technology in action chapter 7 © 2006 prentice-hall, inc.1 technology in action chapter 7...
TRANSCRIPT
![Page 1: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/1.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 1
Technology In ActionTechnology In ActionTechnology In ActionTechnology In Action
Chapter 7Chapter 7
Networking and Security: Connecting Networking and Security: Connecting Computers and Keeping Them Safe from Computers and Keeping Them Safe from
Hackers and VirusesHackers and Viruses
Chapter 7Chapter 7
Networking and Security: Connecting Networking and Security: Connecting Computers and Keeping Them Safe from Computers and Keeping Them Safe from
Hackers and VirusesHackers and Viruses
NEXT SLIDE
![Page 2: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/2.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 2
Networking FundamentalsNetworking FundamentalsNetworking FundamentalsNetworking Fundamentals
• Computer network:Computer network:– Two or more computers connected togetherTwo or more computers connected together
• Network Designs:Network Designs:– Locally controlled:Locally controlled:
Peer-to-peer (P2P)Peer-to-peer (P2P)
– Centrally controlled:Centrally controlled:Client/serverClient/server
• Describe network based on distanceDescribe network based on distance– LANLAN– WANWAN
• Computer network:Computer network:– Two or more computers connected togetherTwo or more computers connected together
• Network Designs:Network Designs:– Locally controlled:Locally controlled:
Peer-to-peer (P2P)Peer-to-peer (P2P)
– Centrally controlled:Centrally controlled:Client/serverClient/server
• Describe network based on distanceDescribe network based on distance– LANLAN– WANWAN
NEXT SLIDE
![Page 3: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/3.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 3
Network ComponentsNetwork ComponentsNetwork ComponentsNetwork Components
• Transmission mediaTransmission media– Data transfer rateData transfer rate
• Network adaptersNetwork adapters– Network Interface Cards (NIC)Network Interface Cards (NIC)– External Network AdapterExternal Network Adapter
• Navigation devicesNavigation devices– HubsHubs– RoutersRouters
• Network softwareNetwork software
• Transmission mediaTransmission media– Data transfer rateData transfer rate
• Network adaptersNetwork adapters– Network Interface Cards (NIC)Network Interface Cards (NIC)– External Network AdapterExternal Network Adapter
• Navigation devicesNavigation devices– HubsHubs– RoutersRouters
• Network softwareNetwork software
NEXT SLIDE
Telephone wire:Telephone wire:
TTwiwiststed ed papairir
Coaxial cableCoaxial cableFiber-optic cableFiber-optic cableRadio waves:Radio waves:
WirelessWireless
![Page 4: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/4.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 4
Peer-to-Peer NetworksPeer-to-Peer NetworksPeer-to-Peer NetworksPeer-to-Peer Networks
• Types of P2P networksTypes of P2P networks– Power linePower line– Phone linePhone line– EthernetEthernet– WirelessWireless
• Things to consider:Things to consider:– Existing wiringExisting wiring– Wireless or wiredWireless or wired– Speed of the networkSpeed of the network– Cost of the network Cost of the network
• Types of P2P networksTypes of P2P networks– Power linePower line– Phone linePhone line– EthernetEthernet– WirelessWireless
• Things to consider:Things to consider:– Existing wiringExisting wiring– Wireless or wiredWireless or wired– Speed of the networkSpeed of the network– Cost of the network Cost of the network
![Page 5: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/5.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 5
Computer ThreatsComputer ThreatsComputer ThreatsComputer Threats
• Cyber-crime, Cyber-criminalCyber-crime, Cyber-criminal• Hackers:Hackers:
– Who they areWho they are– What they doWhat they do
Steal information from computers:Steal information from computers: Internet packet sniffingInternet packet sniffing Commit identity theftCommit identity theft Create widespread computer attacks:Create widespread computer attacks: Denial of service attacksDenial of service attacks
– How they gain accessHow they gain access Direct access:Direct access:
– Hacking software Indirect access:Indirect access:
– Internet connection– Logical ports
• Cyber-crime, Cyber-criminalCyber-crime, Cyber-criminal• Hackers:Hackers:
– Who they areWho they are– What they doWhat they do
Steal information from computers:Steal information from computers: Internet packet sniffingInternet packet sniffing Commit identity theftCommit identity theft Create widespread computer attacks:Create widespread computer attacks: Denial of service attacksDenial of service attacks
– How they gain accessHow they gain access Direct access:Direct access:
– Hacking software Indirect access:Indirect access:
– Internet connection– Logical ports
NEXT SLIDE
![Page 6: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/6.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 6
MovieMovieMovieMovie
• The Net (1995)http://movieweb.com/movie/thenet
• The Net (1995)http://movieweb.com/movie/thenet
![Page 7: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/7.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 7
Computer SafeguardsComputer SafeguardsComputer SafeguardsComputer Safeguards
• Firewalls Firewalls • Viruses and antivirus softwareViruses and antivirus software
• Firewalls Firewalls • Viruses and antivirus softwareViruses and antivirus software
NEXT SLIDE
![Page 8: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/8.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 8
Firewalls Firewalls Firewalls Firewalls
• Software programs or hardware designed Software programs or hardware designed to close logical ports to invadersto close logical ports to invaders
• Types of firewalls:Types of firewalls:– Norton Personal FirewallNorton Personal Firewall– McAfee FirewallMcAfee Firewall– Zone AlarmZone Alarm– BlackICE PC ProtectionBlackICE PC Protection– Network routersNetwork routers
• Static addressingStatic addressing• Dynamic addressingDynamic addressing
• Software programs or hardware designed Software programs or hardware designed to close logical ports to invadersto close logical ports to invaders
• Types of firewalls:Types of firewalls:– Norton Personal FirewallNorton Personal Firewall– McAfee FirewallMcAfee Firewall– Zone AlarmZone Alarm– BlackICE PC ProtectionBlackICE PC Protection– Network routersNetwork routers
• Static addressingStatic addressing• Dynamic addressingDynamic addressing
NEXT SLIDE
![Page 9: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/9.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 9
Software firewall downloadSoftware firewall downloadSoftware firewall downloadSoftware firewall download
• ZoneAlarm—http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp?lid=pdb_zal
• Sygate— http://soho.sygate.com/• Norton Personal Firewall—
http://www.symantec.com/sabu/nis/npf/
• ZoneAlarm—http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp?lid=pdb_zal
• Sygate— http://soho.sygate.com/• Norton Personal Firewall—
http://www.symantec.com/sabu/nis/npf/
![Page 10: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/10.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 10
Computer VirusesComputer VirusesComputer VirusesComputer Viruses
• A program that attaches itself to another A program that attaches itself to another program and spreads itself to other program and spreads itself to other computerscomputers
• Viruses are hidden within the code of a Viruses are hidden within the code of a host programhost program
• A program that attaches itself to another A program that attaches itself to another program and spreads itself to other program and spreads itself to other computerscomputers
• Viruses are hidden within the code of a Viruses are hidden within the code of a host programhost program
Norton AntiVirus Response Center Web Page
NEXT SLIDE
![Page 11: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/11.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 11
What Viruses DoWhat Viruses DoWhat Viruses DoWhat Viruses Do
• Replicate themselves:Replicate themselves:– Slow down networksSlow down networks
• Secondary objectives:Secondary objectives:– Annoying messagesAnnoying messages– Delete files on the hard driveDelete files on the hard drive– Change computer settingsChange computer settings
• Replicate themselves:Replicate themselves:– Slow down networksSlow down networks
• Secondary objectives:Secondary objectives:– Annoying messagesAnnoying messages– Delete files on the hard driveDelete files on the hard drive– Change computer settingsChange computer settings
Love Letter – Fastest spreading virus
Melissa – Caused $80 million damage
Nimda – Affected more than 1 million computers
NEXT SLIDE
![Page 12: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/12.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 12
Types of VirusesTypes of VirusesTypes of VirusesTypes of Viruses• Boot-sector viruses:Boot-sector viruses:
– Replicate themselves in the boot sector of the hard driveReplicate themselves in the boot sector of the hard drive
• Logic bombs:Logic bombs:– Activate when certain conditions are met Activate when certain conditions are met – Michelangelo virusMichelangelo virus
• Worms:Worms:– Travel between systems through networks Travel between systems through networks – Sasser wormSasser worm
• Boot-sector viruses:Boot-sector viruses:– Replicate themselves in the boot sector of the hard driveReplicate themselves in the boot sector of the hard drive
• Logic bombs:Logic bombs:– Activate when certain conditions are met Activate when certain conditions are met – Michelangelo virusMichelangelo virus
• Worms:Worms:– Travel between systems through networks Travel between systems through networks – Sasser wormSasser worm
March 6
NEXT SLIDE
![Page 13: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/13.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 13
Types of VirusesTypes of VirusesTypes of VirusesTypes of Viruses
• Script viruses:Script viruses:– Hidden on Web pagesHidden on Web pages– Mini programs Mini programs
• Macro viruses:Macro viruses:– Attached to documentsAttached to documents– Series of commandsSeries of commands– Melissa virusMelissa virus
• Trojan horses:Trojan horses:– Backdoor programsBackdoor programs– Control remote computersControl remote computers
• Script viruses:Script viruses:– Hidden on Web pagesHidden on Web pages– Mini programs Mini programs
• Macro viruses:Macro viruses:– Attached to documentsAttached to documents– Series of commandsSeries of commands– Melissa virusMelissa virus
• Trojan horses:Trojan horses:– Backdoor programsBackdoor programs– Control remote computersControl remote computers
NEXT SLIDE
![Page 14: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/14.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 14
Virus ClassificationsVirus ClassificationsVirus ClassificationsVirus Classifications
• Polymorphic viruses:Polymorphic viruses:– Periodically rewrite themselves to avoid detectionPeriodically rewrite themselves to avoid detection
• Multipartite viruses:Multipartite viruses:– Infect multiple file typesInfect multiple file types
• Stealth viruses:Stealth viruses:– Erase their code from the hard drive and reside in the Erase their code from the hard drive and reside in the
active memoryactive memory
• Polymorphic viruses:Polymorphic viruses:– Periodically rewrite themselves to avoid detectionPeriodically rewrite themselves to avoid detection
• Multipartite viruses:Multipartite viruses:– Infect multiple file typesInfect multiple file types
• Stealth viruses:Stealth viruses:– Erase their code from the hard drive and reside in the Erase their code from the hard drive and reside in the
active memoryactive memory
NEXT SLIDE
![Page 15: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/15.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 15
Antivirus SoftwareAntivirus SoftwareAntivirus SoftwareAntivirus Software
• Programs designed to detect viruses:Programs designed to detect viruses:– Scan files looking for virus signatures (unique code)Scan files looking for virus signatures (unique code)– Provides options for deleting or fixing infected filesProvides options for deleting or fixing infected files
• Detect known virusesDetect known viruses• Antivirus programs need to be updated Antivirus programs need to be updated
frequentlyfrequently
• Programs designed to detect viruses:Programs designed to detect viruses:– Scan files looking for virus signatures (unique code)Scan files looking for virus signatures (unique code)– Provides options for deleting or fixing infected filesProvides options for deleting or fixing infected files
• Detect known virusesDetect known viruses• Antivirus programs need to be updated Antivirus programs need to be updated
frequentlyfrequently
NEXT SLIDE
![Page 16: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them](https://reader036.vdocument.in/reader036/viewer/2022062321/56649eb75503460f94bc1267/html5/thumbnails/16.jpg)
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 16
Chapter 7 Summary QuestionsChapter 7 Summary QuestionsChapter 7 Summary QuestionsChapter 7 Summary Questions
• What is a firewall and how does it keep my What is a firewall and how does it keep my computer safe from hackers?computer safe from hackers?
• From which types of viruses do I need to From which types of viruses do I need to protect my computer?protect my computer?
• What can I do to protect my computer What can I do to protect my computer from viruses?from viruses?
• What is a firewall and how does it keep my What is a firewall and how does it keep my computer safe from hackers?computer safe from hackers?
• From which types of viruses do I need to From which types of viruses do I need to protect my computer?protect my computer?
• What can I do to protect my computer What can I do to protect my computer from viruses?from viruses?
LAST SLIDE