0% found this document useful (0 votes)
4 views81 pages

Ict 8 4.2 2

Chapter 4 discusses various network issues and communication methods, focusing on security concerns related to data transfer, passwords, and authentication methods. It highlights the importance of protecting passwords, using anti-malware software, and exploring advanced authentication techniques like biometrics and smart cards. The chapter also addresses the advantages and disadvantages of different security measures, including zero login systems and magnetic stripe cards.

Uploaded by

dullahm72011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views81 pages

Ict 8 4.2 2

Chapter 4 discusses various network issues and communication methods, focusing on security concerns related to data transfer, passwords, and authentication methods. It highlights the importance of protecting passwords, using anti-malware software, and exploring advanced authentication techniques like biometrics and smart cards. The chapter also addresses the advantages and disadvantages of different security measures, including zero login systems and magnetic stripe cards.

Uploaded by

dullahm72011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 81

Chapter 4

NETWORKS AND
THE EFFECTS OF
USING THEM
LESSON 2
NETWORK ISSUES TOPICS
AND 4.2.1 Security Issues Regarding Data Transfer

COMMUNICATION 4.2.2 Passwords


4.2.3 Other Authentication Methods
4.2.4 Anti-malware Software
CHAPTER 4 4.2.5 Electronic Conferencing
NETWORK AND
THE EFFECTS OF
USING THEM
LESSON 2
NETWORK ISSUES AND 2.1
COMMUNICATION

CHAPTER 4
NETWORK AND THE
SECURITY ISSUES
REGARDING DATA
EFFECTS OF USING
THEM

TRANSFER
CHAPTER 4
LESSON 1
NETWORK ISSUES
SECURITY ISSUES REGARDING DATA TRANSFER
AND
COMMUNICATION
Many aspects of security (such as hacking,
SSECURITY
phishing, pharming and viruses) are covered
ECURITY ISSUES
SSUES
RREGARDING
EGARDING DDATA
ATA
TTRANSFER
RANSFER

PASSWORDS in depth in Chapter 8 (Section 8.3).


OTHER
AUTHENTICATION
METHODS
ANTI-MALWARE
SOFTWARE
This section covers some of the more general
ELECTRONIC
CONFERENCING
aspects of internet security, together with how
we use networks to communicate.
N M I
TEACHnology
LESSON 2
NETWORK ISSUES AND 2.2
COMMUNICATION

CHAPTER 4
NETWORK AND THE
PASSWORDS
EFFECTS OF USING
THEM
CHAPTER 4
LESSON 1
NETWORK ISSUES
PASSWORDS
AND
COMMUNICATION
It is important that passwords are protected.
Some ways of doing this are described below:
SECURITY ISSUES
REGARDING DATA
TRANSFER
PPASSWORDS
when accessing your email account
ASSWORDS

OTHER
AUTHENTICATION
METHODS
ANTI-MALWARE when carrying out online banking
SOFTWARE
ELECTRONIC
CONFERENCING accessing social networking sites

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PASSWORDS
AND
COMMUNICATION
Passwords must be protected.
SECURITY ISSUES
REGARDING DATA
TRANSFER
PPASSWORDS
ASSWORDS

OTHER
AUTHENTICATION
Run anti-spyware software to make
METHODS
ANTI-MALWARE
sure that your passwords are not
SOFTWARE
ELECTRONIC
being relayed back to whoever put
CONFERENCING
the spyware on your computer.

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PASSWORDS
AND
COMMUNICATION
Passwords must be protected.
SECURITY ISSUES
REGARDING DATA
TRANSFER
PPASSWORDS
ASSWORDS

OTHER
AUTHENTICATION
METHODS
Change passwords regularly in case
ANTI-MALWARE
SOFTWARE
they come into the possession of
ELECTRONIC
CONFERENCING
another user illegally or accidentally.

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PASSWORDS
AND
COMMUNICATION
Passwords must be protected.
SECURITY ISSUES
REGARDING DATA
TRANSFER
PPASSWORDS
ASSWORDS

OTHER
AUTHENTICATION Passwords should not be easy to
METHODS
ANTI-MALWARE
crack.
SOFTWARE
ELECTRONIC
Passwords are grouped as either strong
CONFERENCING
(hard to crack or guess) or weak
(relatively easy to crack or guess).
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PASSWORDS
AND
COMMUNICATION
Passwords must be protected.
SECURITY ISSUES
REGARDING DATA
TRANSFER
PPASSWORDS
ASSWORDS

OTHER
AUTHENTICATION
Strong passwords should contain:
METHODS
ANTI-MALWARE
– at least one capital letter
SOFTWARE
ELECTRONIC
– at least one numerical value
CONFERENCING
– at least one other keyboard
character (such as @, *, & etc.).
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PASSWORDS
AND
COMMUNICATION

SECURITY ISSUES
REGARDING DATA
STRONG PASSWORD
TRANSFER
PPASSWORDS
ASSWORDS

OTHER
AUTHENTICATION
METHODS Sy12@#TT90kj=0
ANTI-MALWARE
SOFTWARE
ELECTRONIC
weak password
CONFERENCING

GREEN1
N M I
TEACHnology
LESSON 2
NETWORK ISSUES AND 4.2.3
COMMUNICATION

CHAPTER 4
NETWORK AND THE
OTHER
AUTHENTICATION
EFFECTS OF USING
THEM

METHODS
CHAPTER 4
LESSON 1
NETWORK ISSUES
OTHER AUTHENTICATION METHODS
AND
COMMUNICATION
 zero login
SECURITY ISSUES
REGARDING DATA
TRANSFER  biometrics
PASSWORDS
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
 magnetic stripes
MMETHODS
ETHODS

ANTI-MALWARE
SOFTWARE
 smart cards
ELECTRONIC
CONFERENCING  physical tokens
 electronic tokens.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ZERO LOGIN AND BIOMETRICS
AND
COMMUNICATION
 introduced by The Fast ID online (FIDO)
Alliance and WWW Consortium (W3C)
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
MMETHODS
ETHODS

ANTI-MALWARE
SOFTWARE
ELECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ZERO LOGIN AND BIOMETRICS
AND
COMMUNICATION
 allows users to login to computer systems
without the need to type in a password
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
MMETHODS
ETHODS

ANTI-MALWARE
SOFTWARE
ELECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ZERO LOGIN AND BIOMETRICS
AND
COMMUNICATION
 relies on devices being smart and secure
enough to instantly recognise a user by a
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS number of features based on:
OOTHER
THER
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS  biometrics
ANTI-MALWARE
SOFTWARE
 behavioural patterns.
ELECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
BIOMETRICS
AND
COMMUNICATION
used on many smartphones (logging in)
SECURITY ISSUES
REGARDING DATA
TRANSFER
Example:
PASSWORDS
OOTHER

M
THER
AAUTHENTICATION
UTHENTICATION
METHODS
ETHODS
fingerprint recognition system
ANTI-MALWARE
SOFTWARE
recognises the user and unlocks the phone
ELECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
BEHAVIOURAL PATTERNS
AND
COMMUNICATION
how you walk
SECURITY ISSUES
REGARDING DATA
TRANSFER
your typing speed
PASSWORDS
OOTHER
THER
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS
your normal location
ANTI-MALWARE
SOFTWARE how you swipe the screen, etc.
ELECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
BEHAVIOURAL PATTERNS
AND
COMMUNICATION
These behavioural patterns, coupled with
SECURITY ISSUES
REGARDING DATA
TRANSFER
biometric data, should be enough to
PASSWORDS
OOTHER
THER
uniquely identify a user, and allow them
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS into a system without actually supplying
ANTI-MALWARE
SOFTWARE any passwords or other security
ELECTRONIC
CONFERENCING information.

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ADVANTAGES OF ZERO LOGIN
AND

 enhanced security
COMMUNICATION

SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS
(it is difficult to copy biometrics and
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
behavioural patterns)
MMETHODS
ETHODS

ANTI-MALWARE
SOFTWARE  easier and much quicker way to
ELECTRONIC
CONFERENCING
login to a system
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
DISADVANTAGES OF ZERO LOGIN
AND
COMMUNICATION

SECURITY ISSUES
 How do users know when they are
REGARDING DATA
TRANSFER being monitored?
PASSWORDS
OOTHER
THER
AAUTHENTICATION
UTHENTICATION  How do you know if and when you
MMETHODS
ETHODS

ANTI-MALWARE
SOFTWARE
have been logged out?
 How well protected is it in reality?
ELECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
MAGNETIC STRIPE CARDS
AND
COMMUNICATION
 have a magnetic stripe on the reverse side,
made up of tiny magnetic particles on a
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS plastic film
OOTHER
THER
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS  Each particle can act as a north-pole or a
ANTI-MALWARE
SOFTWARE south-pole (binary values 0 and 1).
ELECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
MAGNETIC STRIPE CARDS
AND
COMMUNICATION
 have a magnetic
stripe on the reverse
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS side, made up of tiny
OOTHER
THER
AAUTHENTICATION
UTHENTICATION magnetic particles
MMETHODS
ETHODS

ANTI-MALWARE on a plastic film


SOFTWARE
ELECTRONIC
CONFERENCING
 Each particle can act as a north-pole or a
south-pole (binary values 0 and 1).
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
MAGNETIC STRIPE CARDS
AND
COMMUNICATION
 card reader reads the stripe (upon swiping)
SECURITY ISSUES
REGARDING DATA
TRANSFER  data such (name, ID number, etch.)
PASSWORDS
OOTHER
THER
contained on a magnetic stripe when used
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS as a security device (ex. to allow entry to a
ANTI-MALWARE
SOFTWARE building)
ELECTRONIC
CONFERENCING
 access will only be allowed if the scanned
data matches data in a database
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
MAGNETIC STRIPE CARDS
AND
COMMUNICATION
Some ID cards also use a holographic image
SECURITY ISSUES
REGARDING DATA (hologram).
TRANSFER
PASSWORDS  designed to make forgery of the card more difficult
OOTHER
THER
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS
 prevents somebody from simply photocopying
ANTI-MALWARE a card and using it illegally
SOFTWARE
ELECTRONIC
CONFERENCING
 change colour or appear
to have a moving object
as the image is viewed
N M I
from different angles
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
MAGNETIC STRIPE CARDS
AND
COMMUNICATION
Another form of security is to have a
photographic image of the card user printed
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS onto the card surface. This prevents a stolen
OOTHER
THER
AAUTHENTICATION
UTHENTICATION card from being used, because the image
MMETHODS
ETHODS

ANTI-MALWARE etched into the card will not match the


SOFTWARE
ELECTRONIC
perpetrator.
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ADVANTAGES MAGNETIC STRIPE CARDS
AND
COMMUNICATION
 easy to use
SECURITY ISSUES
REGARDING DATA
TRANSFER  not an expensive technology.
PASSWORDS
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
 can be remotely deactivated (if lost or
MMETHODS
ETHODS

ANTI-MALWARE
stolen)
SOFTWARE
ELECTRONIC  can be multi-purpose (ex. door key cards,
CONFERENCING
network access cards or used in vending
machines to buy food or drink)
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
DISADVANTAGES MAGNETIC STRIPE CARDS
AND
COMMUNICATION
 Less secure than, for example, biometric
methods (no encryption is used and the
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS stripe contents can be copied fairly easily)
OOTHER
THER
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS  The cards wear out with a lot of use.
ANTI-MALWARE
SOFTWARE
 Magnetic readers often fail to read the
ELECTRONIC
CONFERENCING
cards on first attempt.

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
SMART CARDS
AND
COMMUNICATION
 By inserting a tag (chip and antenna) into a
security card, it can act as a smart
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS contactless card.
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
MMETHODS
ETHODS

ANTI-MALWARE
SOFTWARE
 The chip can store data
ELECTRONIC
CONFERENCING
(ex. name, security number, date of birth
and a PIN).
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
SMART CARDS
AND
COMMUNICATION
Example:
SECURITY ISSUES
REGARDING DATA
TRANSFER  card is in a wallet/pocket  as the owner
PASSWORDS
OOTHER
THER
of the card walks up to a security gate 
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS readers on either side of the gate quickly scan
ANTI-MALWARE
SOFTWARE the security data stored on the RFID tag
ELECTRONIC
CONFERENCING
embedded in the card.  The user will then
be invited to enter a PIN on the keypad.  If
all details match, then access will be allowed.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PHYSICAL TOKENS
AND
COMMUNICATION
a form of authentication in the form of a
physical, solid object.
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS
OOTHER
THER
user’s interaction with a login system
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS proves the user’s possession of the token
ANTI-MALWARE
SOFTWARE
contain internal clocks and when a PIN and
ELECTRONIC
CONFERENCING
other authentication details are entered, then
a one-time password (OTP) is generated
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PHYSICAL TOKENS (EXAMPLE)
AND
COMMUNICATION
 customer inserts their debit card into the top of
SECURITY ISSUES
REGARDING DATA the token device (first authentication step)  and
TRANSFER
PASSWORDS
the device either recognises the card as genuine or
OOTHER
THER rejects it.
AAUTHENTICATION
UTHENTICATION
MMETHODS
ETHODS

ANTI-MALWARE
SOFTWARE  The device then asks the
ELECTRONIC
CONFERENCING customer to press ‘IDENTIFY’
and then enter their PIN (second
authentication step).
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PHYSICAL TOKENS (EXAMPLE)
AND
COMMUNICATION
 A one-time password is then shown on the
device screen – this is usually an eight-digit
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS code.
OOTHER
THER
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS  The customer now goes back to their bank
ANTI-MALWARE
SOFTWARE web page and enters the eightdigit code.
ELECTRONIC
CONFERENCING
 They are now given access to their
account.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
TYPES OF PHYSICAL TOKENS
AND
COMMUNICATION
a disconnected physical token
SECURITY ISSUES
REGARDING DATA
TRANSFER
a separate device is used, requiring the
PASSWORDS
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
user to key in data manually using a
MMETHODS
ETHODS

ANTI-MALWARE
keypad
SOFTWARE
ELECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
TYPES OF PHYSICAL TOKENS
AND
COMMUNICATION
a connected physical token
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS
transmits the generated one-
OOTHER
THER time password directly to a
AAUTHENTICATION
UTHENTICATION
MMETHODS
ETHODS computer through a USB
ANTI-MALWARE
SOFTWARE connection; the user does not
ELECTRONIC
CONFERENCING
need to manually enter data

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTRONIC TOKEN
AND
COMMUNICATION
Electronic (software) tokens are software
SECURITY ISSUES
REGARDING DATA
TRANSFER
installed on a user’s device, such as a
PASSWORDS
OOTHER
THER
smartphone. Suppose a user wishes to log
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS on to a website using their tablet
ANTI-MALWARE
SOFTWARE computer.
ELECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTRONIC TOKEN (EXAMPLE)
AND

1. The website requires electronic


COMMUNICATION

SECURITY ISSUES

tokens to be used to authenticate


REGARDING DATA
TRANSFER
PASSWORDS
OOTHER
THER
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS
the user.
ANTI-MALWARE
SOFTWARE
ELECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTRONIC TOKEN (EXAMPLE)
AND

2. The user has already installed


COMMUNICATION

SECURITY ISSUES

the electronic token app on their


REGARDING DATA
TRANSFER
PASSWORDS
OOTHER
THER
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS
smartphone.
ANTI-MALWARE
SOFTWARE
ELECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTRONIC TOKEN (EXAMPLE)
AND
COMMUNICATION 3. When the website requests the user to authenticate
SECURITY ISSUES
REGARDING DATA
who they are, the user opens the app on their smartphone.
TRANSFER The app generates a one-time password (OTP) which is
PASSWORDS
valid for less than a minute.
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
MMETHODS
ETHODS

ANTI-MALWARE
SOFTWARE
ELECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTRONIC TOKEN (EXAMPLE)
AND
COMMUNICATION
4. The user enters this OTP when
SECURITY ISSUES
REGARDING DATA
TRANSFER
prompted by the website, together with
PASSWORDS
OOTHER
THER
some other form of authentication, such
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS as PIN, touch ID or face ID
ANTI-MALWARE
SOFTWARE
ELECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTRONIC TOKEN (EXAMPLE)
AND
COMMUNICATION
The website server runs the
same software as the app.
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS Because both the server and
OOTHER
THER
AAUTHENTICATION
UTHENTICATION smartphone have
MMETHODS
ETHODS

ANTI-MALWARE synchronised clocks, they


SOFTWARE
ELECTRONIC
will generate the same
numbers.
CONFERENCING

N M I
TEACHnology
LESSON 2
NETWORK ISSUES AND 4.2.4
COMMUNICATION

CHAPTER 4
NETWORK AND THE
ANTI-MALWARE
SOFTWARE
EFFECTS OF USING
THEM
CHAPTER 4
LESSON 1
NETWORK ISSUES
ANTI-MALWARE SOFTWARE
AND
COMMUNICATION Refer to Chapter 8 for further
SECURITY ISSUES
REGARDING DATA
information on the running of anti-
TRANSFER
malware software. In this section, we
PASSWORDS
OTHER will concentrate on the use of a type of
AUTHENTICATION
METHODS anti-malware software, known as anti-
ANTI
NTI-MALWARE
MALWARE
SOFTWARE
virus software, to protect devices
ELECTRONIC
CONFERENCING
against a potential virus attack.

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ANTI-MALWARE SOFTWARE
AND
COMMUNICATION
 should be loaded onto a computer
SECURITY ISSUES
REGARDING DATA
TRANSFER  should be run to allow all software and
PASSWORDS
OTHER
devices to be scanned for viruses
AUTHENTICATION
METHODS
 whenever data or software is
ANTI
NTI-MALWARE
MALWARE
SOFTWARE downloaded or being transferred
ELECTRONIC
CONFERENCING to another device

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ANTI-MALWARE SOFTWARE
AND
COMMUNICATION

SECURITY ISSUES
Running anti-virus
software in the
REGARDING DATA
TRANSFER
PASSWORDS
OTHER
AUTHENTICATION
background on a
METHODS
ANTI
NTI-MALWARE
MALWARE
SOFTWARE
computer will constantly
ELECTRONIC
CONFERENCING check for virus attacks.

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
COMMON FEATURES
AND
COMMUNICATION  check software or files before they are run or
SECURITY ISSUES
REGARDING DATA
loaded on a computer
TRANSFER
PASSWORDS  compare a possible virus against a database
OTHER
AUTHENTICATION
of known viruses
METHODS
ANTI
NTI-MALWARE
MALWARE
SOFTWARE
 carry out heuristic checking
ELECTRONIC
CONFERENCING checking of software for types of
behaviour that could indicate a possible
virus; this is useful if software is infected
N M I
TEACHnology by a virus not yet on the database
CHAPTER 4
LESSON 1
NETWORK ISSUES
COMMON FEATURES
AND
COMMUNICATION
 possible files or programs which are
SECURITY ISSUES
REGARDING DATA infected are put into quarantine which:
TRANSFER
PASSWORDS
OTHER
- allows the virus to be automatically
AUTHENTICATION
METHODS
deleted, or
ANTI
NTI-MALWARE
MALWARE
SOFTWARE - allows the user to make the decision
ELECTRONIC
CONFERENCING about deletion

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
COMMON FEATURES
AND
COMMUNICATION  Anti-virus software needs to be kept up to
SECURITY ISSUES
REGARDING DATA
date because new viruses are constantly
TRANSFER
being discovered.
PASSWORDS
OTHER
AUTHENTICATION
 Full system checks need to be carried out
METHODS
ANTI
NTI-MALWARE
MALWARE
once a week because some viruses lie
SOFTWARE
dormant and would only be picked up by this
ELECTRONIC
CONFERENCING full system scan.

N M I
TEACHnology
LESSON 2
NETWORK ISSUES AND 4.2.5
COMMUNICATION

CHAPTER 4
NETWORK AND THE
ELECTRONIC
CONFERENCING
EFFECTS OF USING
THEM
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTRONIC CONFERENCING
AND
COMMUNICATION
This section covers three types of electronic
SECURITY ISSUES
REGARDING DATA conferencing:
TRANSFER
PASSWORDS
OTHER
 video conferencing
AUTHENTICATION
METHODS
 audio conferencing
ANTI-MALWARE
SOFTWARE
ELECTRONIC
LECTRONIC  web conferencing.
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
VIDEO CONFERENCING
AND
COMMUNICATION
 a communication method that uses both
SECURITY ISSUES
REGARDING DATA video and sound
TRANSFER
PASSWORDS
OTHER
 substitute for face-to-face conferences
AUTHENTICATION
METHODS
between a number of people, who may be
ANTI-MALWARE
SOFTWARE
in a different part of the country or live
ELECTRONIC
LECTRONIC
CONFERENCING
overseas.
 carried out in real time and makes use of
N M I
some form of network
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
BASIC HARDWARE
AND
COMMUNICATION
 webcams
SECURITY ISSUES
REGARDING DATA
TRANSFER  large monitors/television screens
PASSWORDS
OTHER
AUTHENTICATION
 microphones
METHODS
ANTI-MALWARE  speakers.
SOFTWARE
ELECTRONIC
LECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
THINGS TO CONSIDER
AND
COMMUNICATION  agree a time and date for the conference to
SECURITY ISSUES
REGARDING DATA
take place.
TRANSFER
PASSWORDS  log into the video-conference system
OTHER
AUTHENTICATION
METHODS
 video-conference set-up needs to be checked
ANTI-MALWARE
SOFTWARE
before the meeting goes live
ELECTRONIC
LECTRONIC
CONFERENCING  webcams need to be placed in the correct
position so that all the delegates in the room
are within visual contact
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
THINGS TO CONSIDER
AND
COMMUNICATION
 microphones need to be placed centrally
SECURITY ISSUES
REGARDING DATA so that all of the delegates can speak
TRANSFER
PASSWORDS
OTHER
 assign one main contact person in each
AUTHENTICATION
METHODS
conference room to make sure each
ANTI-MALWARE
SOFTWARE
delegate is able to be heard
ELECTRONIC
LECTRONIC
CONFERENCING
In addition to the hardware items described above,
it is also important to realise that software plays an
important role in a successful video conference.
N M I
TEACHnology
CHAPTER 4
LESSON 1 SOFTWARE IN VIDEO CONFERENCING
NETWORK ISSUES
AND
COMMUNICATION
Webcam and microphone software drivers
SECURITY ISSUES
REGARDING DATA
TRANSFER
It is vital that the correct software is
PASSWORDS
OTHER used to ensure that the webcam and
AUTHENTICATION
METHODS microphone transmit their images and
sound to the other delegates (these are
ANTI-MALWARE
SOFTWARE
ELECTRONIC
LECTRONIC
CONFERENCING sometimes referred to as hardware
drivers).
N M I
TEACHnology
CHAPTER 4
LESSON 1 SOFTWARE IN VIDEO CONFERENCING
NETWORK ISSUES
AND
COMMUNICATION
CODEC
SECURITY ISSUES
REGARDING DATA
TRANSFER CODEC can stand for COder-DECoder or
PASSWORDS COmpression-DECompression
OTHER
AUTHENTICATION
METHODS - used to encode or decode the digital data stream
ANTI-MALWARE to allow data to be transmitted (encoded) and
SOFTWARE
ELECTRONIC
LECTRONIC
played back (decoded)
CONFERENCING
- used to compress the data before it is transmitted
and then decompress it again at the receiving
N M I
conference room
TEACHnology
CHAPTER 4
LESSON 1 SOFTWARE IN VIDEO CONFERENCING
NETWORK ISSUES
AND
COMMUNICATION
Echo cancellation software
SECURITY ISSUES
REGARDING DATA
TRANSFER - allows talking to take place in real time and
PASSWORDS permits the synchronisation of communication.
OTHER
AUTHENTICATION
METHODS - this software copies received signals and checks
ANTI-MALWARE for parts of the signal that reappear but are
SOFTWARE
ELECTRONIC
LECTRONIC
delayed slightly. The reappearing parts are
CONFERENCING
removed from the signal (the echo is removed).

N M I
TEACHnology
CHAPTER 4
LESSON 1 ADVANTAGES OF VIDEO CONFERENCING
NETWORK ISSUES
AND
COMMUNICATION easier to access important documents or bring in
SECURITY ISSUES ‘experts’ at key parts of the conference
REGARDING DATA
TRANSFER
can hold conferences at short notice
PASSWORDS
OTHER
AUTHENTICATION
reduces costs:
METHODS
ANTI-MALWARE travelling costs
SOFTWARE
ELECTRONIC
LECTRONIC hotel accommodation or venue hire
CONFERENCING

cost of taking people away from their work for


two or three days to travel
N M I
TEACHnology
CHAPTER 4
LESSON 1 ADVANTAGES OF VIDEO CONFERENCING
NETWORK ISSUES
AND
COMMUNICATION It may be better to use video conferencing than have
SECURITY ISSUES delegates travel to potentially unsafe places around
REGARDING DATA
TRANSFER the world.
PASSWORDS
OTHER
It is better for the environment – less travel means
AUTHENTICATION
METHODS
less pollution.
ANTI-MALWARE
SOFTWARE It connects people in an organisation who might be
ELECTRONIC
LECTRONIC
CONFERENCING
otherwise left out
Example:, people not based at the
headquarters
N M I
TEACHnology
CHAPTER 4
LESSON 1 DISADVANTAGES OF VIDEO CONFERENCING
NETWORK ISSUES
AND
COMMUNICATION  potential time lag in responses/delays when talking.
SECURITY ISSUES
REGARDING DATA  images can jerk (usually due to poor
TRANSFER
Internet/network performance)
PASSWORDS
OTHER
AUTHENTICATION
 can be very expensive to set up (hardware,
METHODS
software)
ANTI-MALWARE
SOFTWARE
ELECTRONIC
LECTRONIC
 large time zone differences between delegates from
CONFERENCING other countries

N M I
TEACHnology
CHAPTER 4
LESSON 1 DISADVANTAGES OF VIDEO CONFERENCING
NETWORK ISSUES
AND
COMMUNICATION  training people to use the system can be costly and
SECURITY ISSUES time-consuming
REGARDING DATA
TRANSFER
 can be demotivating for staff if they believe that one
PASSWORDS
OTHER
of the ‘perks’ of their job is international travel
AUTHENTICATION
METHODS
 the whole system relies on a good network
ANTI-MALWARE
SOFTWARE connection
ELECTRONIC
LECTRONIC
CONFERENCING if it breaks down or the signal strength is
diminished in any way, then the video
conference can be almost unusable
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
AUDIO CONFERENCING
AND
COMMUNICATION
 refers to meetings held between people
SECURITY ISSUES
REGARDING DATA using audio (sound) equipment.
TRANSFER
PASSWORDS
OTHER
 can be done over the standard telephone
AUTHENTICATION
METHODS
network (often referred to as a phone
ANTI-MALWARE
SOFTWARE
conference)
ELECTRONIC
LECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
AUDIO CONFERENCING
AND
COMMUNICATION

SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS
OTHER
AUTHENTICATION
METHODS
ANTI-MALWARE
SOFTWARE
ELECTRONIC
LECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PROCEDURE: AUDIO CONFERENCING
AND
COMMUNICATION
1. two PINs are given by the phone
SECURITY ISSUES
REGARDING DATA company to the:
TRANSFER
PASSWORDS
OTHER
a) organisers (personal PIN)
AUTHENTICATION
METHODS
b) participants (participant’s PIN)
ANTI-MALWARE
SOFTWARE
ELECTRONIC
LECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PROCEDURE: AUDIO CONFERENCING
AND
COMMUNICATION
2. The organisers contacts all of the
SECURITY ISSUES
REGARDING DATA participants and informs them of
TRANSFER
PASSWORDS
OTHER
a. their PIN
AUTHENTICATION
METHODS
b. the date
ANTI-MALWARE
SOFTWARE
ELECTRONIC
LECTRONIC c. time of the phone conference.
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PROCEDURE: AUDIO CONFERENCING
AND
COMMUNICATION
3. When the phone conference is about to
SECURITY ISSUES
REGARDING DATA start, the organiser dials the conference
TRANSFER
PASSWORDS phone number and, once they are
OTHER
AUTHENTICATION connected, keys in their personal PIN
METHODS
ANTI-MALWARE
(2151 in this case).
SOFTWARE
ELECTRONIC
LECTRONIC
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PROCEDURE: AUDIO CONFERENCING
AND
COMMUNICATION
4. The participants then call the same
SECURITY ISSUES
REGARDING DATA conference number to join in – once
TRANSFER
PASSWORDS they get through they each input the PIN
OTHER
AUTHENTICATION given to them by the organiser (8422 in
METHODS
ANTI-MALWARE
this case). Without this PIN, it would be
SOFTWARE
ELECTRONIC
LECTRONIC
impossible to join the phone conference.
CONFERENCING

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
AUDIO CONFERENCING USING A COMPUTER
AND
COMMUNICATION
The use of Voice over Internet Protocol
SECURITY ISSUES
REGARDING DATA (VoIP).
TRANSFER
PASSWORDS
OTHER
AUTHENTICATION
METHODS
It is also possible to connect an internet
ANTI-MALWARE
SOFTWARE telephone, which usually plugs into the
ELECTRONIC
LECTRONIC
CONFERENCING router or other internet device.

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
AUDIO CONFERENCING USING A COMPUTER
AND
COMMUNICATION
Equipment needed
SECURITY ISSUES
REGARDING DATA
TRANSFER  a computer (with built-in
PASSWORDS
OTHER
microphones and speakers)
AUTHENTICATION
METHODS
 external microphone and/or speakers
ANTI-MALWARE
SOFTWARE
ELECTRONIC
LECTRONIC  an internet phone
CONFERENCING

 a standard phone.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
VOIP (VOICE OVER INTERNET PROTOCOL)
AND
COMMUNICATION
 allows an organiser to create a group of
SECURITY ISSUES
REGARDING DATA people to take part in the conference call
TRANSFER
PASSWORDS
OTHER
 allows communication using voice,
AUTHENTICATION
METHODS
instant messaging and video (by using an
ANTI-MALWARE
SOFTWARE
attached webcam)
ELECTRONIC
LECTRONIC
CONFERENCING  allows adding actual telephone numbers
for users with no Internet
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
WEB CONFERENCING
AND
COMMUNICATION
Often referred to as a webinar or webcasts,
SECURITY ISSUES
REGARDING DATA it uses the internet to permit conferencing to
TRANSFER
PASSWORDS take place.
OTHER
AUTHENTICATION
METHODS  allows multiple computers (each connected to
ANTI-MALWARE
SOFTWARE the Internet)
ELECTRONIC
LECTRONIC
CONFERENCING
 carried out in real time
 allows different types of meeting to take place
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
WEB CONFERENCING
AND
COMMUNICATION
Equipment and other tools needed:
SECURITY ISSUES
REGARDING DATA
TRANSFER  computer
PASSWORDS
OTHER
AUTHENTICATION
 webcam
METHODS
ANTI-MALWARE  microphone
SOFTWARE
ELECTRONIC
LECTRONIC
CONFERENCING
 speaker
 high-speed internet
N M I
TEACHnology
 web conferencing app (or website)
CHAPTER 4
LESSON 1
NETWORK ISSUES
MAIN FEATURES
AND
COMMUNICATION
 slide presentations can be posted on the
SECURITY ISSUES
REGARDING DATA conference website in advance of the
TRANSFER
PASSWORDS meeting
OTHER
AUTHENTICATION
METHODS
 host’s computer screen can be shared for
ANTI-MALWARE
SOFTWARE
live presentations/demonstrations.
ELECTRONIC
LECTRONIC
CONFERENCING  delegates can draw or write on a
‘whiteboard’ using their own keyboard or
N M I
mouse
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
MAIN FEATURES
AND
COMMUNICATION
 can transmit images or videos using the
SECURITY ISSUES
REGARDING DATA webcam throughout the conference
TRANSFER
PASSWORDS
OTHER
 documents can be shared
AUTHENTICATION
METHODS
 it is possible to chat verbally or by using
ANTI-MALWARE
SOFTWARE instant messaging throughout the
ELECTRONIC
LECTRONIC
CONFERENCING conference.

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
SMART CARDS
AND
COMMUNICATION
 By inserting a tag (chip and antenna) into a
security card, it can act as a smart
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS contactless card.
OOTHER
THER that is, it can be read from a
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS  The chip can store distance
data such and (ex.
does name,
not have to
ANTI-MALWARE
SOFTWARE security number, date of birth
be swiped and aacard
through PIN).
ELECTRONIC reader be used as a
Smart cards can therefore
CONFERENCING

security device.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
SMART CARDS
AND
COMMUNICATION
 By inserting a tag (chip and cards
Smart antenna)
caninto a
security card, it can act as a smart
SECURITY ISSUES
REGARDING DATA
TRANSFER therefore be used as a
PASSWORDS contactless card.
OOTHER
THER
security device.
AAUTHENTICATION
UTHENTICATION
MMETHODS
ETHODS

ANTI-MALWARE
SOFTWARE
 The chip can store data
ELECTRONIC
CONFERENCING
(ex. name, security number, date of birth
and a PIN).
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PHYSICAL TOKENS
AND
COMMUNICATION
a form of authentication in the form of a
physical, solid object.
SECURITY ISSUES
REGARDING DATA
TRANSFER The OTP is shown on a small screen.
PASSWORDS
user’s interaction with a login system
OOTHER
THER
The code changes on a regular basis
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS proves the
anduser’s possession
is usually of for
only valid theless
token
than a
ANTI-MALWARE
SOFTWARE
contain internal
minute. clocks and when a PIN and
ELECTRONIC
CONFERENCING
other authentication details are entered, then
a one-time password (OTP) is generated
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTORNIC TOKENS
AND
COMMUNICATION
The website server
runs the same software
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS as the app. Once
Because
the OTP and other form of
OOTHER
THER
AAUTHENTICATION
UTHENTICATION both the server and
authentication are verified by the
MMETHODS
ETHODS

ANTI-MALWARE smartphonewebsite,
have the user will be allowed access.
SOFTWARE
ELECTRONIC
synchronised clocks,
they will generate the
CONFERENCING

same numbers.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
COMMON FEATURES
AND
COMMUNICATION
possible
Thefiles
user or
may programs
know thatwhich areor
the file
SECURITY ISSUES
REGARDING DATA infected are putis into
program quarantine
not infected which:
by a virus – this
TRANSFER
is known as a false positive and is one of
PASSWORDS
OTHER
-the
allows the virus to be automatically
drawbacks of anti-virus software).
AUTHENTICATION
METHODS
deleted, or
ANTI
NTI-MALWARE
MALWARE
SOFTWARE - allows the user to make the decision
ELECTRONIC
CONFERENCING about deletion

N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
WEB CONFERENCING
AND
COMMUNICATION
Often referred to as a webinar or webcasts,
SECURITY ISSUES
REGARDING DATA it uses the internet to permit conferencing to
TRANSFER  business meetings to discuss new
PASSWORDS take place.
OTHER
ideas
AUTHENTICATION
METHODS  allows multiple computers (each connected to
presentations
ANTI-MALWARE
SOFTWARE the Internet)
ELECTRONIC
LECTRONIC
 online education or training.
CONFERENCING
 carried out in real time
 allows different types of meeting to take place
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
AND
COMMUNICATION

SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS
OTHER
AUTHENTICATION
METHODS
ANTI-MALWARE
SOFTWARE
ELECTRONIC
CONFERENCING

N M I
TEACHnology

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy