0% found this document useful (0 votes)
11 views36 pages

Computer App Chapter 5

Chapter 5 discusses computer networks, their advantages, types, applications, limitations, and the ethical issues surrounding information technology. It highlights the importance of networking for communication, data sharing, and various applications in sectors like healthcare, education, and e-commerce. Additionally, it addresses the challenges of security, complexity, and costs associated with computer networks.

Uploaded by

Dani Gedefa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views36 pages

Computer App Chapter 5

Chapter 5 discusses computer networks, their advantages, types, applications, limitations, and the ethical issues surrounding information technology. It highlights the importance of networking for communication, data sharing, and various applications in sectors like healthcare, education, and e-commerce. Additionally, it addresses the challenges of security, complexity, and costs associated with computer networks.

Uploaded by

Dani Gedefa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 36

CHAPTER 5

COMPUTER NETWORKS AND


COMMUNICATIONS AND COMPUTER SECURITY

1
COMPUTER
 NETWORK
“Networking, or computer networking, is the process of
connecting two or more computing devices, such as desktop
computers, mobile devices, routers or applications, to enable the
transmission and exchange of information and resources.”--- IBM
 “A Computer Network is a set of two or more computers linked
together via wired cables or wireless networks, such as WiFi, to
communicate, exchange, share, or distribute data, files, and
resources.”
 Networking involves association among two or more computers. The
two computers will be connected across the world with the help of
web and networking. There are two forms of modem one is with wires
that have connected inside the computer system and the other is
wireless, that are more comfortable and accessible today
ADVANTAGE OF COMPUTER NETWORK
 Resource sharing
 Exchange of messages
 Remote login ( Access to remote database)
 Sharing information at Low Cost
 E-Mailing (person-to-person
communication)  Storing Files in server allows data to be
shared easily
 Entertainment
 Fast and Quick backing up of Files
 Internet services
 Software and resources can be easily
 Video conferencing
managed.
 Network software has fast installation

3
TYPES OF NETWORK
 Based on geographical location computer networks can be divided
into 3:
 Local Area Networks (LAN) is a small high-speed network. In LAN
few numbers of systems are interconnected with networking
devicese to create network. As the distance increases between the
nodes or system its speed decreases. So it is limited to a few
meters only.
 Networks that cover close geographical areas.
 LAN is used to link the devices in a single office, building, or
campus. It provides high speeds over short distances. Systems are
connecting directly to the Network. The LAN is owned by private
people.
TYPES OF NETWORK
 WAN is collection of network (or LAN).
 This network speed is less than the LAN network speed.
 WAN spread over the world may be spread over more than one city
country or continent. Systems in this network are connected
indirectly.
 Generally WAN network are slower speed than LAN’s. The WAN
network are owned or operated by network providers.
 If it is owned by a single owner then it is called Enterprise network.
 MAN (Metropolitan Area Network) is an extension of local area
network to spread over the city.
 It may be a single network or a network in which more than one local
area network can share their resources.
APPLICATION OF NETWORK
1. Internet and World Wide Web
 In computer networks, we have a global internet, also known as the World Wide Web, that offers us various features
like access to websites, online services, and retrieval of information. With the help of the World Wide Web, we can
browse, and we can do search, and access web pages and multimedia content.
2. Communication
 With the help of computer networks, communication is also easy because we can do email, instant messaging, voice
and video calls, and video conferencing, which helps us to communicate with each other effectively.
 People can use these features in their businesses and organizations to stay connected with each other.

3. File Sharing and Data Transfer


 Data transfer and file sharing are made possible by networks that connect different devices. This covers file sharing
within a business setting, file sharing between personal devices, and downloading/uploading of content from the
internet.
4. Online Gaming
 Multiplayer online games use computer networks to link players from all over the world, enabling online competitions
and real-time gaming experiences.
APPLICATION OF NETWORK

 5. Remote Access and Control


 Networks enable users to access and control systems and devices from a distance. This is helpful when
accessing home automation systems, managing servers, and providing remote IT support.
 6. Social media
 With the help of a computer network, we can use social media sites like Facebook, Twitter, and
Instagram to help people set up their profiles, and we can connect with others and share content on
social media.
 7. Cloud Computing
 The provision of on-demand access to computing resources and services hosted in distant data centers
relies on networks. Some example of cloud computing is software as a service (SaaS), platform as a
service (PaaS), and infrastructure as service (IaaS). 7
APPLICATION OF NETWORK
 8. Online Banking and E-Commerce
 Online banking and e-commerce platforms, where customers conduct financial transactions and make online
purchases, require secure computer networks.
 9. Enterprise Networks
 In Computer networks, we have some networks that are only used in businesses and organizations so they can store
data and share files and resources like printers, scanners, etc.
 10. Healthcare
 With the help of computer networks in the health industry, we can share patient records and store the records in the
form of data that is easy and secure compared to the file method. Networks are also necessary for telemedicine and
remote patient monitoring.
 11. Education
 Schools use networks to access online courses, virtual classrooms, and other online learning materials. Campuses of
8
colleges and universities frequently have extensive computer networks.
APPLICATION OF NETWORK
 12. Transportation and Logistics
 The transportation sector uses Computer Networks to manage and track shipments, plan the best routes, and
coordinate logistics activities.
 13. Internet of Things (IoT) and Smart Homes
 Through the Internet of Things (IoT), smart homes use networks to connect to and manage a variety of devices,
including thermostats, security cameras, and smart appliances.
 14. Scientific Research
 To share data, work together on projects, and access high-performance computing resources for data analysis and
scientific simulations, researchers use networks.
 15. Government and Defense
 With the help of computer networks, we can communicate, share data, and advance national defense. Government
agencies and the military rely on secure networks. 9

 Computer networks are fundamental to facilitating communication, teamwork, and the effective exchange of
knowledge and resources globally.
LIMITATION OF COMPUTER NETWORK

 Although computer networks have many benefits, they also have drawbacks and difficulties that users and
organizations should take into account. Here are a few typical computer network drawbacks:
 Security issues: Malware, viruses, hacking, and data breaches are all-too-common security threats. Strong
security measures are needed for networks to protect data and systems.
 Complexity: Setting up, running, and maintaining a computer network can be complicated. It can take a lot of
work to manage larger networks effectively.
 Cost: Building and running a network can be costly. Hardware, software, maintenance, and security precautions
are all costs.
 Reliability Issues: Network interruptions or downtime can be caused by hardware malfunctions, software bugs, or
outside variables like power outages or natural disasters. High network availability demands redundant systems
and backup plans.

10
LIMITATION OF COMPUTER NETWORK
 Performance bottlenecks: When dealing with large amounts of data or heavy network traffic, networks
may experience performance problems. Network optimization may be needed to address these
bottlenecks.
 Compatibility: Maintaining compatibility between different hardware, operating systems, and software
programs on a network can be difficult. Functionality problems may result from interoperability issues.
 Limitations on Bandwidth: On shared or crowded networks, the bandwidth available can affect how
quickly and responsively data transfers occur.
 Privacy Concerns: The risk of interception when sending sensitive or private information over networks
raises privacy concerns. To solve this problem, encryption and secure communication protocols are used.
 Management and maintenance: Monitoring, troubleshooting, and updates to hardware and software
components are all part of the ongoing network administration and maintenance tasks.
 Scalability Challenges: Growing a network to accommodate expansion can be difficult and requires 11

careful planning to maintain security and performance.


IOT DEVICES FOR RDAE
 A network of IoT devices for RDAE would consist of interconnected sensors and devices
deployed across farming areas, collecting real-time data on environmental conditions
(weather, soil moisture), crop health, livestock parameters, and other relevant factors,
allowing farmers to access crucial information through a platform to make informed
decisions, optimize resource usage, and receive targeted agricultural extension
services, ultimately improving productivity and sustainability in rural communities.
 Sensors:
 Environmental sensors: Temperature, humidity, rainfall, wind speed, solar radiation
 Soil sensors: Moisture content, pH level, nutrient levels
 Crop health sensors: Leaf chlorophyll content, disease detection
 Livestock sensors: Body temperature, movement activity, milk yield
 Water level sensors: Monitoring irrigation systems 12
INTRODUCTION

 In an information society, the focus of commerce becomes the generation

and distribution of information.

 A technology revolution is changing our way of life; the way we live,

work, and play.

 The cornerstone of this revolution, the computer, is transforming the way

we communicate, do business, and learn and an explosion of computing 13

advances is speeding this change.


VIRTUAL SOCIETY

 A virtual society refers to an online community or network where individuals


interact, communicate, and engage in various activities through digital
platforms.
 It is a space where people from different backgrounds come together virtually to
connect, share ideas, collaborate, and build relationships.
 In a virtual society, individuals can participate in discussions, join interest
groups, play games, attend virtual events, and more, all within an online 14

environment
… VIRTUAL SOCIETY

 In Digital technology, there are 3 ways a computer system can verify whether

the user have authorized right of access.

 What you have? such as a smart card.

 What you know? Such as password.

 What you are? such as fingerprint, voice, face recognition etc.


15
…VIRTUAL SOCIETY

 Authentication mechanism are used to satisfy the user that entities, people, data, applications or

computers are actually what they claim to be.

 One of the most commonly used mechanism for authenticating people has been the password.

 Passwords are expected to be known only by the owner.

 However, passwords can be guesses or learnt by intruders through interception of

communications networks or re-use of encrypted passwords.

 Re-use of passwords can be prevented by time stamping or by using passwords only once. 16
VIRTUAL IDENTITY

 Virtual identity refers to the online representation of an individual or entity in the digital world.

 Virtual identities can include usernames, profiles, or any other form of online representation that

distinguishes an individual online.

 Identification theft—stealing your good name—TOI—theft of Identity—is a crime in

which thieves hijack your Name and identity and use your good credit rating to get cash.

 To do these, what they need is simply knowing your individual credentials such as full name

and social security number. 17


VIRTUAL UNIVERSITY

 Distance learning is the use of computer and/or video networks to teach courses

to students outside the conventional classroom.

 Until recently, distance learning has been largely outside the mainstream of

campus life.

 That is, it concentrates principally on part time students, those who cannot easily

travel to campus, those interested in noncredit classes, or those seeking special


18

courses in business or engineering.


VIRTUAL SUPER MARKET

 We can view items by category [snack foods], item [cookies], or by brand and pursue items

on sale.

 We can request that items be arranged alphabetically by brand, price per unit, package size,

or we can even request a listing by nutritional value.

 In the minds of the busy people who shop online, the cost of the e-service is easily offset by

other savings [better prices, less spent on travel and so on].


19
VIRTUAL OFFICE

 Now big foreign companies are eliminating offices and allowing employees to work from
any location they choose.
 Virtual offices are possible because of cellular telephones, fax machines, portable
computers, and other mobile computing and communication devices.
 Virtual offices help to:
 To reduce office space
 Eliminate office infrastructure and cost
 Eliminate real estate costs
 Eliminate unwanted traveling time to the office 20
ISSUES AND ETHICS IN IT

Issues in IT can be classified into four categories such as:


 Security issue
 Technical issues
 Privacy issue
 Compliance and Legal Issues

21
ETHICS

 Ethics can be defined as a branch of philosophy dealings with the determination

of what is right or wrong, good or bad.

 Simply if we define” ethics are moral standards that help to guide, behavior,

actions, and choices.

 Ethics are grounded in the notion of responsibility and accountability.


22
ETHICS IN AN INFORMATION SOCIETY

 The basic concepts of ethics are:


 Responsibility
 Accepting the potential costs, duties and obligations for the decisions one makes
 Accountability
 The mechanisms for assessing responsibility for decisions made and actions taken
 Liability
 The existence of laws that permit individuals to recover the damages done to them by other
 Due process
 A process in which laws are well known and understood and there is an ability to appeal to
23

higher authorities to ensure that laws are applied correctly.


COMPUTER CRIMES

 The term computer crime includes any unauthorized use of a computer

system including software piracy or theft of system resources for personal


use including computer processing time and network access time.

 Actions intended to alter data and programs or to damage or destroy data,

software, or equipment is also crimes.

24
COMMON TYPES OF COMPUTER CRIMES

DATA DIDLING Changing data and information before they enter a system

DATA LEAKAGE Erasing or removing data and files from a system without indicating that they
were removed or leaving any trace, they ever existed.
LOGIC BOMB A program designed to execute when certain conditions occur. Designed to
sabotage system data, programs or processing [refer time bomb]
TIME BOMB A program designed to execute on a specific date and time. The program
monitors the computer’s internal clock or calendar. When the preset date
arrives, the program comes to life causing its damage.
TRAPDOOR An illicit and unknown point of entry into a program or network that can be
used to gain access to the system
TROJAN HORSE A program that appears to do one thing, but actually does something very
different.
COMPUTER CRIMES….

 All these crimes are committed through intrusion, forced and unauthorized

entry into the system.

 Computer crime through intrusion can occur by following ways:

 Hackers

 Crackers

 Viruses 26
COMPUTER CRIMES----

 Hackers
 A hacker is a person who gains access to a system illegally.
 Hackers usually gain access to a system through a network, but sometimes they will physically
enter a computer or network facility.
 Techniques helpful in deterring intrusion by hackers
 Change access passwords frequently
 Allow workers access to only the system functions they need to use
 Permit workers to access only the data that they need to use
 Encrypt data by scrambling or coding information.
27

 Keep staff well informed through education programs


COMPUTER CRIMES ---

 Crackers

 Crackers also gain unauthorized access to information technology but do so for

malicious purposes.

 Crackers attempt to break into computers and deliberately obtain information

for financial gain, shut down hardware, pirate software, destroy and etc.

28
HACKERS VS CRACKERS

 In the context of computer security, hackers and crackers are often used interchangeably, but

they can have slightly different connotations.

 Generally, hackers refer to individuals who have advanced technical skills and knowledge in

computer systems and networks.

 Black hat hackers are individuals who engage in unethical and illegal activities related to

computer security.

 Ethical hackers, also known as white-hat hackers, work to enhance security and protect 29

systems from potential threats.


HACKERS VS CRACKERS….

 On the other hand, crackers are individuals who use their technical skills for

malicious purposes.

 Crackers are often associated with illegal activities, such as identity theft,

financial fraud, or spreading malware.

 It's important to note that not all hackers are crackers, as hacking itself is a

neutral term that can be used for both good and bad purposes. 30
COMPUTER VIRUSES AND WORMS

 VIRUS: A hidden program that alters, without the user’s knowledge, how a

computer operates or modifies the data and program stored on the computer.

 Computer intrusion occurs by way of software in the name of a virus.

 Each virus has its characteristics its signature.

 Some destroy irreplaceable data.

31
…COMPUTER VIRUSES AND WORMS

 A virus is a typical program that attaches itself to a computer system and destroys or corrupts
data.
 Viruses are passed in three ways
 By diskette [copying ]
 By network [data sharing]
 By internet [ e-mail ]
 Some worms erase, destroy, and change the data.
 WORMS: A Worm is a program that copies itself repeatedly into memory or on to a disk
drive until no more space is left. 32
VIRUSES VS WORMS
 Viruses and worms are both types of malicious software (malware), but they differ in how

they spread and operate.

 A virus is a type of malware that attaches itself to a host file or program and replicates

when that file or program is executed.

 Viruses often need human action to spread, such as executing an infected file or opening

an infected email attachment.

 On the other hand, worms are standalone malware programs that can replicate and spread 33

independently without needing to attach themselves to other files or programs.


VIRUSES VS WORMS…

 In summary, viruses need a host file or program to replicate and spread,

while worms are self-contained and can spread independently.

 Both viruses and worms can cause significant damage to computer systems

and networks if not detected and mitigated in a timely manner.

34
METHODS OF VIRUS DETECTION

 All types of computers are vulnerable to viruses.

 To protect against them, companies must buy and use virus detection software. There are

three methods of virus detection.

 Scanning programs – search the computer and main memory to detect a virus

 Detection Programs – monitor processing activities and signal the user when a virus tries to

infect the system

 Digital signature encryption – uses a mathematical coding scheme designed to foil a virus’s
35
QUESTION?

36

You might also like