Care for Network and Computer Hardware LO3
Care for Network and Computer Hardware LO3
Care for Network and Computer Hardware LO3
Harambee University
Ethiopian TVET-System
Curriculum
INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level II
Based on
Occupational Standard (OS)
Learning Guide #27
Unit of Competence: - Care for Network and Computer Hardware
Module Title: - Caring for Network and Computer Hardware
LG Code: - EIS ITS2 M07 1019 LO1-LG27
TTLM Code: - EIS ITS2 TTLM 1019 V1
1.1. Introduction
Computer network: is a system in which computers are connected to share information and
resources. The connection can be done as peer-to-peer or client/server or LAN or WAN.
The term network monitoring describes the use of a system that constantly monitors a computer
network for slow or failing components and that notifies the network administrator (via email, pager or
other alarms) in case of outages. It is a subset of the functions involved in network management.
Network security consists of the requirements and policies adopted by the network administrator to
prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and
network-accessible resources.
Theft, loss, network intrusion, and physical damage are some of the ways a network or computer
can be harmed. Damage or loss of equipment can mean a loss of productivity. Repairing and
replacing equipment can cost the company time and money. Unauthorized use of a network can
expose confidential information and reduce network resources.
Physical loss or damage to equipment can be expensive, and data loss can be detrimental to
your business and reputation. Threats against data are constantly changing as attackers find
new ways to gain entry and commit their crimes.
2.1. Introduction
Computer Security: - The prevention and protection of (computer) assets from
unauthorized access, use, alteration, degradation, destruction, and other threats.
Users choose or an ID and password or authenticating information that allows them access to
information and program within their authority.
Network security covers a variety of computer networks, both public and private, that are used
in everyday jobs conducting transactions and communications among businesses, government
agencies and individuals Networks can be private, such as within a company, and others which
might be open to public access.
Network security is involved in organizations, enterprises, and other types of institutions. It does
as its title explains: It secures the network, as well as protecting and overseeing operations
being done.
Privacy: The right of the individual to be protected against interruption into his personal life or
affairs, or those of his family, by direct physical means or by publication of information.
Security/Privacy Threat: Any person, act, or object that poses a danger to computer
security/privacy.
With an increasing amount of people getting connected to networks, the security threats that
cause massive harm are increasing also.
Network security is a major part of a network that needs to be maintained because information
is being passed between computers etc. and is very vulnerable to attack
Over the past five years people that manage network security have seen a massive increase of
hackers and criminals creating malicious threats that have been pumped into networks across
the world.
2.2.3. SPAM:
SPAM is ―flooding the Internet with many copies of the same message, in an attempt to
force the message on people who would not otherwise choose to receive it.
SPAM may not be the biggest risk to a network because even though it may get maddening
and plentiful it still doesn’t destroy any physical elements of the network.
Solution: SPAM filters are an effective way to stop SPAM; these filters come with most of the
e-mail providers on line. Also you can buy a variety of SPAM filters that work effectively.
2.2.4. Phishing:
Phishing is ―an e-mail fraud method in which the performer sends out legitimate-looking
emails in an attempt to gather personal and financial information from recipients.
phishing is one of the worst security threats over a network because a lot of people that use
computers linked up to a network are unpaid and would be very vulnerable to giving out
information that could cause situations such as theft of money or identity theft.
Solution: Similar to SPAM use Phishing filters to filter out this unwanted mail and to prevent
threat.
Tools that are used to make web pages more powerful and versatile are: -
Java – Programming language that allows applets to run within a web browser. Examples of
applets include a calculator or a counter.
JavaScript – Programming language developed to interact with HTML source code to allow
interactive websites. Examples include a rotating banner or a popup window.
Attackers may use any of these tools to install a program on a computer. To prevent against
these attacks, most browsers have settings that force the computer user to authorize the
downloading or use of ActiveX, Java, or JavaScript.
Most often, adware is displayed in a popup window. Adware popup windows are sometimes
difficult to control and will open new windows faster than users can close them.
Gray ware or malware is a file or program other than a virus that is potentially harmful.
Many gray ware attacks are phishing attacks that try to persuade the reader to unknowingly
provide attackers with access to personal information.
As you fill out an online form, the data is sent to the attacker. Gray ware can be removed using
spyware and adware removal tools.
Spyware, a type of gray ware, is similar to adware. It is distributed without any user intervention
or knowledge. Once installed, the spyware monitors activity on the computer.
The spyware then sends this information to the organization responsible for launching the
spyware.
Denial of service (DoS) is a form of attack that prevents users from accessing normal services,
such as e-mail and a web server, because the system is busy responding to abnormally large
amounts of requests.
DoS works by sending enough requests for a system resource that the requested service is
overloaded and ceases to operate.
Distributed DoS (D DoS) is another form of attack that uses many infected computers, called
zombies, to launch an attack. With D DoS, the intent is to obstruct or overwhelm access to the
targeted server. Zombie computers located at different geographical locations make it difficult to
trace the origin of the attack.
Organizational policies
Your organization should be aware how physically secure every aspect of its network is because if an
intruder gets physical access, they can get your data. Be sure the organization properly secures
locations and consider the following:
Servers - Contain your data and information about how to access that data.
Workstations - Man contain some sensitive data and can be used to attack other computers.
Routers, switches, bridges, hubs and any other network equipment may be used as an access
point to your network.
Network wiring and media and where they pass through may be used to access your network or
place a wireless access point to your network.
External media which may be used between organizational sites or to other sites the organization
does business with.
Locations of staff that may have information that a hostile party can use.
Some employees may take data home or may take laptops home or use laptops on the internet from
home then bring them to work. Any information on these laptops should be considered to be at risk and
these laptops should be secure according to proper policy when connected externally on the network.
It's very important to use different passwords for different systems. This limits the damage a malicious
person can do should a password fall into the wrong hands.
Following are some measures that you can take in order to minimize the risks associated with
malicious human threats:
Data Storage in Safe Locations: Keep your data in safe and secure locations that have
limited access to others.
Virus and Spyware Protection: You must open an e-mail attachment or install any software
from a Web site with caution. The most reliable way is to install antivirus and anti-spyware
software from a reputable vendor.
Human Errors: Many times, damage to a computer is due to unintentional human error. For
example, you may accidentally delete an important file, causing the computer to malfunction.
Hardware Damage: Computer components, being delicate, run the risk of getting damaged
due to carelessness..
Protecting hardware from accidental and environmental damages: You can take various
measures to avoid any unintentional damage to your computer. Keep the computer in an area
that is dust-free, free from vibration, and out of the way of possible impact, should be well-
ventilated to prevent any damage due to heat.
Backing up Data: Regularly back up important computer data. Creating multiple copies of
data provides protection against loss of data due to accidental erasure or destruction of data.
Identify security procedures
A security plan should be used to determine what will be done in a critical situation. Security plan
policies should be constantly updated to reflect the latest threats to a network. A security plan with clear
security procedures is the basis for a technician to follow. Security plans should be reviewed on a
yearly basis.
There are different security strategies
Privacy
Authentication
Authorization and integrity
Privacy is the ability of an individual or group to seclude them or information about themselves and
thereby reveal them selectively. The boundaries and content of what is considered private differ among
cultures and individuals, but share basic common themes.
Virtual Private Network (VPN) uses encryption to protect data. A VPN connection allows a remote
user to safely access resources as if their computer is physically attached to the local network.
Frequency of backups – Backups can take a long time. Sometimes it is easier to make a full
backup monthly or weekly, and then do frequent partial backups of any data that has changed since
the last full backup. However, spreading the backups over many recordings increases the amount of
time needed to restore the data.
Storage of backups – Backups should be transported to an approved offsite storage location for
extra security. The current backup media is transported to the offsite location on a daily, weekly, or
monthly rotation as required by the local organization.
Security of backups – Backups can be protected with passwords. These passwords would have to
be entered before the data on the backup media could be restored.
Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures
needed to create, manage, distribute, use, store, and revoke digital certificates.
[1] In cryptography, a PKI is an arrangement that binds public keys with respective user identities by
means of a certificate authority (CA). The user identity must be unique within each CA domain.
The binding is established through the registration and issuance process, which, depending on the
level of assurance the binding has, may be carried out by software at a CA, or under human
supervision.
The PKI role that assures this binding is called the Registration Authority (RA). The RA ensures that the
public key is bound to the individual to which it is assigned in a way that ensures non-repudiation.
Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the
Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the
sender's identity and know that the message was not changed en route.
Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-
ensuring program by individuals and is also used by many corporations.
Symmetric systems are also known as shared secret systems or private key systems. Symmetric
ciphers are significantly faster than asymmetric ciphers, but the requirements for key exchange make
them difficult to use.
In an asymmetric cipher, the encryption key and the decryption keys are separate. In an asymmetric
system, each person has two keys. One key, the public key, is shared publicly. The second key, the
private key, should never be shared with anyone.
Because asymmetric ciphers tend to be significantly more computationally intensive, they are usually
used in combination with symmetric ciphers to implement effect public key cryptography. The
asymmetric cipher is used to encrypt a session key and the encrypted session key is then used to
encrypt the actual message.
Symmetric ciphers are the oldest and most used cryptographic ciphers. In a symmetric cipher, the key
that deciphers the cipher text is the same as (or can be easily derived from) the key enciphers the clear
text. This key is often referred to as the secret key. The most widely used symmetric ciphers are DES
and AES.
Unlike a symmetric cipher, an asymmetric cipher uses two keys: one key that is kept secret and known
to only one person (the private key) and another key that is public and available to everyone (the public
key).
The two keys are mathematically interrelated, but it's impossible to derive one key from the other. Well-
known asymmetric ciphers are the Diffie-Hellman algorithm, RSA, and DSA.
What are the advantages and disadvantages of using an asymmetric cipher instead of a symmetric
cipher?
An important advantage of asymmetric ciphers over symmetric ciphers is that no secret channel is
necessary for the exchange of the public key. The receiver needs only to be assured of the
authenticity of the public key.
Symmetric ciphers require a secret channel to send the secret key—generated at one side of the
communication channel—to the other side.
Asymmetric ciphers also create lesser key-management problems than symmetric ciphers. Only 2n
keys are needed for n entities to communicate securely with one another. In a system based on
symmetric ciphers, you would need n(n ? 1)/2 secret keys.
A disadvantage of asymmetric ciphers over symmetric ciphers is that they tend to be about "1000
times slower." By that, I mean that it can take about 1000 times more CPU time to process an
asymmetric encryption or decryption than a symmetric encryption or decryption.
Another disadvantage is that symmetric ciphers can be cracked through a "brute-force" attack, in
which all possible keys are attempted until the right key is found.
Because of these characteristics, asymmetric ciphers are typically used for data authentication (through
digital signatures), for the distribution of a symmetric bulk encryption key (aka a digital envelope), for
non-repudiation services, and for key agreement. Symmetric ciphers are used for bulk encryption.
4.6. Sniffers
Monitor network data. A sniffer can be a self-contained software program or a hardware device with the
appropriate software or firmware programming. Sniffers usually act as network probes or "snoops."
They examine network traffic, making a copy of the data without redirecting or altering it. Some sniffers
work only with TCP/IP packets, but the more sophisticated tools can work with many other protocols
and at lower levels including Ethernet frames.
4.8. Deslogin
is a remote login program which may be used safely across insecure networks. With deslogin, you
may log into a secure remote host from a secure local host without worry about your login password or
session information being made visible across the network.
Deslogin is a simple stand-alone client and server, which may be used on machines which don't
have more sophisticated security packages such as SPX or Kerberos.
No centralized key distribution package is required.
Unlike Unix Login programs, authentication relies upon arbitrarily long pass phrases rather than eight-
character user passwords.
4.9. PKZIP
Is an archiving tool originally written by Phil Katz and marketed by his company PKWARE, Inc. The
common "PK" prefix used in both PKZIP and PKWARE stands for "Phil Katz".
Secure Sockets Layer (SSL) a protocol for encrypting information over the Internet
Digital signatures are commonly used for software distribution, financial transactions, and in other
cases where it is important to detect forgery or tampering.