Learning Guide Unit 6 - Home
Learning Guide Unit 6 - Home
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 1/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
Description
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 2/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
Table of contents
Overview
Introduction
Reading Assignment
Discussion Forum
Assignment Activity
Self-Quiz
Graded Quiz
Checklist
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 3/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
Overview
Topics
Network: Types, Topologies, Transmission modes and Connecting Devices
Internet: Internet Service Providers, World Wide Web, Domain Name System, IP Address, Web browsers, Search engines
Computer Security: Confidentiality, Integrity, Availability, Authenticity, and Non-Repudiation
Threats, Attacks, Viruses, Trojan, and Firewall
Learning Objectives
By the end of this Unit, you will be able to:
Tasks
Read through the Learning Guide and the Reading Assignment.
Complete the Discussion Assignment by posting in the Discussion Forum.
Respond to two of your fellow classmates’ posts in the Discussion Forum.
Complete and submit the Assignment Activity.
Take and submit the Self-Quiz.
Take and submit the Graded Quiz.
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 4/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
Introduction
Welcome to unit 6!
In this unit, you will delve into the essential aspects of computer networks and explore key concepts related to internet functionality and
security. The unit is designed to provide you with a comprehensive understanding of network fundamentals, internet components,
and security principles.
Computer Networks and Security offers a comprehensive exploration of the critical interplay between digital connectivity and
information protection. Fundamental to this journey is the in-depth examination of computer networks, covering types, topologies, and
connecting devices. You will traverse the landscape of Local Area Networks (LANs) and Wide Area Networks (WANs), gaining insights
into transmission modes and the role of various devices in facilitating seamless communication.
The unit then navigates the intricate web of the internet, dissecting components such as Internet Service Providers (ISPs), the World
Wide Web (WWW), Domain Name System (DNS), IP addresses, web browsers, and search engines. Understanding these elements
provides a holistic view of how users interact with and access information in the digital realm.
Crucially, the unit delves into the principles of computer security, emphasizing the CIA Triad – Confidentiality, Integrity, and
Availability. In the context of cybersecurity, the unit elucidates the landscape of threats, attacks, and defense mechanisms.
In essence, this unit equips you with a robust foundation in computer networks and security, enabling you to navigate the intricacies of
the digital age with a keen understanding of network dynamics, internet functionality, and cybersecurity principles.
1. What are the different types of computer networks, and how do they differ in terms of size and scope?
2. What does the CIA Triad (Confidentiality, Integrity, Availability) mean in the context of computer security, and why are these
principles crucial?
3. What are the common threats to computer systems, and how do they manifest in the form of attacks such as malware, phishing,
and social engineering?
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 5/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
Reading Assignment
How do various network topologies, such as star and mesh, impact the efficiency and reliability of data transmission?
What are the key characteristics of transmission modes like simplex, half-duplex, and full-duplex communication?
How do Internet Service Providers (ISPs) contribute to the connectivity of users to the internet, and what are the different types of
internet connections they offer?
Explain the differences between viruses and Trojans, and how do firewalls contribute to protecting against unauthorized access?
Read
1. Introduction
2. Features
3. Architecture
4. Components
5. Topology
7. Transmission Modes
The readings will provide you with a thorough comprehension of computer networks, encompassing types, topologies, and connecting
devices. This foundational knowledge will equip you with skills for designing and recommending network infrastructure tailored to
specific business needs.
For Internet: Internet Service Providers, World Wide Web, Domain Name System, IP Address, Web browsers, Search engines:
2. ISP
4. DNS
5. IP address
6. Web browser
7. Search engine
By reading about Internet-related topics such as Internet Service Providers (ISPs), the World Wide Web (www), Domain Name System
(DNS), IP addresses, web browsers, and search engines, you will gain a comprehensive understanding of the key components that make
up the online landscape. This knowledge will empower you to navigate the intricacies of the Internet, comprehend the role of ISPs,
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 6/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
explore the structure of the World Wide Web, understand how domain names are translated into IP addresses via the DNS, and
appreciate the functions of web browsers and search engines in facilitating online exploration and information retrieval.
Chauhan, S. R., & Jangra, S. (2020). Computer security and encryption: An introduction. Mercury Learning & Information.
Log into the UoPeople library and go to LIRN. Click on Access to Library and Information Resource Network, go to Computer
Science and click on EBook Central. Search for the entire name of the ebook. Use the Learning Resource Center to read on how to
use the online library.
View the online book.
Read Chapter 1: Security concepts (p.1 to pp.14 and pp.22 to pp.23)
Section 1.1 - Security Introduction
Section 1.2 - The need for Security
Section 1.4 - Principles of Security
Section 1.5 - Types of Attacks
Read 1.5.1 Theoretical concepts
Read 1.5.2 The Practical Side of attacks
1.5.2.1 Virus
1.5.2.2 Worms
1.5.2.3 Trojan Horse
1.5.4 Specific Attacks
Read chapter 4: IP Security and Firewalls (Read pp. 107 to pp. 117)
Read 4.1 Internet Firewalls
Read 4.2 Protective Devices
Read 4.3 Types of Attacks
In the specified readings, you will explore fundamental security concepts. This encompasses an introduction to security, the necessity
for security, security principles, and an examination of various types of attacks, both theoretically and practically. The practical side of
attacks, including viruses, worms, Trojan Horses, and specific attacks, will be covered in detail. Additionally, the readings delve into IP
security and firewalls. This foundational knowledge will help you to analyze, evaluate, and implement security measures in diverse
computing environments, enhancing your ability to address and mitigate potential threats effectively.
Video
For Network: Types, Topologies, Transmission modes and Connecting Devices, watch:
1. Neso Academy. (2019, November 8). Classification of computer networks [Video]. YouTube.
In this video, you will learn how computer networks are classified based on size, coverage area, and purpose, including PAN, LAN,
MAN, and WAN, helping you understand the structure and scope of different networking systems.
2. Simplilearn. (2022, February 4). What is network topology? | Types of network topology | BUS, RING, STAR, TREE, MESH | Simplilearn
[Video]. YouTube.
In this video, you will learn about different types of network topologies such as Bus, Ring, Star, Tree, and Mesh, and understand
how the physical and logical arrangement of devices impacts network performance, scalability, and fault tolerance.
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 7/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
3. ALL ABOUT ELECTRONICS. (2024, April 8). Simplex, Half-Duplex and Full-Duplex Communication | Transmission modes in
communication system [Video]. YouTube.
In this video, you will learn how data transmission occurs in communication systems through three modes—Simplex, Half-Duplex,
and Full-Duplex. You will understand the direction of data flow, key examples, and their applications in real-world systems.
4. WhiteboardDoodles. (2024, October 27). Network devices explained: Routers, switches, hubs & more | Networking Basics [Video].
YouTube.
In this video, you will learn about essential networking devices such as routers, switches, hubs, bridges, and access points, along
with their roles in data transmission and how they help in building efficient and secure networks.
Optional:
5. Network Direction. (2024, November 15). ALL network topologies explained in 5 mins! [Video]. YouTube.
In this video, you will quickly learn the fundamental types of network topologies—bus, star, ring, mesh, tree, and hybrid—along with
their advantages, disadvantages, and ideal use cases.
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 8/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
This video will help you understand how network topology shapes data flow and communication. You will explore various physical
and logical layouts of networks and how these impact efficiency, scalability, and fault tolerance.
For Internet: Internet Service Providers, World Wide Web, Domain Name System, IP Address, Web browsers, Search engines,
watch:
1. Davis, A. (2021, March 10). How the Internet works in 5 minutes [Video]. YouTube.
In this short yet insightful video, you will gain a concise overview of how the internet functions—including how data travels across
networks, the role of servers, routers, and IP addresses, and how devices connect globally.
2. Intellipaat. (2022, April 14). What is Internet Service Provider | How Internet Service Provider Works | Intellipaat [Video]. YouTube.
This video explains what an Internet Service Provider (ISP) is and how it enables users to connect to the internet. You'll learn about
types of ISPs, the technologies they use, and their importance in routing and managing internet traffic.
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 9/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
3. Network Direction. (2020, September 14). Introduction to IP addressing | Networking basics | Network fundamentals | Cisco CCNA
[Video]. YouTube.
In this foundational video, you’ll explore what IP addresses are, how they're structured (IPv4 vs IPv6), and how they help in
identifying and locating devices on a network. Ideal for building your understanding of network communication.
4. Khan Academy. (2019, April 23). IP addresses and DNS | Internet 101 | Computer Science | Khan Academy [Video]. YouTube.
This video clearly explains the role of IP addresses and the Domain Name System (DNS) in the functioning of the internet. You'll
learn how IP addresses uniquely identify devices, and how DNS acts like a phonebook to translate human-friendly domain names
(like www.google.com) into IP addresses.
For Computer Security: Confidentiality, Integrity, Availability, Authenticity, and Non-Repudiation, watch:
1. Simplilearn. (2023, March 5). What are the CIA triad, AAA, and non-repudiation in cybersecurity [Video]. YouTube.
From this video, you will learn the core concepts of cybersecurity, including the CIA Triad (Confidentiality, Integrity, Availability), the
AAA framework (Authentication, Authorization, Accounting), and the meaning of Non-repudiation. These concepts are essential for
understanding how data is protected and secured in computer systems.
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 10/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
1. Simplilearn. (2025, May 16). Understanding viruses, trojans, worms & malware for beginners [Video]. YouTube.
From this video, you will learn about different types of malicious software including viruses, trojans, worms, and other malware.
You will understand how these threats operate, how they infect computer systems, and the risks they pose to cybersecurity.
2. Cybersecurity Explained. (2025, May 18). How Hackers Attack (Ransomware, Spyware & More!) [Video]. YouTube.
From this video, you will learn about various hacking methods used by cybercriminals, including ransomware, spyware, and other
attack techniques. You will gain insight into how these attacks happen and the potential damage they can cause to individuals and
organizations.
3. Simplilearn. (2021, August 3). What is firewall ? | Firewall explained | Firewalls and network security | Simplilearn [Video]. YouTube.
From this video, you will learn what a firewall is and how it functions to protect computer networks. You will understand the
different types of firewalls and their role in network security to prevent unauthorized access and cyber threats.
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 11/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 12/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
Discussion Forum
The discussion question aims to cultivate a holistic understanding of network fundamentals. You will learn to distinguish between
various types of networks (e.g., LANs, WANs) and comprehend the advantages and limitations of each. You will be able to discuss
common network topologies (e.g., star, mesh) and evaluate their applicability to different business scenarios. You will grasp the
functions of essential connecting devices like routers, switches, and hubs within a network.
Imagine you have been hired as a consultant by a small business that is planning to set up its first computer network. The
business owner is not familiar with networking concepts and has asked you to provide a comprehensive overview of network
fundamentals and Internet basics. Your task is to engage in a discussion with the owner, addressing their questions and
concerns.
1. Explain the different types of networks and common network topologies. Discuss which type might be most suitable for a small
business and why?
2. What is the role of connecting devices in a network, including routers, switches, and hubs. Elaborate how these devices facilitate
communication within a network.
3. Explore the transmission modes and discuss scenarios where each transmission mode is most appropriate.
Your Discussion should be a minimum of 500 words in length and not more than 750 words. Please include a word count. Following the
APA standard, use references and in-text citations for the textbook and any other sources.
End your discussion post with one question related to the concepts learned in this unit, from which your colleagues can
formulate a response or generate further discussion.
Your instructor will grade you based on the Discussion Forum Unit 6 Rubric.
NOTE: Remember to post as early as possible. The first posting is due by Sunday and the reply is due by Wednesday.
Discussion Responses
Please post your initial response by Sunday and respond to at least two peers by providing comments or questions about their main
post by Wednesday. Peer replies should be appropriate, meaningful, and helpful. Overall, your comments should contribute positively
to the conversation by broadening or clarifying it. Peer replies should be substantive and in three to four complete sentences (minimum
75 words). Read Peer replies for students to know more about how to give replies.
Academic Integrity
If at any time you suspect that a post in this assignment violates UoPeople's rules regarding plagiarism and/or any aspect of UoPeople’s
Academic Code of Conduct, please notify your instructor immediately.
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 13/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
Assignment Activity
Assignment Instructions
In this assignment you will be able to demonstrate an understanding of internet components, security principles, and the ability to apply
this knowledge to address cybersecurity challenges. By engaging with this scenario-based assignment, you will gain practical insights
into securing an organization's digital assets against various cyber threats.
You are a cybersecurity analyst working for a leading e-commerce platform, ShopGuard. Your task is to create a comprehensive
cybersecurity plan to ensure the secure handling of online transactions and protect sensitive customer information.
1. Identify and examine three potential security risks associated with the use of various Internet Service Providers for an e-
commerce platform like ShopGuard.
2. Explain how the principles of confidentiality, integrity, and availability (CIA) apply to customer data and transactions on the
ShopGuard e-commerce platform.
3. Identify and elaborate three common cybersecurity threats that e-commerce platforms face.
4. Develop a multi-layered defense strategy, including both technical and procedural measures, to protect ShopGuard against these
threats.
Submission Instructions
Read the rubric on how you are going to be graded before you start to work on this assignment.
Your assignment should be a minimum of 500 words and not more than 750 words (not including the reference list or the title);
double-spaced in Times New Roman font, which is no greater than 12 points in size.
You can submit your assignment in a Word document format.
Use in-text citations to properly attribute information, ideas, or quotes that are not your own. Format your references according
to APA guidelines. For assistance with APA formatting, view the Learning Resource Center: Academic Writing.
You can read more information about how to evaluate Information and its sources critically in the C.R.A.A.P (Currency,
Relevance, Authority, Accuracy, and Purpose) handout or the C.R.A.A.P PDF brochure.
This assignment will be assessed by your instructor using the rubric available on the assignment page in course homepage.
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 14/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
Self-Quiz
The Self-Quiz gives you an opportunity to self-assess your knowledge of what you have learned so far.
The results of the Self-Quiz do not count towards your final grade. However, the quiz is an important part of the University’s learning
process, and it is expected that you will take it to ensure understanding of the materials presented. Reviewing and analyzing your
results will help you perform better on future Graded Quizzes and the Final Exam.
Please access the Self-Quiz on the main course homepage; it is listed inside the Unit.
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 15/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
Graded Quiz
The Graded Quiz will test your knowledge of all the materials learned thus far. The results of the quiz will count towards your final
grade.
Please access the Graded Quiz on the main course homepage; it will be listed inside the Unit. After you click on it, the quiz’s introduction
will inform you of any time or attempt limits in place.
Good luck!
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 16/17
7/9/25, 10:18 AM Learning Guide Unit 6 | Home
Checklist
https://my.uopeople.edu/mod/book/tool/print/index.php?id=472748 17/17