0% found this document useful (0 votes)
34 views4 pages

Wi-Fi & Bluetooth Cloud Storage Malware in Networks: Prepared by Aya Alsadig, 9th Grade

presentation on Wi-fi & Bluetooth, malware in networks, and cloud storage (computing)

Uploaded by

ayanaser6153563
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views4 pages

Wi-Fi & Bluetooth Cloud Storage Malware in Networks: Prepared by Aya Alsadig, 9th Grade

presentation on Wi-fi & Bluetooth, malware in networks, and cloud storage (computing)

Uploaded by

ayanaser6153563
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 4

ICT

Wi-Fi & Bluetooth


Cloud storage
Malware in Networks

Prepared by Aya Alsadig, 9th Grade


Wi-Fi & Bluetooth
Best for operating full- Usage Ideal for transferring data
scale networks with faster between close-range
data transfer rates. devices.
Devices requiring access to Best Suited Devices within 30 meters distance
a network up to 100 meters where speed isn't crucial and for
away, like computers or For low-bandwidth applications like
smartphones accessing the sending music files.
Operates in multiple
internet.
Abou Uses 79 different frequencies
frequency bands, mainly t centered at 2.45 GHz with
2.4 GHz and 5 GHz, spread-spectrum frequency
divided into channels. How is it hopping and key encryption.
Enables faster and secure data Useful Useful for secure, short-range data
transfer over larger distances, transfer and low-bandwidth tasks.
supporting internet access and
full-scale networks. What It
Connects devices to networks and Does Connects devices wirelessly over
the internet wirelessly, operating short distances
over larger distances with higher
Cloud Storage
Cloud storage is a method of data storage where data is stored on remote servers, managed by hosting
companies. The same data is stored on multiple servers to ensure access during maintenance or
repairs, known as data redundancy.
Usa
Types
Saving data onge
remote servers instead
Public Cloud: Different companies manage storage and of local storage devices.
clients.
Private Cloud: Dedicated environment behind a
Best Suited
company’s firewall, managed as a single entity. For
Users needing access to their data from any
device, anywhere.
Hybrid Cloud: Combines public and private cloud
environments for different data types. Those requiring remote backup and disaster
recovery solutions.
Advantag Disadvanta
es data anytime, anywhere with internet.
Accessibility: Access
gesabout data security and potential
Security: Concerns
Convenience: No need for external storage devices or same data loss.
computer Connection: Issues with slow or unstable internet.
Backup: Provides remote backup for disaster recovery.
Cost: High costs for large storage or high data
Reliability: Data recovery in case of hard disk or backup device failure.
transfer.
Capacity: Offers almost unlimited storage capacity (for a price). Risk: Potential failure of the cloud storage
Collaboration: Ideal for collaboration, allowing multiple users company, risking data loss.
to edit, sync files
Malware & Anti-Malware Software in Networks
Anti-malware software is essential for scanning and protecting all software and devices within a network
from malware threats. It checks for viruses whenever data or software is downloaded or transferred.
Usage Has & Does
Installing anti-malware software on network devices to Pre-run Checks: It Ensures network safety by
ensure continuous protection. scanning before software or files are used.
Performing virus checks whenever new data or software is Virus Database Comparison: It Identifies known
introduced to the network. malware threats.
Best Suited Heuristic Checking: It Detects suspicious
For
Scanning software and files before use. behavior indicating new malware.
Quarantine: Manages infected files within the
Protecting against known and new viruses.
network, offering deletion options.
Isolating and managing infected files to prevent virus
spread.
How is it
Useful
Protects the entire network by preventing malware infections.
It Provides continuous monitoring and security against known and emerging malware threats.
It also Helps manage and isolate malware to maintain network safety.

You might also like