs, and whether it's prepaid or contract based.
Reliability How stable the connection is (e.g. fibre is more reliable than ADSL or mobile in bad weather).
Usage Needs Consider number of users, devices, and types of online activity (e.g. video calls, downloads).
Data Limits Whether the package is uncapped or has a data cap (e.g. 20GB, 100GB, unlimited).
Cap-amount of data that can be used for uploading / downloading in each period of time
usually a month.
Uncap is unlimited amount of data
A bundle is a package of services offered by an Internet Service Provider (ISP) that combines
multiple services into a single offer.

Example of a Bundle:
• 1GB Data + 100 minutes of voice calls + 100 SMS for a set price, often with a 30-day
validity.
Mobility If you need to move the connection around (mobile internet vs fixed fibre).

13
© Sirantwi 2020

Service & Quality of customer service and availability of tech support.


Support
Bundled Extras like free router, VoIP, streaming services, or email accounts.
Services
Security Built-in firewall, antivirus, or VPN options.
Features

Shaped vs Shaped: Certain internet services (e.g., browsing, e-mail) are given high priority, while other
Unshaped services (e.g., streaming) are limited.
Unshaped: All internet services get equal priority, and no specific service is limited.
Broadband vs Broadband: A high-speed permanent internet connection
Bandwidth (e.g., ADSL, SDSL, 3G/4G).

Bandwidth: The amount of data that can travel from one


point to another over a connection in a specific time period.
Downloading vs Uploading: Sending data from a computer over the internet
Uploading connection.
Downloading: Receiving data into a computer from the
internet.

14
© Sirantwi 2020

Soft cap/Hard Soft Cap: A data limit where users can continue using the
cap internet after reaching the cap, but with reduced speed.
Throttled speed (ISP slowed down) after the cap is reached.

Hard Cap: A data limit where users can no longer access the
internet once the cap is reached.
No service (internet stops working) once the cap is
exceeded.

Data Transmission Speeds, Wired vs Wireless Connections

Topic Description
Data • Data Transmission Speed refers to the rate at which data is transmitted from one point to
Transmission another over a network or communication channel.
Speeds • In simpler terms, data transmission speed indicates how quickly data (such as files,
videos, or web pages) can be sent or received over a network, with higher speeds meaning
faster transfers.

• Measured in bits per second (bps) and kilobits per second (Kbps) megabits per second
(Mbps) or gigabits per second (Gbps)
Wired ADSL (Asymmetric Digital Subscriber Line):
Connections • ADSL is a type of broadband internet connection that uses telephone lines to transmit
digital data.
• A digital connection via a fixed landline that provides more bandwidth for downloading than
uploading.
• ADSL provides different speeds for downloading and uploading.
• The download speed is much higher than the upload speed.

15
© Sirantwi 2020

SDSL (Symmetric Digital Subscriber Line):


• SDSL is another type of DSL broadband connection, but unlike ADSL, it offers equal
speeds for both uploading and downloading.
• Provides identical speeds for both uploading and downloading, making it suitable for
businesses or users who need high-speed uploads (e.g., cloud services, video
conferencing)

Wireless Wi-Fi or Mobile Data (3G/4G/5G) that do not require physical cables and provide flexibility but may
Connections be affected by interference or range limitations.

Wireless connections – Dedicated WiFi(wireless fidelity) technology (e.g. iBurst or Neotel)


➢ You can only access this type of network using a modem supplied by the company.
➢ Coverage is limited to where the company has placed radio towers.

16
© Sirantwi 2020

Wireless connections – The existing cellular technology (3G/4G)


➢ These technologies are implemented by a cellular communications company (for example, Vodacom,
MTN, 8ta and Cell C) using their existing infrastructure.

📊 Comparison: Modem, Router, Switch, NIC, Access Point


Device Description
Modem A data terminating device that connects a computer to the internet via a telephone line. It modulates and
demodulates digital signals into analog for transmission over the phone line and vice versa.
Router A device that connects two networks together, allowing devices on one network (e.g., a local area network)
to communicate with devices on another network (e.g., the internet).
It routes data between the networks.
ADSL Modem A combination of a modem and router in one device.
Router It connects a computer to the internet via a telephone line (ADSL) and also routes data between different
devices on the local network.
Switch A network device that connects multiple devices within a local area network (LAN).
It operates at the data link layer (Layer 2) and directs data packets to the correct device within the network.
NIC (Network A hardware component that allows a device (like a computer) to connect to a network.
Interface Card) It can be wired (Ethernet NIC) or wireless (Wi-Fi NIC), enabling data transmission over the network.
Access Point A device that allows wireless devices (like laptops or smartphones) to connect to a wired network.
It acts as a bridge between the wired network and wireless clients, typically using Wi-Fi.

17
© Sirantwi 2020

Comparison: Wi-Fi vs Internet Access Using Smartphones/Tablets


Topic Description
Wi-Fi A way of connecting wirelessly to an existing internet
connection (e.g., ADSL).
Wifi /Wireless Access Point Multiple devices can connect to a single Wi-Fi access point.
(WAP)
Wifi vs 3G/4G Wi-Fi provides faster data at a lower cost compared to using a
3G connection.
Wi-Fi at Home Mobile devices use cheaper, faster data; devices detect Wi-Fi
automatically.
Public Wi-Fi (Hotspots) • Wifi at public places is called Hotspot
• Restaurants, hotels, airports, and shopping malls offer Wi-
Fi connectivity.
• Public Wi-Fi is often protected by a password and
• It can be either free or charged per hour.
• Efficient if using a laptop and lacking a 3G modem.
Internet Access via • Mobile devices have built-in 3G/4G cellular technology
Smartphones/Tablets and can connect to Wi-Fi networks.
• People prefer data communication that is:
o Always on and everywhere
18
© Sirantwi 2020

o Fast and reliable


o Hassle-free connection
o Notify you of communication through calls, SMS, IM,
e-mail, or VoIP services.
Cellular vs Wi-Fi • Mobile devices connect to the internet via cellular
technology(4G/5G) when no Wi-Fi is available
• switch to Wi-Fi when it is available (for faster and cheaper
data).

1. WIRELESS ACCESS POINT COVERAGE


DEFINITION • A Wireless Access Point (WAP) is a network device that allows
wireless devices (like smartphones, laptops, and tablets) to
connect to a wired network using Wi-Fi or similar wireless
standards.
• Considerations for coverage by access point include

🔑 Key Points:
• Acts as a bridge between a wired network and wireless clients.
• Extends the range of a wired network to support wireless connectivity.
• Commonly used in homes, offices, schools, and public places as part of a
Wi-Fi network.
• Can be built into a router or set up as a standalone device.

19
© Sirantwi 2020

Factors to consider when setting up WAP:


• Speed of the device,
• area covered,
• number of devices connected at any given time.

➢ Wireless access points run a specific 802.11 standard.


➢ Different standards of Wi-Fi (802.11) – the two newest standards are:
802.11n – most devices in use currently in South Africa
o Covers largest area (lower frequency)

802.11ac – newer standard (higher frequency)


o Faster with limited indoor coverage but great outdoor coverage

20
© Sirantwi 2020

What/Factors Distance from the tower


to consider The strength of your wireless signal will vary depending on
during your distance from the tower.
wireless
communication Physical barriers
Signal strength may be affected by objects between your device and the tower/router.
For example:
Trees, hills, valleys, buildings, and walls may cause poor
connection
Coverage indoors will vary from coverage outdoors.
Number of users on the network
Your wireless connection may be slow or poor if there are many people using the network.
For example, the wireless network may be used to size at large events and popular resort
locations.

21
© Sirantwi 2020

Physical damage to the tower


Wireless service may be affected when a tower is damaged.
For example:
A fibre cut may cause a cellular outage because the tower has lost communication
A wind storm may damage equipment on a tower.

Uses of wifi • We use Wi-Fi for communication (E-mail/WhatsApp),entertainment


(streaming/gaming) and social media/news.
• Use smartphone as remote control using an app and Wi-Fi.
• Wireless printing from smartphone to printer.
• Stream to any device in your home from home media device.
• Stream audio to any speakers in the house.
• Wireless transfer of photos from camera to any device.

22
© Sirantwi 2020

23
© Sirantwi 2020

✅ Internet Services:
Service Explanation / Definition Advantages Disadvantages

Cloud Computing Delivery of computing resources (e.g., servers, - Reduces hardware - Requires stable internet
storage, software) over the internet. costs - Security concerns
- Accessible anywhere - Subscription costs
Cloud computing is using storage, software and other
resources from remote servers on a network through the
- Scalable based on - Data ownership issues
internet need
- Supports collaboration

Cloud Storage Remote storage of data via the internet (e.g., Google - Accessible on any - Needs internet to
Drive, Dropbox). device access
- Automatic backups - Limited free space
- Easy file sharing - Vulnerable to hacking
- Saves local storage - Privacy depends on
space provider

Grid Computing A system whereby the resources (hardware) of - Powerful processing - Complex setup and
different computers are shared and used at the same for complex tasks management
time to solve a single problem - Cost-efficient - fast Network
- Handles large-scale dependency
➢ A scientist studying scientific concepts has the
research - Compatibility issues
ability to use an entire network of computers - Shares unused - Not suitable for real-
in order to analyses data. resources time tasks

➢ Like Weather forecasting and Earthquake


simulation

24
© Sirantwi 2020

➢ A businessman has the ability to access an


entire network of computers in order to
forecast the growth of particular stock
Real-Time Instant exchange of messages via apps like WhatsApp - Fast communication - Distractions during
Messaging (IM) or Telegram. - Supports multimedia work/study
- Group chats - Privacy concerns
- Free to use - Needs internet
- Misinformation spreads
easily

VoIP (Voice over Protocol that allows telephone calls to be made over - Cheaper than - Poor call quality on
Internet Protocol) LANs, WANs and the Internet traditional calls slow connections
Voice and video calls over the internet (e.g., Skype, - Supports video & - Needs good hardware
Zoom). group calls - Not reliable for
- Cross-device access emergencies
- Additional features - Security risks
(chat, screen share)

Video Conferencing Real-time communication using video and audio over - Enables remote - Requires stable, high-
the internet (e.g., Zoom, Microsoft Teams, Google meetings speed internet
Meet). - Saves travel time and - Can suffer from lag or
costs dropouts
- Supports screen - Privacy/security
sharing and concerns
collaboration - May reduce face-to-
- Can record sessions face interaction quality
for future reference

25
© Sirantwi 2020

Email Sending messages via the internet with support for - Fast delivery - Spam and phishing
attachments (e.g., Gmail). - Formal & professional - Requires internet
- Permanent record - Not ideal for real-time
- Allows attachments chats
- Inbox clutter

File Sharing(file Sending digital files over the internet through various - Quick file transfer - Risk of viruses/malware
swapping) platforms. - Easy collaboration - Copyright infringement
- Reduces need for (on illegal platforms)
Eg google drive file sharing
physical media - Needs internet
- Can share large files - Security risks

FTP (File Transfer Transfers files between systems over the internet, - Efficient for large files - Requires FTP client
Protocol) commonly used in web development. - Used for managing setup
websites - Less secure unless
A protocol used for the fast and easy transfer of files
- Fast over strong encrypted (use SFTP)
between remote computers that have an Internet connections - Can be blocked by
connection. - Reliable for tech users firewalls
- Tech knowledge
Example : FileZilla -No file size restrictions.
needed

26
© Sirantwi 2020

Good practices when using VoIP software such as Skype

Stage Good Practice


Before the Call Test your equipment
Check your internet connection
Update Skype
Choose a quiet environment
Use appropriate lighting (for video)
Mute microphone when not speaking
Be mindful of privacy
During the Call Use headphones
Speak clearly and listen actively
Use chat for clarity
End the call properly
After the Call Review chat history
Log out of public devices

27
© Sirantwi 2020

✅ Cybersecurity, Social Implications & Technology Impact — With Preventive Measures


Category Concept / Explanation / Definition Preventive Measures
Term
Computer Phishing Tricking users via fake emails into revealing - Don’t click unknown links
Crimes sensitive information like passwords or banking - Use email filters
details. - Enable 2FA
- Educate users
Negative Impact
- Verify email addresses
- Loss of personal data
- Financial loss
- Spreads malware
- Loss of trust in email systems
- Time-consuming to recover identity and data
Spoofing Fake sender addresses or websites pretending to - Check URLs carefully
be legitimate. OR - Use secure connections
➢ It is the forgery of an e-mail header so that the e-mail
(HTTPS)
appears to be from a different origin (or person) - Verify sender details
- Don’t download unknown
attachments
Negative Impact
- Misleads recipients
- Enables fraud
- Can damage business reputations

28
© Sirantwi 2020

Category Concept / Explanation / Definition Preventive Measures


Term
- Difficult to trace
- May lead to malware downloads
Pharming Redirecting users from real websites/ links to fake - Keep DNS servers secure
ones without their knowledge. - Use reputable antivirus
- Avoid suspicious links
- Use VPNs
Negative Impact - Keep software updated
- Steals login credentials
- Difficult to detect
- Can infect many users
- Financial and identity theft
- Damages trust in internet safety
Identity Theft Stealing and misusing someone's personal - Tear up personal
information (e.g., ID numbers, login credentials). documents
- Use strong, unique
passwords
Negative Impact - Monitor credit reports
- Financial fraud - Enable 2FA
- Criminal records created in victim’s name - Be cautious with personal
- Emotional stress info online

29
© Sirantwi 2020

Category Concept / Explanation / Definition Preventive Measures


Term
- Long recovery process
- Can lead to employment and legal issues
Theft of Time Using workplace/school internet or systems for - Monitor internet usage
& Services personal use during work/study hours. - Clear usage policies
- Educate
Negative Impact
employees/students
- Loss of productivity - Limit non-work access
- Wasted resources - Enforce digital policies
- Can slow down network
- Breach of trust
- Could lead to disciplinary action
Bandwidth Unauthorized use of someone’s internet - Secure Wi-Fi with strong
Theft connection. passwords
Hotlinking is a process where a link on a website links to a - Change default router
file that is hosted on another website. This limits settings
downloads on the primary website. - Monitor network activity
- Use MAC filtering
Negative Impact
- Hide SSID
- depleted bandwidth
- cost more

30
© Sirantwi 2020

Category Concept / Explanation / Definition Preventive Measures


Term

Hardware ➢ It means stealing computer equipment. ➢ use motion sensors

Theft: ➢ Mobile devices are at high risk because of their size ➢ Lock computer rooms
and weight that allows them to be packed into ➢ Install CTV cameras
pockets and bags easily. ➢ Use biometric security to
➢ Laptops of executives are at risk because of the access computer rooms
software and confidential information they contain. /server rooms
Impacts of hardware theft

🔒 Personal Impact:
• Loss of personal data (photos, documents,
passwords).
• Identity theft risk from stolen personal information.
• Financial loss from replacing the stolen hardware.
• Emotional distress and reduced sense of security.
• Disruption of daily life if the device was used for
school, work, or communication.
🏢 Company Impact:

31
© Sirantwi 2020

Category Concept / Explanation / Definition Preventive Measures


Term
• Loss of sensitive business data, including client or
financial information.
• Data breaches that can damage reputation and lead
to legal consequences.
• Operational downtime affecting productivity and
deadlines.

Software ➢
➢ Software theft takes 3 forms :
Theft:
1. Someone steals software media:
Software (on CD or flash drive/external HDD) not
stored in secured locations are stolen away.
Hardware containing the software can be stolen.

2. Software Piracy
➢ Pirated software is distributed for money or malicious
reasons .
➢ Software piracy has the following negative effects on the
end-user.
o No access to technical support
o No upgrades
o Incomplete or virus contaminated products

32
© Sirantwi 2020

Category Concept / Explanation / Definition Preventive Measures


Term

3. Intentionally erase programs


Discontented or disgruntled employees may
remove the soft-ware they have written for the
company. They may pose a sabotage threat to the
company data and networks

33
© Sirantwi 2020

Category Concept / Term Explanation / Definition Preventive Negative Impact


Measures

Software Piracy Unauthorized copying, distribution, or use of - Use licensed - Financial loss to
Theft software without permission from the owner software only developers
or licensor. - Install anti-piracy - Legal
software consequences
- Employ digital - Reduced quality of
rights management software products
(DRM) - Damaged
- Educate users on reputation
legal consequences - Hinders innovation
- Regularly audit
software licenses

Cracking The act of bypassing a software’s protection - Implement strong - Loss of revenue for
to use it illegally or distribute unauthorized encryption companies
versions. - Use license - Risk of malware
activation codes being introduced
- Implement anti- - Unstable software
tamper technology performance
- Monitor software - Increased security
usage vulnerabilities
- Regular software - Legal ramifications
updates

Software Distributing counterfeit copies of software to - Purchase software - Financial losses for
Counterfeiting unsuspecting users. from authorized legitimate
dealers companies

34
© Sirantwi 2020

- Educate users on - Risk of malware or


counterfeit risks viruses
- Verify authenticity - Legal liabilities for
via vendor websites users
- Use software - Loss of support and
verification tools updates
- Damaged user trust

End-User License Violating the terms of the software license - Read and - Legal issues for
Agreement (EULA) agreement, such as sharing or distributing understand EULA users and
Violations software beyond the agreed terms. terms organizations
- Use software - Damaged software
within licensed vendor relationships
scope - Loss of
- Enforce functionality
organizational - Increased support
policies on software costs
use - Harm to
- Use license intellectual property
tracking tools rights

Information Data Breaches Unauthorized access or disclosure of sensitive - Encrypt sensitive - Loss of user trust
Theft or confidential information (e.g., personal data - Financial penalties
data, corporate secrets). - Implement access for organizations
control policies - Identity theft
- Regularly update - Reputation damage
security systems - Legal
- Conduct security consequences
audits
- Use multi-factor

35
© Sirantwi 2020

authentication
(MFA)

Hacking Unauthorized access to systems or networks - Secure networks - Data theft or loss
to steal data or cause harm. with firewalls - Financial losses
- Regularly patch - Reputational
and update systems damage
- Educate users on - Legal actions
secure passwords - Service disruption
- Limit access based
on roles
- Use intrusion
detection systems

Insider Threats Employees or authorized users intentionally - Monitor user - Financial damage
or unintentionally causing data theft or harm activities to company
to the organization. - Implement role- - Intellectual
based access property theft
- Conduct - Damage to
background checks employee trust
- Create clear data - Legal and
handling policies regulatory
- Use data loss consequences
prevention (DLP) - Loss of competitive
tools advantage

36
© Sirantwi 2020

Social Engineering Manipulating individuals into revealing - Educate users on - Loss of sensitive
confidential information or bypassing security social engineering data
measures (e.g., impersonation or phishing). tactics - Financial loss
- Verify suspicious - Compromised
Types of social Engineering tricks
calls/emails security
1. Phishing-attackers trick people
through e.g. e-mails, false - Use strong - User trust erosion
websites to provide personal information) verification - Increased
2. Tailgating (also known as processes vulnerability to
'piggybacking', -involves an attacker - Implement secure further attacks
seeking entry to a restricted area communication
which lacks the proper protocols
authentication)
3. Watering hole (injecting malicious
code into public webpages of a site
that the users visit)
4. Baiting (focuses on peoples'
curiosity where they are promised
something in return for providing
personal information)
5. Pretexting (attackers create a fake
identity and use it to manipulate the
receipt of information)
6. Pharming: tricking someone using a
website or a link
7. Click jacking: Tricking someone using
a concealed/hidden link to get
sensitive information
8. Smishing- using an SMS to deceive
someone into getting sensitive
infromation

37
© Sirantwi 2020

Stolen Devices Physical theft of devices (e.g., laptops, - Encrypt data on - Loss of data
phones) that contain sensitive data or access devices - Financial cost of
credentials. - Use remote wipe replacing devices
capabilities - Breach of privacy
- Lock devices with - Access to sensitive
passwords or accounts
biometrics - Potential
- Secure devices regulatory fines for
when not in use data protection
- Install anti-theft breaches
software

38
© Sirantwi 2020

39
© Sirantwi 2020

Cybersecurity Threats: Hoax, Spam, Pop-up, Adware, Malware, Virus, Scam, Spyware, Ransomware,
Keylogger, Worm, Trojan
Concept / Term Explanation / Definition Preventive Measures Negative Impact

Hoax A false or misleading message designed to deceive or - Verify information from - Misleading people
spread misinformation, often via email or social credible sources - Wasting time and
media. - Don’t share unverified resources
information - Spreading panic or fear
- Educate users on hoaxes - Loss of trust in online
- Use fact-checking information sources
websites
- Avoid sensational claims

Spam Unsolicited and often irrelevant or advertising - Use spam filters - Clutters inbox
messages sent in bulk, typically via email or - Don’t open unknown - Wastes time and
messaging platforms. emails or attachments resources
- Block spammers - Can carry malicious
- Report spam messages attachments
- Avoid sharing email - Lowers productivity
publicly - Reduces user trust in
email communication

Pop-up A type of window that appears suddenly on a screen, - Use pop-up blockers - Interrupts browsing
often used for advertising, which can be annoying or - Avoid clicking on pop- experience
malicious. ups - Can lead to unwanted
- Keep software and redirects or malware
browsers updated - Slows down system
- Educate users on performance

40
© Sirantwi 2020

security risks - May collect private


- Use reputable websites information

Adware Software that automatically displays or downloads - Use ad-blockers - Increases unwanted ads
unwanted advertisements, often as a way of - Install trusted antivirus - Slows down system
generating revenue for the developer. programs - Privacy invasion
- Regularly update - May contain malware
software - Annoying for users
- Avoid downloading
untrusted programs
- Be cautious with free
apps

CYBER ❖ A cyberattack is deliberate exploitation of


ATTACKS computer systems and networks.
❖ Cyberattacks use malicious code to alter
computer code, logic or data, resulting in
disruptive consequences that can compromise
data and lead to cybercrimes, such as information
and identity theft.
❖ Cyber-attacks might be broken down into two
broad types:
➢ Attacks where the goal is to disable the
target computer or get it offline
➢ attacks where the goal is to get access to the
target computer's data and perhaps gain
admin privileges on it.

41
© Sirantwi 2020

Malware Malicious software designed to damage, disrupt, or - Install and regularly - Data loss
gain unauthorized access to computer systems. update antivirus software - Security breaches
- Don’t open suspicious - System crashes
emails or attachments - Slows down system
- Use firewalls performance
- Regularly back up data - Risk of identity theft or
- Use secure networks fraud

Virus A type of malware that attaches itself to legitimate - Install antivirus software - Corrupts or deletes files
programs and spreads to other programs or files, - Avoid downloading files - Slows down or crashes
potentially causing harm. from untrusted sources systems
- Keep software updated - Data loss
- Use email filters - Spreads rapidly between
Symptoms of a computer infected with a virus - Scan files before opening devices
➢ Hardware problems - Can steal personal
➢ Computer freezes information
➢ Slow performance
➢ Slow startup
➢ Files go missing or are hidden
➢ Disks are not accessible
➢ Unusual messages

How viruses can be infected


➢ Through infected media like flash drive,
external hard drive etc.
➢ Through infected email attachment.
➢ Through downloaded infected files from
internet
➢ Visiting infected website

42
© Sirantwi 2020

Scam Fraudulent schemes that deceive individuals or - Verify the legitimacy of - Financial loss
organizations into losing money or providing personal offers - Loss of personal data
information. - Never share sensitive - Damaged reputation
information online - Emotional distress
- Avoid clicking on - Legal consequences for
suspicious links victims
- Educate users about
common scams

Spyware Software that secretly monitors and collects user data - Install antivirus software - Invasion of privacy
without consent, often for advertising purposes or to - Regularly update - Loss of sensitive data
steal personal information. software - Reduced system
- Use secure web performance
browsers - Can lead to identity theft
- Be cautious with free - Unauthorized data
apps sharing
- Monitor system activity

Ransomware A type of malware that encrypts a user’s files or locks - Back up data regularly - Loss of important files
them out of their system, demanding a ransom for - Install and update - Financial loss from
(Data
access. antivirus software ransom
kidnapping)
- Avoid clicking on - Disruption of business or
suspicious links personal activities
- Use strong passwords - Can cause permanent
- Disable macros data loss

Keylogger A type of spyware that records keystrokes to capture - Use virtual keyboards for - Compromised passwords
sensitive information such as passwords or credit card entering sensitive data - Identity theft
numbers. - Install antivirus software - Financial theft
- Avoid untrusted - Unauthorized access to

43
© Sirantwi 2020

Advantages websites personal accounts


- Enable two-factor - Loss of privacy
➢ Parental control: parents can track what their
authentication (2FA)
children do on the internet, and can opt to be
notified if there are any attempts to access
websites containing harmful or otherwise
inappropriate content.
➢ Company security: tracking the use of
computers for non-work related purposes, or
the use of workstations after hours
➢ Company security: can also be used to track
the input of keywords and phrases associated
with commercial information which could
damage the company if disclosed.
➢ Other security: using key logger's records to
analyse and track incidents linked to the use
of personal computers.

How one can get prey to Keylogger


➢ ATM keypads
➢ Capture any passwords entered by users on
the device.
➢ Automatically send the reports containing
stored logs and emails it to a remote location.
➢ Capture copies of sent e-mails
➢ Capture logs of all instant messaging (IM)
sessions.
➢ Record a list of the applications run by users
on the device.

44
© Sirantwi 2020

➢ Record the URLs that were visited via web


browsers.
➢ Take screenshots of the device at periodic
intervals.

Worm A type of malware that replicates itself and spreads - Install firewalls and - Network congestion
across networks or devices, often causing network antivirus software - Overloaded systems
congestion and system crashes. - Regularly update - Slows down or crashes
software systems
Symptoms of a computer infected with worm
- Avoid clicking on - Risk of data loss
➢ Slow computer performance
suspicious links - Can spread rapidly and
➢ Freezing
- Isolate infected systems infect multiple systems
➢ Programs opening and running automatically
immediately
➢ Irregular web browser performance
➢ Unusual computer behaviour (messages,
images, sounds, etc.)
➢ Firewall warnings
➢ Missing/modified files
➢ Operating system errors and system error
messages
➢ E-mails sent to contacts without the user's
knowledge

Trojan Malicious software disguised as legitimate software - Download software only - Data theft
or files, which, once installed, can damage or steal from trusted sources - Loss of privacy
data from the infected system. - Use antivirus software - System damage
- Regularly update - Potential to install other

45
© Sirantwi 2020

Examples of Trojans software malware


Backdoor - Be cautious with email - Disruption of services
A backdoor Trojan gives malicious users remote attachments and activities
control over the infected computer. Backdoor
Trojans are often used to form a botnet that can be
used for criminal purposes.

Exploit
Exploits are programs that contain data or code that
takes advantage of a vulnerability within application
software that's running on your computer.
Rootkit
Rootkits' main purpose is to prevent malicious
programs being detected.
Trojan-DDoS
These programs conduct DoS (Denial of Service)
attacks against a targeted web address. By sending
multiple requests from your computer and several
other infected computers the attack can overwhelm
the target address leading to a denial of service.
Trojan-Ransom
This type of Trojan can modify data on your
computer so that you can no longer use specific data.
The criminal will only restore your computer's
performance or unblock your data, after you have
paid them the ransom money that they demand.

Cybersecurity Threats: Bot, Botnet, Zombie, DDoS/DOS


Concept / Term Explanation / Definition Preventive Measures Negative Impact

46
© Sirantwi 2020

Bot A bot is an automated program that performs - Use anti-malware - Can be used to
repetitive tasks on the internet. tools launch attacks
- Regularly update - Can steal sensitive
Some bots are used for malicious purposes.
software data
- Use firewalls - Overloads servers
- Educate users on - Reduces system
suspicious behaviors performance
- Avoid downloading - Facilitates illegal
untrusted programs activities like spam

Botnet A network of infected computers (bots) that are - Install antivirus and - Can be used for
controlled remotely to carry out tasks, often anti-malware DDoS attacks
malicious, like launching attacks. programs - Facilitates large-scale
- Keep software up to spam
date - Can steal data
- Use strong passwords - Overloads websites
- Monitor unusual or services
network activity - Can result in financial
- Disconnect infected loss or service
devices disruptions

Zombie A computer that has been compromised and is - Install and update - Can be used in
under the control of a remote attacker. antivirus software botnets
- Disconnect from the - Can launch DDoS
Zombies are often part of a botnet.
network if infected attacks
- Perform regular - Steals sensitive
security scans information
How to know if a computer has been infected by
- Educate users on - Damages system or
bots/botnet/zombie
data integrity

47
© Sirantwi 2020

➢ Internet access is slow. phishing and malware - Reduces system


➢ Settings have changed, and cannot be risks performance
reversed.
➢ Pop-up windows and advertisements
appear even when you aren't using a web
browser.
➢ Computer programs are running slowly.
➢ Friends and family receive e-mail messages
you did not send.
➢ The computer takes a long time to shut
down, or does not shut down correctly.
➢ The fan works without stopping even when
the computer is not working.
➢ The computer crashes for no apparent
reason.

DDoS (Distributed Denial A DDoS attack overwhelms a target system with a - Use DDoS mitigation - Service downtime
of Service) / DOS (Denial flood of traffic, rendering it unavailable to users. services - Financial loss from
of Service) - Set up firewalls and disrupted operations
DOS is a similar attack but from a single source.
intrusion prevention - Damaged reputation
systems - Loss of customer
- Implement rate- trust
Symptoms of a DDoS
limiting on servers - Increased costs to
➢ Usually slow network performance
- Monitor network mitigate attacks
➢ Unavailability of certain websites
traffic

48
© Sirantwi 2020

➢ Inability to access any website - Use content delivery


➢ Increase in the number of spam e-mails networks (CDNs)
received
➢ Possible disconnection of internet
connection
➢ Long-term denial of access to the internet

49
© Sirantwi 2020

Firewall:
➢ This is a specialized soft-ware/hardware that prevents unauthorized access to an
internal computer network.
➢ A firewall is a security measure that protects or guards against unauthorized incoming
or outgoing access to a computer or a computer network from unauthorised access.
➢ A firewall can be software, hardware, or a combination of both configured to manage
and regulate data flow between networks of different trust levels by permitting or
denying data.
➢ A firewall is a program or hardware device that filters the information coming through
the internet connection into your network or computer
➢ A firewall allows or prevents traffic based on certain rules
➢ A firewall constantly monitors all incoming and outgoing traffic. If an incoming packet
of information is marked by the filters, it is not allowed through
➢ Without a firewall, the connection to the internet is open and a hacker would be able to
make a connection to a computer in a network (Wi-Fi or cabled)
➢ Hardware firewall:
• The Router acts as a hardware firewall (alone standing devices)
• The Proxy acts as a hardware firewall (networked devices)
❖ Software firewall
➢ o Specific software designed to filter traffic on a network
➢ examples of firewalls are email firewall and network firewall

Advantages of firewall

➢ A firewall blocks harmful packets of data and does not allow it to reach the location
where it can do harm
➢ You can set up the level of internet security using the built-in features of the router
➢ Provide functions that make it possible to scan incoming emails
➢ Monitors traffic
➢ Stops hackers
➢ Stops Keyloggers
➢ Blocks trojans
Disadvantages of firewall

➢ A firewall might disable particular applications from accessing the network and block
or allow URL's from loading
➢ A firewall may be difficult to maintain
➢ A software firewall may decrease speed because it will evaluate every packet of
information

50
© Sirantwi 2020

Right to access versus right to privacy

1. Right to access of information


▪ The right to access can include more than just the right to use a computer or the
internet. It involves the right to information, music, social media sites and websites.
▪ Companies will direct you to a 'sign in' or 'register' page where you have to either
create an account or sign into your account in order to access the website.
❖ Examples include:
o Many people have Facebook accounts where they have to sign in before they
get to their profile and newsfeeds.
o Some schools have a domain where only the learners of that school can sign in
and acquire information regarding the school, their subjects and resources.
▪ People of certain professions can register with websites that will provide them with
tools and resources to use in their profession.
▪ government website that contains 'secret' information will only be accessible to the
employees.
▪ Only registered students have access to use the domain, created by the university,
for the use of their library resources and published articles.
▪ If you registered on a certain website, only you have access to all the services and/or
products on that particular website.

Advantages and Disadvantages of Right to access of information

Advantages Disadvantages
Companies can keep track of who is on Anyone can create a profile without it
their website. needing to get verified.
The information on the website can be People can create more than one account
set up according to the individual's and act as different people
preferences and what they want to see.
You can use a nickname/username to Websites like torrents make it easy for
identify yourself and anyone to get ('seed')

2. Right to information privacy


▪ The right to digital privacy declares that no one will be exposed to any form of
interference with his/her family, home or any form of communication.
▪ Attacks on his/her reputation is also against the law, because everyone has the right
to be protected by the law against any cyberattacks.
❖ When you sign up for competitions or sign in on a website, you can withhold certain
information about yourself.
❖ If you do not trust the source or the site, do not give them your information.

51
© Sirantwi 2020

❖ You can create an e-mail address that you do not use for your banking and other personal
things and give that up as the address where they can contact you.
❖ You have the right to:
Keep any information about yourself and your family private.
Apply settings on applications and social media sites that protects your information.
Withhold any information from someone who you feel/think might want to use it for a
malicious act.
Upload any form of documents that you created or pictures of yourself/family and choose
who can have access to view or read it.:

Advantages and Disadvantages of Right to information privacy

Advantages Disadvantages
People are encouraged to speak their Information taken from the internet must
mind on forums, groups and sites where be cross-referenced and verified,
any topic can be discussed. especially if that information is being
used in an article/research assignment.
Not everything on the internet is
It becomes easier to ignore/'unfollow' People assume the identity of other
people who are negative. people. Anyone can take your
unprotected personal information or
information and steal your identity to
commit a crime.
It encourages innovation and new
ideas can be created from

Misuse of personal information


❖ Personal information can be used for identity theft, fraud, stalking, abusive etc
❖ A company may leak personal information enabling it to be accessed improperly.
❖ Personal information is inadequately protected against contamination with false data.
❖ Most misuse of information result in financial loss, emotional stress or even physical
violence.

52
© Sirantwi 2020

Avoiding security threats


❖ There are intentional and unintentional threats.
❖ Unintentional threats are considered to be human error, environmental hazards, and
computer failures. Most people don't purposely cause harm.
❖ Intentional threats refer to purposeful actions resulting in the theft or damage of
computer resources, equipment, and data.
▪ Most intentional threats are viewed as computer crimes
❖ Intentional threats include viruses, phishing, hacking, denial of service attacks, theft
of data and identity and destruction ofcomputer resources.
❖ A cracker is a term used to describe someone who intentionally breaches security to break
into someone else's computer or network for a malicious purpose.
❖ A hacker is actually a term used to describe a computer programmer with advanced
knowledge of computers and computer networks.
❖ A hacker finds weaknesses in a computer or a network so that they can be corrected.
Protection against security threats

➢ Restrict access by using username and pass-words to log on to a computer or network

➢ Have a written policy (AUP) that outlines the activities for which the computer and
network may and may not be used
➢ Use firewalls – blacklists for IP addresses and URLs
➢ Never open an e-mail attachment immediately if the antivirus software flags it as
infected.
➢ Do not respond to unsolicited e-mail message.
➢ Ensure that data is encrypted during data transmission over net-works.
Protection against computer crime

Use ABC
➢ Assume nothing: don’t assume you are safe and protected.
➢ Believe no one: check up on people you are interacting with
➢ Check everything: bad spelling and grammar. Check incorrect website URLs.
These things can help you decide if an e-mail or website is legitimate or not.

Safeguards against criminals, viruses and threats


• Do not give out personal information to anyone they have never heard of before, e.g.
the full name, address, phone number, banking details, identity number.
• Individuals should not pay attention to get rich quick schemes.
• E-mail users should not open messages from strangers.
• Have antivirus software and spam blocking software installed.

53
© Sirantwi 2020

• People should never download attachments from people they don't know.
• Children should be taught about safe communication on the internet to protect them
from predators.
• Individuals should not keep passwords on their computers.
• Do not use common passwords like the names of kids, birthdays, or other guessable
words.
• Never give a password to someone else.
• Never start a computer with removable media inserted in the rives in the ports unless
the media are uninfected .
• Delete chain letters and spam
• Install antivirus and antispyware on your computer. update the antivirus regularly.
• Do not clicks on pop up messages and adverts.
• Back up your data.
• Check the reputation of online shops before making any purchases
• Manage social media settings (privacy settings)
Make sure your social networking profiles (e.g. Facebook, Twitter, YouTube, MSN, etc.)
are set to private.
Check yoursecurity settings.
Be careful what information you post online.
Once it is on the internet, it is extremely difficult to remove.
Ensure you use strong passwords and good password policies
By changing your login details, at least once or twice a month, you can cut down your
chances of being a target of cybercrime.
Secure home networks (Wi-Fi)
Be aware of what you do while using public Wi-Fi Hotspots, while these access points are
convenient, they are far from secure.
Avoid conducting financial or corporate transactions on these networks.

54
© Sirantwi 2020

The impact of technology on the global community.


1. DISTRIBUTED COMPUTING POWER
❖ This is the use of the resources of many computers in a network to solve a single problem at
the same time
❖ Distributed computing power uses a network of many computers, each accomplishing a
portion of an overall task, to achieve a result much quicker than with a single computer.
❖ Distributed computing is any computing that involves multiple computers remote from
each other that each have a role in a solving a problem or information processing.
❖ Distributed computing can be found anywhere: Intranet, internet or mobile computing
(laptop, smartphones, smart watches).
❖ It includes hardware and software systems, that contain more than one processing/storage
and run concurrently.
❖ If a computer is not powerful enough to process a big task, the processing of the task is
divided between many computers, for example thousands of computers connected to the
internet.
❖ Each computer does a section of the processing. The combined processing power allows
the processing of the task without buying expensive equipment.
❖ In distributed computing the computers are connected to a network and resources are
managed by the single computer. Unlike grid computing, where the computer's resources
are controlled by a powerful server.
❖ Grid computing and cloud computing are forms of distributed computing
Advantages of Distributed computing Disadvantage of distributed computing
Sharing of resources (saves time and energy). Requires faster connections and connectivity
errors may occur.
Combination of cheap processors are often Security issues are a challenge.
more cost-effective
If one computer is not available, another one Requires skilled technicians and
can be used. programmers.

Multiple points of failures: the failure of one


or more
participating computers can result in
disaster.

55

You might also like