Unit 4 - Networks and The Effects of Using Them
Unit 4 - Networks and The Effects of Using Them
Unit 4 - Networks and The Effects of Using Them
• Networks hardware
• network issues and communication
What is a computer network?
A network is two or more computers, or
other electronic devices, connected
together so that they can exchange data.
Easily share files and data.
Share resources such as printers and
Internet connections.
Communicate with other network users
Store data centrally (using a file server)
for ease of access and back-up.
Keep all of our settings centrally so we
can use any workstation.
Greater risk of hackers.
Greater risk of viruses (spreading and
disabling network).
The significant cost of extra equipment.
When the network is down computers can not be used as standalone computers.
Print queues can be long.
1
4.1 Network Hardware
Common Network Devices:
• Each device has its own manufacturer given MAC (Media Access Control) address which is
unique. Example : AA-BB-CC-DD-EE-FF (6 pairs separated by a hyphen or a colons)
• A Hub and a Switch both connect a number of computers together to make a LAN.
Hub – Dumb Device
• Sends data packets to all the workstations on the network
which causes network traffic.
• Poor Security
• Only would be suitable for a small home networks.
3
4.1 Networks hardware
Common Network Devices
4
4.1 Networks hardware
Understand the use of WiFi and Bluetooth in networks
WiFi is a wireless networking technology makes it possible to connect devices with a wireless
connection to a network or to a single computer .
• Reduced cost of cabling/Safer – won’t trip over wires
• Easier to connect other devices to the network
• Makes the computer portable as long as it’s within range of the wireless access point
Limited area of network
Strength of signal is weaker
Possible slow data transfer speeds
Easier to hack into/less secure
Physical obstacles can interfere with signal/can
cause disconnection
Bluetooth is a wireless networking technology designed for very short-range connections.
Connecting wireless devices such as mouse, phone, headset to a computer which are
close in proximity.
Transferring files between devices.
Printing Wirelessly from a Tablet or Mobile Phone.
Very slow data transfer speeds
Short distance of coverage/limited signal strength
Greater risk of interception of data/less secure
Supports a limited number of devices in a network 5
4.1 Networks hardware
Internet Service Provider : ISP
• Internet Service Provider, the organization which provides
Internet access.
• This offers web space and domain name to create own
website.
• It provides users with an email address.
• It provides a router to connect to the internet.
• In may also offer storage space to save data in the cloud.
How?
1. Adding viruses & spyware to the Network.
2. Creating threat to the data - Data could be deleted, edited, corrupted, replicated or passed
on to other people.
3. Creating threat to the network - Network may have to be shut down to quarantine virus
which could stop production and cost an organization a lot of money
10
4.2 Network Issues and Communication
Hacking:
• It is the unauthorised access to computer systems with the intention of causing harm.
• They could edit, delete and steal data.
• They also could introduce viruses to a computer network to cause disruption.
• They could employ someone to expose weaknesses of the system though spying.
Method of Authentication:
Password:
• Username and password is the common way to protect from entering into any system.
• Passwords must be strong which include multiple characters such letters, numbers, special
characters. Use upper and lower case letters.
• User should have different passwords for different accounts
• Ensure password is regularly changed.
• Install spyware software which will block the installation of any key logging software.
When users log onto to their online accounts they may also be asked for additional
information to verify their accounts.
• Security Question: Typical questions includes mothers maiden name.
• Personal Image: Requires user to identify an image when they log in on the website for
online banking. They have to confirm if the image shown is one they selected as their
account image.
11
4.2 Network Issues and Communication : Alternative methods of Authentication
Biometrics :
• Methods: Finger Prints, Retina Scan, Iris Scans, Face Scans, Vocal Recognition
• Uses: Biometrics use unique data. Only the person with the biometric features can access
the network. Cannot copy/replicate biometric data.
Magnetic Swipe Cards: They are used to gain access to the system by swiping the card into
the reader to enter into a room or gate. Swipe cards are quite easy to use and update.
Transaction Authentication Number (TAN): It is used by online banking services. User will
insert their bank card into the reader which will then provide a code which will need to be
entered to complete a transaction.
Two factor authentication: In Twin Factor Authentication, the bank sends a code which needs
to be entered to the computer after typing in their password. This code is valid only for few
seconds. This code is sent by the bank computer only to the authorized mobile number which
is registered in the bank.
Dongle/Digi-pass/physical token:
The device is registered in the bank against the customer’s account
number. It displays a number at regular intervals. After entering the
password, this number is entered to complete online transfers/
shopping payments. This is another method of twin authentication.
12
4.2 Network Issues and Communication : Security issues regarding data transfer
Virus: A piece of programming code/ software which gets installed, replicates itself, without
the user’s knowledge and permission.
Effects of virus on computer’s HDD/SSD:
1. Track zero & sector zero could be erased
2. Files & data can be deleted or destroyed or corrupted or damaged. This can lead to
computer malfunction
3. System files can be corrupted if on the hard disk
4. Disk space can fill up
5. Causes the computer to crash – become slower
6. Data files can be copied by the hacker and sent to others
How can the computer be infected?
1. Clicked on or opened a spam email or Clicked on a link to a website within the email
2. Opening software from a portable device /external secondary storage device
3. Running it without being checked by up to date anti-virus software
4. Not having an up-to-date antivirus on the computer or not at all scanning any file
downloaded or used from an external device before opening
How antivirus works during scan?
• Detects a potential virus, compares the virus coding with its database
• Alerts the user of the potential virus & asks the user if the file can be deleted or not
• Deletes the file and virus, quarantines the infected files on the hard disk so they cannot
infect the computer. Dis-infects & cleans the file in the quarantine.
13
4.2 Network Issues and Communication : Security issues regarding data transfer
Spyware : It gathers data from computers without the user knowing. It monitors the key
presses to gain personal information or passwords. This information would be sent back to the
hacker.
How to keep the computer safe:
1. Install antivirus and antispyware and keep it up to date.
2. Do not download any files from untrusted sources including email attachments .
3. Do not install illegal software onto your computer.
4. Do not click on links from unknown websites.
5. Do not connect storage devices (e.g. USB) from unknown sources and scan for viruses.
6. Install a firewall to keep the computer safe.
Disadvantages
• Data can still be deleted from system
• Criminals can use encryption to keep incriminating material secure
14
4.2 Network Issues and Communication : Security issues regarding data transfer
Firewall: Monitors and controls Keeps a list of undesirable/
incoming and undesirable IP addresses,
outgoing data traffic. And only allows them
Web based business such as Amazon or E-bay store sensitive data about customers including
payment details. They would have to abide by the data protection act to keep the data secure.
16
4.2 Network Issues and Communication : Network communication
Fax: Requires a fax machine and a telephone line. Number of the recipient dialed before the
document is scanned and sent. Recipient receives a hard copy
But… Anyone can access faxed documents, the fax may be out of paper or ink . No notification
of fax received.
Email: Can send same email to multiple recipient / multiple attachments. Email can be
received instantly and accessed on many platforms, can be read from any physical location
But… Email attachments may include viruses/spam, may receive phishing emails to obtain
personal data.
Electronic Faxing: To send an email fax, you write up a message and attach a document as you
would with a standard email. Instead of adding an email address, you input your recipient's fax
number followed by a unique eFax domain address. Then you hit the send button. No need to
have a physical fax machine.
Electronic Fax is sent via a internet connection.
No need to buy a fax machine, ink or paper.
Electronic Fax documents are sent to an email which will ensure the correct person will
receive the fax – less chance of document being intercepted.
Electronic Fax's can also be sent directly to a fax machine.
Send fax's from any location with an internet connection.
No additional cost to send fax over internet network.
17
4.2 Network Issues and Communication : Network communication
Video Conferencing: (Same like Botim, Totok apps)
Two or more participants, able to communicate, talk, see and hear over a network. It uses both
video and sound using an internet connection. It is interactive
No need to travel to have meetings which would cut down on travelling costs and travelling
time.
Video conference can be held at short notice.
Facilitates long distance learning – students can access live lectures without travelling.
Different time zones could make it difficult to find to find a suitable time to have a meeting.
Technical problems with the internet or hardware could effect the quality of the video
conference.
Set up costs to purchase hardware/software and to provide relevant training to staff.
Lack of personal contact you would have if it was a face to face meeting.
Not possible to sign documents.
Web conference: (Same like Zoom and Teams)
It is very similar to video conference as participants can hear audio and see a live video
stream. They use internet.
They join the web conference by clicking on the supplied link from the organizer.
Participants can join with permission and leave the web conference at any time.
Participant can communicate with other participants through text messages.
Participants can be given permission to speak and can share content such as images, video
or presentations.
18
4.2 Network Issues and Communication : Network communication
Audio Conferencing:
Audio conference is generally done over the telephone network or using a computer making
use of VOIP.
1. The Date and time is decided by the organizer.
2. The organizer of the phone conference is given a unique PIN which is shared with the
participants.
3. For Participants to join they have to dial the conference phone number followed by the
PIN.
19