0% found this document useful (0 votes)
12 views41 pages

Chapter 4 - 4.2 Update

Chapter 4 discusses network issues and communication, emphasizing the importance of securing computer networks to prevent data theft and corruption. It covers various security measures such as encryption, firewalls, authentication methods, and anti-malware software to protect data and ensure privacy. Additionally, it explains electronic conferencing methods, including audio, video, and web conferencing, highlighting their equipment and functionalities.

Uploaded by

nilofer malek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views41 pages

Chapter 4 - 4.2 Update

Chapter 4 discusses network issues and communication, emphasizing the importance of securing computer networks to prevent data theft and corruption. It covers various security measures such as encryption, firewalls, authentication methods, and anti-malware software to protect data and ensure privacy. Additionally, it explains electronic conferencing methods, including audio, video, and web conferencing, highlighting their equipment and functionalities.

Uploaded by

nilofer malek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41

Chapter 4: Networks

Subject :ICT
Grade : 8

By: Nilofer Malek


4.2 Network issues and communication
 Security of computer networks

 All networks must be kept secure so that data is not corrupted or

stolen.

 All online systems can be hacked and data can be stolen when it is

stored or transmitted.

 Criminals can also use spyware, which monitors users’ key presses

and can help them to discover passwords and pins, etc.

 There are several different ways to ensure that networks are

protected and that data is kept private and confidential.


2
Encryption

◎ When data is transferred electronically, it can be encrypted to


keep it secure.

3
◎ Encryption is the scrambling of data into a form that cannot be
understood by unauthorised recipients.

◎ The encrypted data must be decrypted back to its original form


before it can be understood.

◎ A common method is to use asymmetric encryption which


employs two different keys – a ‘public’ key and a ‘private’ key.

◎ A private key can decrypt messages encrypted with the


corresponding public key.

◎ The public key is freely available and is used to encrypt a


message for the person who then decrypts it with their private
key.
4
Firewalls
◎ Firewalls are either software or hardware devices that protect
against unauthorised access to a network and are primarily used
to prevent unauthorised access from the internet.
◎ They can be configured to prevent communications from
entering the network and also to prevent programs and users
from accessing the internet from within the network.
◎ For example, a firewall can inspect the incoming packets and
reject those that are from IP addresses not on a trusted list or
block communication to certain external IP addresses.

5
Authentication

◎ Authentication is the process of determining whether someone


trying to log into the network is who they declare to be.

◎ The primary method of authentication is by the use of


passwords.

6
Passwords

◎ A password is a secret word or phrase that is used to


authenticate a user so that they can gain access.

◎ To ensure that a password is secure, some simple rules should be


followed.

7
◎ Strong passwords:
◎ should be at least eight characters long
◎ contain both numbers and letters
◎ contain both upper and lower case letters
◎ contain at least one character such as: !, $, ?, etc.
◎ never use user-identifiable items such as name, date of birth,
phone number, postcode, car registration, etc.
◎ Passwords should be changed regularly.
◎ Previous passwords must never be reused.
◎ Passwords must never be written down.
◎ Passwords must never be shared with other users.
◎ Passwords should be unpredictable so hackers cannot guess
them or try to enter them by trial and error.

8
9
Authentication can also include a variety of methods such as:
◎ biometric methods
◎ magnetic stripes
◎ smart cards
◎ physical tokens
◎ electronic tokens zero login.

10
Biometric methods
◎ Biometric methods of authentication are biological
measurements or an analysis of physical characteristics that
can be used to identify individuals.

Biometric data falls into two categories:

◎ Physiological biometric data relates to a physical aspect of a


person’s body (such as a fingerprint or an eye retina scan).
◎ Behavioural biometrics include signatures, handwriting
analysis and voice pattern recognition.

11
◎ The information being measured needs to be universal – it should
be something that everyone possesses.

◎ It should also be unique, so that an individual can be definitively


recognised.

◎ It should also be permanent, meaning that it should not change


significantly as a person ages.

◎ example, fingerprint mapping, facial recognition, retina scans,


blood vessel patterns in hands and arms are all forms of
biometric technology

12
◎ Biometric devices tend to work in one of two main ways:
verification or identification.
◎ For verification, biometric technologies perform a comparison of
the data with a template that has previously been stored, such
as a fingerprint scan or other physical tokens such as retina, iris
or face scans, on a personal computer or electronic safe.
◎ At present, biometric systems are mainly used for:

Verification: to make sure a person is who they say they are.


Identification: to identify a person in a crowd.
Screening: to match a person who may be on a ‘watch list’ for
security purposes.

13
14
15
Magnetic stripes
◎ Personal and security data can be encoded on the magnetic
stripe of a card and can be swiped through a reader to allow
access.

◎ The magnetic stripe on the back of a credit card is split into three
tracks and they can all contain data.

◎ The first and second track hold coded information about the
cardholder’s account: the card holder’s full name, card number
and CVV value, date of expiry of the card and the code for the
country in which it was issued.

◎ The third track is not always used, but if it is, it holds details like
the currencies that are valid for use with the card.
16
Smart cards
◎ A smart card looks like a credit card in size and shape.

◎ However, a smart card contains a computer chip and when it is


held near a reader, data can be transferred to allow the owner to
be authenticated for access to a room or computer system

17
◎ There are two kinds of smart cards: contact and contactless.

◎ With contact smart cards, the smart card is inserted into the
reader, and the card’s contact plate makes physical contact with
the reader to transmit data.

◎ The user then enters the associated PIN.

◎ With contactless smart cards, the card just has to be held close
to the reader, and data is transmitted via radio waves.

18
Physical tokens
◎ A physical token allows you to access software and verify your
identity with a physical device rather than relying on
authentication codes or passwords.

◎ They are also called key fobs, security tokens or USB tokens. As
physical tokens may be lost, forgotten or stolen, some multi-
factor authentication methods use mobile phones.

◎ The user enters their knowledge factor, for example, their


password, and the server sends a text message containing an
access code to their registered mobile phone. The code can be
used once within a certain time limit.

19
Electronic tokens
◎ Electronic tokens can be used for electronic payments.

◎ A credit card number is converted to a string of random


characters that have no value.

20
◎ When a credit card payment has been converted to a token, a
payment network such as Visa uses its secure keys to decode it
and pass the card number to the standard electronic payment
processors.

◎ Importantly, merchants themselves cannot decode a token.

◎ Converting a token back to a card number requires access to the


encryption keys, which are typically stored in military-grade
security.

◎ Paying with a smartphone uses electronic tokens.

◎ The app replaces the customer’s card details with a unique


virtual account number. That way, sensitive information stays
private.
21
22
Zero login
◎ Passwords and other methods of authentication can no longer be
relied upon in the long term.
◎ Using artificial intelligence, technologies are being developed so
that users can be authenticated, not by a password or physical
features, but by how they behave.
◎ This is called zero login.
◎ Its main difference is that complex passwords or other
documentation will not be required for identification.
◎ Our smart devices will be smart enough, and also secure enough
to recognise facial features, voice, movements and other ways,
in which a person is unique, to use as identification.
◎ How you swipe and type, where you are and when you work are
all unique to you.

23
Anti-malware software- Malware

◎ Malware is short for malicious software and is designed to get


into computers without the user’s consent and to disrupt or
damage the computer.

◎ It includes any software designed to disrupt the functioning of a


computer system and gain unauthorised access to a computer
system.

24
Types of malware include:

◎ virus
◎ worm
◎ Trojan (or Trojan horse)
◎ spyware
◎ adware

25
◎ Anti-malware software is software that is designed to
combat the effects (or even the installation) of malware.

◎ It needs to be installed on a computer so that the


system can be protected from infiltration and infection
by any malware.

◎ The anti-malware program first detects any malware on


a computer, removes it safely and then clears up any
damage that the malware made to the computer.

26
27
◎ To prevent infection, security measures should be taken:
◎ Install anti-malware software, including ant-virus software, and
ensure that it is continually updated.
◎ The software should be used to scan all storage media to detect
and destroy or quarantine malware.
◎ The software quarantines the suspected malware if it is unable to
delete it or it is not sure if it actually is malware and waits for the
user to decide.
◎ When files are quarantined, they are placed in a folder where
they cannot interfere with any other programs.
◎ Install a firewall to ensure software is not downloaded without
your knowledge.

28
29
◎ Ensure that the operating system is up to date.
◎ Install the latest security updates.
◎ Install anti-spyware protection software that removes or blocks
spyware.
◎ Avoid opening emails and attachments from unknown sources.
◎ Scan all data files as they are downloaded.

30
Surf and download more safely:

◎ Only download programs from trusted websites and ensure that


the anti-malware software scans all downloads.
◎ Read all security warnings, licence agreements and privacy
statements.
◎ Never click ‘Agree’ or ‘OK’ to close a window.
◎ Instead, click the red ‘X’ in the corner of the window.
◎ Be wary of popular ‘free’ music and movie file-sharing programs.

31
Electronic-conferencing
◎ Audio-conferencing
◎ Video-conferencing
◎ Web-conferencing

32
Audio-conferencing
◎ Audio-conferencing is where people in different locations use
technology to speak to each other.

◎ Audio-conferencing is different from a traditional phone call as,


instead of directly dialling each other as for a phone call, all
participants use their phones to dial into a central system that
connects them.

◎ Audio-conferencing has similar advantages over face to-face


meetings such as video-conferencing, but there is no visual
communication.

◎ The members cannot see each other or any visual presentations.


They may not be able to tell who is actually speaking or may
inadvertently talk over each other.
33
Video-conferencing and web-
conferencing

◎ Video-conferencing and web-conferencing Both video-conferencing


and web-conferencing allow an audio and a visual connection
between the members of the conference.

◎ Both allow participants in different locations to communicate with


each other in sound and vision.

◎ In video-conferencing, visual and audio communication links two


or more participants using specialised high quality video-
conferencing equipment, including large displays (TV screen) and
video cameras

34
◎ The term web-conferencing is often used interchangeably with
video-conferencing.
◎ An important distinction between the two is the quality and
security of the live video stream and the difference in the
equipment required.
◎ Web-conferencing takes place online over public internet and
enables multiple participants to connect and work together
visually using their laptops or mobile devices.

35
◎ Web-conferencing also includes: Webcasts which involve a one-
way transmission and are non-interactive.

◎ The host presents information via an audio and/or video stream


over the internet and may use screen sharing to show
presentations, videos or documents.

◎ Webinars which are teaching sessions that take place on the


internet.

◎ Participants in different locations see and hear the presenter and


ask and answer questions.

36
Equipment needed for video- and web-conferencing

◎ Both require input and output devices for sound and vision and a
communications link between the participants.

◎ For web-conferencing microphone speakers or headphones video


camera (if it is visual as well as audio) a display screen or
monitor an internet connection web-conferencing software.

37
For video-conferencing

◎ Video-conferencing requires the same hardware, but this is


usually of high quality, individual components rather than being
built into a single device.

◎ Usually a dedicated room is used with a large, wall mounted


monitor and central video camera and speakers.

◎ Video-conferences are also conducted over private lines or


secure internet connections.

38
39
40
Thanks!

41

You might also like