0% found this document useful (0 votes)
29 views16 pages

Networking 6

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views16 pages

Networking 6

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Class XII

Subject: Computer Science with Python(083)


UNIT II Computer Networks (10 Marks)
Computer Network and Network types

By Amit Dutta
DAV Public School , Gandhi Nagar, Ranchi
Session 2020-21
Syllabus of UNIT II
Computer Network
• Unit II: Computer Networks
• ● Evolution of Networking: ARPANET, Internet, Interspace Different ways of sending data across the network
with reference to switching techniques (Circuit and Packet switching).
• ● Data Communication terminologies: Concept of Channel, Bandwidth (Hz, KHz, MHz) and Data transfer rate
(bps, Kbps, Mbps, Gbps, Tbps).
• ● Transmission media: Twisted pair cable, coaxial cable, optical fiber, infrared, radio link, microwave link and
satellite link.
• ● Network devices: Modem, RJ45 connector, Ethernet Card, Router, Switch, Gateway, WiFi card.
• ● Network Topologies and types: Bus, Star, Tree, PAN, LAN, WAN, MAN.
• ● Network Protocol: TCP/IP, File Transfer Protocol (FTP), PPP, HTTP, SMTP, POP3, Remote Login (Telnet)
and Internet, Wireless / Mobile Communication protocol such as GSM, GPRS and WLL.
• ● Mobile Telecommunication Technologies: 1G, 2G, 3G, 4G and 5G; Mobile processors; Electronic mail
protocols such as SMTP, POP3, Protocols for Chat and Video Conferencing: VoIP, Wireless technologies such
as Wi-Fi and WiMax 7
• ● Network Security Concepts: Threats and prevention from Viruses, Worms, Trojan horse, Spams Use of
Cookies, Protection using Firewall, https; India IT Act, Cyber Law, Cyber Crimes, IPR issues, hacking.
• ● Introduction To Web services: WWW, Hyper Text Markup Language (HTML), Extensible Markup Language
(XML); Hyper Text Transfer Protocol (HTTP); Domain Names; URL; Website, Web browser, Web Servers;
Web Hosting, Web Scripting – Client side (VB Script, Java Script, PHP) and Server side (ASP, JSP, PHP), Web
2.0 (for social networking)
• ● E-commerce payment transactions using online banking, mobile banking, payment apps and services.
Network Security Concepts
Network security is the process of physical
and software preventative measures to
protect the networking infrastructure
from unauthorized
access ,malfunction ,destruction ,misuse
,modification ,or improper
disclosure ,there by creating a secure
platform for computers ,users ,and
programs to perform their permitted
critical functions with in a secure
Network security threats types:

•Passive Network Threats : Passive cyber attacks


employ non-disruptive methods so that the
hacker does not draw attention to the
attack .Passive attacks are usually data
gathering operations ,which means they
usually employ some sort of malware or hack
that eavesdrops on system communications
Activities such as wire tapping and idle scans
that are designed to intercept traffic traveling
through the network.
Network security threats types:

•Active Network Threats : Active cyber attacks


are often aggressive ,blatant attacks that
victims immediately become aware of when
they occur . Activities such as Denial of
Service (DoS) attacks and SQLinjection
attacks where the attacker is attempting to
execute commands to disrupt the network’s
normal operation. Viruses ,worms ,Trojan
horse ,spam ,malware ,Denial of Service
attacks ,and password crackers are all
examples of active cyber attacks
VIRUS
• Computer virus-is a malicious software program loaded onto a
user's computer without the user's knowledge and performs
malicious actions.
• COMMON TYPES OF COMPUTER VIRUSES
• 1.RESIDENTVIRUS-Resident viruses setup in RAM and
meddle with system operations. They are so sneaky that they
can even attach themselves to anti-virus software files.
• 2.MULTIPARTITE VIRUS-This virus infects the entire
system.Multipartite viruses spread by performing
unauthorized actions on operating system, folders,and
programs.
• 3.DIRECTACTION-This virus targets a specific file type,
most commonly executable files (.exe), by replicating and
infecting files . Due to its targeted nature ,this virus type is one
of the easier ones to detect and remove.
• 4.BROWSER HIJACKER-Easily detected, this virus type
VIRUS
• 5.OVERWRITE VIRUS-Like the name implies ,overwrite
viruses overwrite file content to infect entire folders ,files ,and
programs.
• 6.WEB SCRIPTING VIRUS-This sneaky virus disguises itself in
the coding of links ,ads ,images ,videos ,and site code.It can
infect systems when users download malicious files or visit
malicious websites.
• 7.FILE INFECTOR-By targeting executable files (.exe), file
infector viruses slow down programs and damage system files
when a user runs them.
• 8.NETWORKVIRUS-Network viruses travel through network
connections and replicate themselves through shared resources.
• 9.BOOT SECTOR VIRUS-One of the easier viruses to
avoid ,this virus hides out in a file on a USB drive or email
attachment. When activated ,it can infect the system’s master
boot record to damage the system.
Prevention From Virus
• Ways to prevent from computer virus–
• Open Emails ,Even Coming From Friends ,
Carefully
• •Install Anti-virus Software and Keep it upto
Date
• •Scan System Regularly
• •Browse Safely
• •Download Files Carefully
Worm
• A computer worm-is a malicious, self-replicating software
program (popularly termed as 'malware‘ ) which affects the
functions of software and hardware programs.
• Different types of Computer Worms are:
• •Email Worms : Email Worms spread through infected email
messages as an attachment or a link of an infected website.
• •Instant Messaging Worms : Instant Messaging Worms spread by
sending links to the contact list of instant messaging applications.
• •Internet Worms : Internet worm will scan all available network
resources using local operating system services and / or scan the
Internet for vulnerable machines . If a computer is found
vulnerable it will attempt to connect and gain access to them.
• •IRC Worms : IRC Worms spread through IRC chat
channels ,sending infected files or links to infected websites.
• •File-sharing Networks Worms: File-sharing Networks Worms place
a copy of them in a shared folder and spread via P2P network.
Prevention
• Ways to prevent from computer worms
• •Since software vulnerabilities are major infection vectors
for computer worms , be sure that computer’s operating
system and applications are up to date with the latest
versions. Install these updates as soon as they are available
because updates often include patches for security flaws.
• •Phishing is another popular way for hackers to spread
worms Always be extra cautious when opening unsolicited
emails ,especially those from unknown senders that
contain attachments or dubious links.
• •Be sure to invest in a strong internet security software
solution that can help block computer worms.
Trojan Horse
• A Trojan horse-or Trojan ,is a type of malicious code or
software that looks legitimate but can take control of
computer . A Trojan is designed to
damage ,disrupt ,steal ,or in general inflict some other
harmful action on data or network.
• Types of Trojan viruses
• •Back door Trojans-This type of Trojan allows hackers to
remotely access and control a computer ,often for the
purpose of uploading ,downloading ,or executing files at
will.
• •Exploit Trojans-These Trojans inject a machine with code
deliberately designed to take advantage of a weakness
inherent to a specific piece of software.
Trojan Horse
• Rootkit Trojans-These Trojans are intended to prevent
the discovery of malware already infecting a system so
that it can affect maximum damage.
• •Banker Trojans-This type of Trojan specifically targets
personal information used for banking and other
online transactions.
• •Distributed Denial of Service(DDoS)Trojans-These are
programmed to execute DDoS attacks ,where a
network or machine is disabled by a flood of requests
originating from many different sources.
• •Downloader Trojans-These are files written to
download additional malware ,often including more
Trojans ,on to a device.
Prevention from Trojan Horse
• Ways to prevent from Trojan Hoarse
• •Never download or install software from a
source you don’t trust completely
• •Never open an attachment or run a program
sent in an email from someone you don’t
know.
• •Keep all software on your computer up to
date with the latest patches
• •Make sure a Trojan antivirus is installed and
running on computer
Spam
• Spam-is any kind of unwanted ,un solicited
digital communication that gets sent out in
bulk through email
• Ways to prevent from spam
• •Never give out or post your email address
publicly
• •Think before click
• •Do not reply to spam messages
• •Download spam filtering tools and use anti-
virus software
Cookies
• Cookies- are files that contain small pieces of data—like a
user name and password—that are exchanged between a
user's computer and a web server to identify specific
users and improve their browsing experience.
• Shopping sites use cookies to track items users previously
viewed, allowing the sites to suggest other goods they
might like.
• Cookies can’t infect computers with viruses or other
malware ,although some cyber attack scan hijack cookies
and ,therefore browsing sessions.
• Beware Third-Party Cookies-Third-party cookies let
advertisers or analytics companies track an individual's
browsing history across the web on any sites that contain
their ads. cookies themselves are not harmful.
THANKS

You might also like