We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 4
ICT
Wi-Fi & Bluetooth
Cloud storage Malware in Networks
Prepared by Aya Alsadig, 9th Grade
Wi-Fi & Bluetooth Best for operating full- Usage Ideal for transferring data scale networks with faster between close-range data transfer rates. devices. Devices requiring access to Best Suited Devices within 30 meters distance a network up to 100 meters where speed isn't crucial and for away, like computers or For low-bandwidth applications like smartphones accessing the sending music files. Operates in multiple internet. Abou Uses 79 different frequencies frequency bands, mainly t centered at 2.45 GHz with 2.4 GHz and 5 GHz, spread-spectrum frequency divided into channels. How is it hopping and key encryption. Enables faster and secure data Useful Useful for secure, short-range data transfer over larger distances, transfer and low-bandwidth tasks. supporting internet access and full-scale networks. What It Connects devices to networks and Does Connects devices wirelessly over the internet wirelessly, operating short distances over larger distances with higher Cloud Storage Cloud storage is a method of data storage where data is stored on remote servers, managed by hosting companies. The same data is stored on multiple servers to ensure access during maintenance or repairs, known as data redundancy. Usa Types Saving data onge remote servers instead Public Cloud: Different companies manage storage and of local storage devices. clients. Private Cloud: Dedicated environment behind a Best Suited company’s firewall, managed as a single entity. For Users needing access to their data from any device, anywhere. Hybrid Cloud: Combines public and private cloud environments for different data types. Those requiring remote backup and disaster recovery solutions. Advantag Disadvanta es data anytime, anywhere with internet. Accessibility: Access gesabout data security and potential Security: Concerns Convenience: No need for external storage devices or same data loss. computer Connection: Issues with slow or unstable internet. Backup: Provides remote backup for disaster recovery. Cost: High costs for large storage or high data Reliability: Data recovery in case of hard disk or backup device failure. transfer. Capacity: Offers almost unlimited storage capacity (for a price). Risk: Potential failure of the cloud storage Collaboration: Ideal for collaboration, allowing multiple users company, risking data loss. to edit, sync files Malware & Anti-Malware Software in Networks Anti-malware software is essential for scanning and protecting all software and devices within a network from malware threats. It checks for viruses whenever data or software is downloaded or transferred. Usage Has & Does Installing anti-malware software on network devices to Pre-run Checks: It Ensures network safety by ensure continuous protection. scanning before software or files are used. Performing virus checks whenever new data or software is Virus Database Comparison: It Identifies known introduced to the network. malware threats. Best Suited Heuristic Checking: It Detects suspicious For Scanning software and files before use. behavior indicating new malware. Quarantine: Manages infected files within the Protecting against known and new viruses. network, offering deletion options. Isolating and managing infected files to prevent virus spread. How is it Useful Protects the entire network by preventing malware infections. It Provides continuous monitoring and security against known and emerging malware threats. It also Helps manage and isolate malware to maintain network safety.