Ict 8 4.2 2
Ict 8 4.2 2
NETWORKS AND
THE EFFECTS OF
USING THEM
LESSON 2
NETWORK ISSUES TOPICS
AND 4.2.1 Security Issues Regarding Data Transfer
CHAPTER 4
NETWORK AND THE
SECURITY ISSUES
REGARDING DATA
EFFECTS OF USING
THEM
TRANSFER
CHAPTER 4
LESSON 1
NETWORK ISSUES
SECURITY ISSUES REGARDING DATA TRANSFER
AND
COMMUNICATION
Many aspects of security (such as hacking,
SSECURITY
phishing, pharming and viruses) are covered
ECURITY ISSUES
SSUES
RREGARDING
EGARDING DDATA
ATA
TTRANSFER
RANSFER
CHAPTER 4
NETWORK AND THE
PASSWORDS
EFFECTS OF USING
THEM
CHAPTER 4
LESSON 1
NETWORK ISSUES
PASSWORDS
AND
COMMUNICATION
It is important that passwords are protected.
Some ways of doing this are described below:
SECURITY ISSUES
REGARDING DATA
TRANSFER
PPASSWORDS
when accessing your email account
ASSWORDS
OTHER
AUTHENTICATION
METHODS
ANTI-MALWARE when carrying out online banking
SOFTWARE
ELECTRONIC
CONFERENCING accessing social networking sites
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PASSWORDS
AND
COMMUNICATION
Passwords must be protected.
SECURITY ISSUES
REGARDING DATA
TRANSFER
PPASSWORDS
ASSWORDS
OTHER
AUTHENTICATION
Run anti-spyware software to make
METHODS
ANTI-MALWARE
sure that your passwords are not
SOFTWARE
ELECTRONIC
being relayed back to whoever put
CONFERENCING
the spyware on your computer.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PASSWORDS
AND
COMMUNICATION
Passwords must be protected.
SECURITY ISSUES
REGARDING DATA
TRANSFER
PPASSWORDS
ASSWORDS
OTHER
AUTHENTICATION
METHODS
Change passwords regularly in case
ANTI-MALWARE
SOFTWARE
they come into the possession of
ELECTRONIC
CONFERENCING
another user illegally or accidentally.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PASSWORDS
AND
COMMUNICATION
Passwords must be protected.
SECURITY ISSUES
REGARDING DATA
TRANSFER
PPASSWORDS
ASSWORDS
OTHER
AUTHENTICATION Passwords should not be easy to
METHODS
ANTI-MALWARE
crack.
SOFTWARE
ELECTRONIC
Passwords are grouped as either strong
CONFERENCING
(hard to crack or guess) or weak
(relatively easy to crack or guess).
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PASSWORDS
AND
COMMUNICATION
Passwords must be protected.
SECURITY ISSUES
REGARDING DATA
TRANSFER
PPASSWORDS
ASSWORDS
OTHER
AUTHENTICATION
Strong passwords should contain:
METHODS
ANTI-MALWARE
– at least one capital letter
SOFTWARE
ELECTRONIC
– at least one numerical value
CONFERENCING
– at least one other keyboard
character (such as @, *, & etc.).
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PASSWORDS
AND
COMMUNICATION
SECURITY ISSUES
REGARDING DATA
STRONG PASSWORD
TRANSFER
PPASSWORDS
ASSWORDS
OTHER
AUTHENTICATION
METHODS Sy12@#TT90kj=0
ANTI-MALWARE
SOFTWARE
ELECTRONIC
weak password
CONFERENCING
GREEN1
N M I
TEACHnology
LESSON 2
NETWORK ISSUES AND 4.2.3
COMMUNICATION
CHAPTER 4
NETWORK AND THE
OTHER
AUTHENTICATION
EFFECTS OF USING
THEM
METHODS
CHAPTER 4
LESSON 1
NETWORK ISSUES
OTHER AUTHENTICATION METHODS
AND
COMMUNICATION
zero login
SECURITY ISSUES
REGARDING DATA
TRANSFER biometrics
PASSWORDS
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
magnetic stripes
MMETHODS
ETHODS
ANTI-MALWARE
SOFTWARE
smart cards
ELECTRONIC
CONFERENCING physical tokens
electronic tokens.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ZERO LOGIN AND BIOMETRICS
AND
COMMUNICATION
introduced by The Fast ID online (FIDO)
Alliance and WWW Consortium (W3C)
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
MMETHODS
ETHODS
ANTI-MALWARE
SOFTWARE
ELECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ZERO LOGIN AND BIOMETRICS
AND
COMMUNICATION
allows users to login to computer systems
without the need to type in a password
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
MMETHODS
ETHODS
ANTI-MALWARE
SOFTWARE
ELECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ZERO LOGIN AND BIOMETRICS
AND
COMMUNICATION
relies on devices being smart and secure
enough to instantly recognise a user by a
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS number of features based on:
OOTHER
THER
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS biometrics
ANTI-MALWARE
SOFTWARE
behavioural patterns.
ELECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
BIOMETRICS
AND
COMMUNICATION
used on many smartphones (logging in)
SECURITY ISSUES
REGARDING DATA
TRANSFER
Example:
PASSWORDS
OOTHER
M
THER
AAUTHENTICATION
UTHENTICATION
METHODS
ETHODS
fingerprint recognition system
ANTI-MALWARE
SOFTWARE
recognises the user and unlocks the phone
ELECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
BEHAVIOURAL PATTERNS
AND
COMMUNICATION
how you walk
SECURITY ISSUES
REGARDING DATA
TRANSFER
your typing speed
PASSWORDS
OOTHER
THER
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS
your normal location
ANTI-MALWARE
SOFTWARE how you swipe the screen, etc.
ELECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
BEHAVIOURAL PATTERNS
AND
COMMUNICATION
These behavioural patterns, coupled with
SECURITY ISSUES
REGARDING DATA
TRANSFER
biometric data, should be enough to
PASSWORDS
OOTHER
THER
uniquely identify a user, and allow them
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS into a system without actually supplying
ANTI-MALWARE
SOFTWARE any passwords or other security
ELECTRONIC
CONFERENCING information.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ADVANTAGES OF ZERO LOGIN
AND
enhanced security
COMMUNICATION
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS
(it is difficult to copy biometrics and
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
behavioural patterns)
MMETHODS
ETHODS
ANTI-MALWARE
SOFTWARE easier and much quicker way to
ELECTRONIC
CONFERENCING
login to a system
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
DISADVANTAGES OF ZERO LOGIN
AND
COMMUNICATION
SECURITY ISSUES
How do users know when they are
REGARDING DATA
TRANSFER being monitored?
PASSWORDS
OOTHER
THER
AAUTHENTICATION
UTHENTICATION How do you know if and when you
MMETHODS
ETHODS
ANTI-MALWARE
SOFTWARE
have been logged out?
How well protected is it in reality?
ELECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
MAGNETIC STRIPE CARDS
AND
COMMUNICATION
have a magnetic stripe on the reverse side,
made up of tiny magnetic particles on a
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS plastic film
OOTHER
THER
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS Each particle can act as a north-pole or a
ANTI-MALWARE
SOFTWARE south-pole (binary values 0 and 1).
ELECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
MAGNETIC STRIPE CARDS
AND
COMMUNICATION
have a magnetic
stripe on the reverse
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS side, made up of tiny
OOTHER
THER
AAUTHENTICATION
UTHENTICATION magnetic particles
MMETHODS
ETHODS
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ADVANTAGES MAGNETIC STRIPE CARDS
AND
COMMUNICATION
easy to use
SECURITY ISSUES
REGARDING DATA
TRANSFER not an expensive technology.
PASSWORDS
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
can be remotely deactivated (if lost or
MMETHODS
ETHODS
ANTI-MALWARE
stolen)
SOFTWARE
ELECTRONIC can be multi-purpose (ex. door key cards,
CONFERENCING
network access cards or used in vending
machines to buy food or drink)
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
DISADVANTAGES MAGNETIC STRIPE CARDS
AND
COMMUNICATION
Less secure than, for example, biometric
methods (no encryption is used and the
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS stripe contents can be copied fairly easily)
OOTHER
THER
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS The cards wear out with a lot of use.
ANTI-MALWARE
SOFTWARE
Magnetic readers often fail to read the
ELECTRONIC
CONFERENCING
cards on first attempt.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
SMART CARDS
AND
COMMUNICATION
By inserting a tag (chip and antenna) into a
security card, it can act as a smart
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS contactless card.
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
MMETHODS
ETHODS
ANTI-MALWARE
SOFTWARE
The chip can store data
ELECTRONIC
CONFERENCING
(ex. name, security number, date of birth
and a PIN).
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
SMART CARDS
AND
COMMUNICATION
Example:
SECURITY ISSUES
REGARDING DATA
TRANSFER card is in a wallet/pocket as the owner
PASSWORDS
OOTHER
THER
of the card walks up to a security gate
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS readers on either side of the gate quickly scan
ANTI-MALWARE
SOFTWARE the security data stored on the RFID tag
ELECTRONIC
CONFERENCING
embedded in the card. The user will then
be invited to enter a PIN on the keypad. If
all details match, then access will be allowed.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PHYSICAL TOKENS
AND
COMMUNICATION
a form of authentication in the form of a
physical, solid object.
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS
OOTHER
THER
user’s interaction with a login system
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS proves the user’s possession of the token
ANTI-MALWARE
SOFTWARE
contain internal clocks and when a PIN and
ELECTRONIC
CONFERENCING
other authentication details are entered, then
a one-time password (OTP) is generated
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PHYSICAL TOKENS (EXAMPLE)
AND
COMMUNICATION
customer inserts their debit card into the top of
SECURITY ISSUES
REGARDING DATA the token device (first authentication step) and
TRANSFER
PASSWORDS
the device either recognises the card as genuine or
OOTHER
THER rejects it.
AAUTHENTICATION
UTHENTICATION
MMETHODS
ETHODS
ANTI-MALWARE
SOFTWARE The device then asks the
ELECTRONIC
CONFERENCING customer to press ‘IDENTIFY’
and then enter their PIN (second
authentication step).
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PHYSICAL TOKENS (EXAMPLE)
AND
COMMUNICATION
A one-time password is then shown on the
device screen – this is usually an eight-digit
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS code.
OOTHER
THER
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS The customer now goes back to their bank
ANTI-MALWARE
SOFTWARE web page and enters the eightdigit code.
ELECTRONIC
CONFERENCING
They are now given access to their
account.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
TYPES OF PHYSICAL TOKENS
AND
COMMUNICATION
a disconnected physical token
SECURITY ISSUES
REGARDING DATA
TRANSFER
a separate device is used, requiring the
PASSWORDS
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
user to key in data manually using a
MMETHODS
ETHODS
ANTI-MALWARE
keypad
SOFTWARE
ELECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
TYPES OF PHYSICAL TOKENS
AND
COMMUNICATION
a connected physical token
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS
transmits the generated one-
OOTHER
THER time password directly to a
AAUTHENTICATION
UTHENTICATION
MMETHODS
ETHODS computer through a USB
ANTI-MALWARE
SOFTWARE connection; the user does not
ELECTRONIC
CONFERENCING
need to manually enter data
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTRONIC TOKEN
AND
COMMUNICATION
Electronic (software) tokens are software
SECURITY ISSUES
REGARDING DATA
TRANSFER
installed on a user’s device, such as a
PASSWORDS
OOTHER
THER
smartphone. Suppose a user wishes to log
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS on to a website using their tablet
ANTI-MALWARE
SOFTWARE computer.
ELECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTRONIC TOKEN (EXAMPLE)
AND
SECURITY ISSUES
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTRONIC TOKEN (EXAMPLE)
AND
SECURITY ISSUES
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTRONIC TOKEN (EXAMPLE)
AND
COMMUNICATION 3. When the website requests the user to authenticate
SECURITY ISSUES
REGARDING DATA
who they are, the user opens the app on their smartphone.
TRANSFER The app generates a one-time password (OTP) which is
PASSWORDS
valid for less than a minute.
OOTHER
THER
AAUTHENTICATION
UTHENTICATION
MMETHODS
ETHODS
ANTI-MALWARE
SOFTWARE
ELECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTRONIC TOKEN (EXAMPLE)
AND
COMMUNICATION
4. The user enters this OTP when
SECURITY ISSUES
REGARDING DATA
TRANSFER
prompted by the website, together with
PASSWORDS
OOTHER
THER
some other form of authentication, such
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS as PIN, touch ID or face ID
ANTI-MALWARE
SOFTWARE
ELECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTRONIC TOKEN (EXAMPLE)
AND
COMMUNICATION
The website server runs the
same software as the app.
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS Because both the server and
OOTHER
THER
AAUTHENTICATION
UTHENTICATION smartphone have
MMETHODS
ETHODS
N M I
TEACHnology
LESSON 2
NETWORK ISSUES AND 4.2.4
COMMUNICATION
CHAPTER 4
NETWORK AND THE
ANTI-MALWARE
SOFTWARE
EFFECTS OF USING
THEM
CHAPTER 4
LESSON 1
NETWORK ISSUES
ANTI-MALWARE SOFTWARE
AND
COMMUNICATION Refer to Chapter 8 for further
SECURITY ISSUES
REGARDING DATA
information on the running of anti-
TRANSFER
malware software. In this section, we
PASSWORDS
OTHER will concentrate on the use of a type of
AUTHENTICATION
METHODS anti-malware software, known as anti-
ANTI
NTI-MALWARE
MALWARE
SOFTWARE
virus software, to protect devices
ELECTRONIC
CONFERENCING
against a potential virus attack.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ANTI-MALWARE SOFTWARE
AND
COMMUNICATION
should be loaded onto a computer
SECURITY ISSUES
REGARDING DATA
TRANSFER should be run to allow all software and
PASSWORDS
OTHER
devices to be scanned for viruses
AUTHENTICATION
METHODS
whenever data or software is
ANTI
NTI-MALWARE
MALWARE
SOFTWARE downloaded or being transferred
ELECTRONIC
CONFERENCING to another device
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ANTI-MALWARE SOFTWARE
AND
COMMUNICATION
SECURITY ISSUES
Running anti-virus
software in the
REGARDING DATA
TRANSFER
PASSWORDS
OTHER
AUTHENTICATION
background on a
METHODS
ANTI
NTI-MALWARE
MALWARE
SOFTWARE
computer will constantly
ELECTRONIC
CONFERENCING check for virus attacks.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
COMMON FEATURES
AND
COMMUNICATION check software or files before they are run or
SECURITY ISSUES
REGARDING DATA
loaded on a computer
TRANSFER
PASSWORDS compare a possible virus against a database
OTHER
AUTHENTICATION
of known viruses
METHODS
ANTI
NTI-MALWARE
MALWARE
SOFTWARE
carry out heuristic checking
ELECTRONIC
CONFERENCING checking of software for types of
behaviour that could indicate a possible
virus; this is useful if software is infected
N M I
TEACHnology by a virus not yet on the database
CHAPTER 4
LESSON 1
NETWORK ISSUES
COMMON FEATURES
AND
COMMUNICATION
possible files or programs which are
SECURITY ISSUES
REGARDING DATA infected are put into quarantine which:
TRANSFER
PASSWORDS
OTHER
- allows the virus to be automatically
AUTHENTICATION
METHODS
deleted, or
ANTI
NTI-MALWARE
MALWARE
SOFTWARE - allows the user to make the decision
ELECTRONIC
CONFERENCING about deletion
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
COMMON FEATURES
AND
COMMUNICATION Anti-virus software needs to be kept up to
SECURITY ISSUES
REGARDING DATA
date because new viruses are constantly
TRANSFER
being discovered.
PASSWORDS
OTHER
AUTHENTICATION
Full system checks need to be carried out
METHODS
ANTI
NTI-MALWARE
MALWARE
once a week because some viruses lie
SOFTWARE
dormant and would only be picked up by this
ELECTRONIC
CONFERENCING full system scan.
N M I
TEACHnology
LESSON 2
NETWORK ISSUES AND 4.2.5
COMMUNICATION
CHAPTER 4
NETWORK AND THE
ELECTRONIC
CONFERENCING
EFFECTS OF USING
THEM
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTRONIC CONFERENCING
AND
COMMUNICATION
This section covers three types of electronic
SECURITY ISSUES
REGARDING DATA conferencing:
TRANSFER
PASSWORDS
OTHER
video conferencing
AUTHENTICATION
METHODS
audio conferencing
ANTI-MALWARE
SOFTWARE
ELECTRONIC
LECTRONIC web conferencing.
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
VIDEO CONFERENCING
AND
COMMUNICATION
a communication method that uses both
SECURITY ISSUES
REGARDING DATA video and sound
TRANSFER
PASSWORDS
OTHER
substitute for face-to-face conferences
AUTHENTICATION
METHODS
between a number of people, who may be
ANTI-MALWARE
SOFTWARE
in a different part of the country or live
ELECTRONIC
LECTRONIC
CONFERENCING
overseas.
carried out in real time and makes use of
N M I
some form of network
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
BASIC HARDWARE
AND
COMMUNICATION
webcams
SECURITY ISSUES
REGARDING DATA
TRANSFER large monitors/television screens
PASSWORDS
OTHER
AUTHENTICATION
microphones
METHODS
ANTI-MALWARE speakers.
SOFTWARE
ELECTRONIC
LECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
THINGS TO CONSIDER
AND
COMMUNICATION agree a time and date for the conference to
SECURITY ISSUES
REGARDING DATA
take place.
TRANSFER
PASSWORDS log into the video-conference system
OTHER
AUTHENTICATION
METHODS
video-conference set-up needs to be checked
ANTI-MALWARE
SOFTWARE
before the meeting goes live
ELECTRONIC
LECTRONIC
CONFERENCING webcams need to be placed in the correct
position so that all the delegates in the room
are within visual contact
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
THINGS TO CONSIDER
AND
COMMUNICATION
microphones need to be placed centrally
SECURITY ISSUES
REGARDING DATA so that all of the delegates can speak
TRANSFER
PASSWORDS
OTHER
assign one main contact person in each
AUTHENTICATION
METHODS
conference room to make sure each
ANTI-MALWARE
SOFTWARE
delegate is able to be heard
ELECTRONIC
LECTRONIC
CONFERENCING
In addition to the hardware items described above,
it is also important to realise that software plays an
important role in a successful video conference.
N M I
TEACHnology
CHAPTER 4
LESSON 1 SOFTWARE IN VIDEO CONFERENCING
NETWORK ISSUES
AND
COMMUNICATION
Webcam and microphone software drivers
SECURITY ISSUES
REGARDING DATA
TRANSFER
It is vital that the correct software is
PASSWORDS
OTHER used to ensure that the webcam and
AUTHENTICATION
METHODS microphone transmit their images and
sound to the other delegates (these are
ANTI-MALWARE
SOFTWARE
ELECTRONIC
LECTRONIC
CONFERENCING sometimes referred to as hardware
drivers).
N M I
TEACHnology
CHAPTER 4
LESSON 1 SOFTWARE IN VIDEO CONFERENCING
NETWORK ISSUES
AND
COMMUNICATION
CODEC
SECURITY ISSUES
REGARDING DATA
TRANSFER CODEC can stand for COder-DECoder or
PASSWORDS COmpression-DECompression
OTHER
AUTHENTICATION
METHODS - used to encode or decode the digital data stream
ANTI-MALWARE to allow data to be transmitted (encoded) and
SOFTWARE
ELECTRONIC
LECTRONIC
played back (decoded)
CONFERENCING
- used to compress the data before it is transmitted
and then decompress it again at the receiving
N M I
conference room
TEACHnology
CHAPTER 4
LESSON 1 SOFTWARE IN VIDEO CONFERENCING
NETWORK ISSUES
AND
COMMUNICATION
Echo cancellation software
SECURITY ISSUES
REGARDING DATA
TRANSFER - allows talking to take place in real time and
PASSWORDS permits the synchronisation of communication.
OTHER
AUTHENTICATION
METHODS - this software copies received signals and checks
ANTI-MALWARE for parts of the signal that reappear but are
SOFTWARE
ELECTRONIC
LECTRONIC
delayed slightly. The reappearing parts are
CONFERENCING
removed from the signal (the echo is removed).
N M I
TEACHnology
CHAPTER 4
LESSON 1 ADVANTAGES OF VIDEO CONFERENCING
NETWORK ISSUES
AND
COMMUNICATION easier to access important documents or bring in
SECURITY ISSUES ‘experts’ at key parts of the conference
REGARDING DATA
TRANSFER
can hold conferences at short notice
PASSWORDS
OTHER
AUTHENTICATION
reduces costs:
METHODS
ANTI-MALWARE travelling costs
SOFTWARE
ELECTRONIC
LECTRONIC hotel accommodation or venue hire
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1 DISADVANTAGES OF VIDEO CONFERENCING
NETWORK ISSUES
AND
COMMUNICATION training people to use the system can be costly and
SECURITY ISSUES time-consuming
REGARDING DATA
TRANSFER
can be demotivating for staff if they believe that one
PASSWORDS
OTHER
of the ‘perks’ of their job is international travel
AUTHENTICATION
METHODS
the whole system relies on a good network
ANTI-MALWARE
SOFTWARE connection
ELECTRONIC
LECTRONIC
CONFERENCING if it breaks down or the signal strength is
diminished in any way, then the video
conference can be almost unusable
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
AUDIO CONFERENCING
AND
COMMUNICATION
refers to meetings held between people
SECURITY ISSUES
REGARDING DATA using audio (sound) equipment.
TRANSFER
PASSWORDS
OTHER
can be done over the standard telephone
AUTHENTICATION
METHODS
network (often referred to as a phone
ANTI-MALWARE
SOFTWARE
conference)
ELECTRONIC
LECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
AUDIO CONFERENCING
AND
COMMUNICATION
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS
OTHER
AUTHENTICATION
METHODS
ANTI-MALWARE
SOFTWARE
ELECTRONIC
LECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PROCEDURE: AUDIO CONFERENCING
AND
COMMUNICATION
1. two PINs are given by the phone
SECURITY ISSUES
REGARDING DATA company to the:
TRANSFER
PASSWORDS
OTHER
a) organisers (personal PIN)
AUTHENTICATION
METHODS
b) participants (participant’s PIN)
ANTI-MALWARE
SOFTWARE
ELECTRONIC
LECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PROCEDURE: AUDIO CONFERENCING
AND
COMMUNICATION
2. The organisers contacts all of the
SECURITY ISSUES
REGARDING DATA participants and informs them of
TRANSFER
PASSWORDS
OTHER
a. their PIN
AUTHENTICATION
METHODS
b. the date
ANTI-MALWARE
SOFTWARE
ELECTRONIC
LECTRONIC c. time of the phone conference.
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PROCEDURE: AUDIO CONFERENCING
AND
COMMUNICATION
3. When the phone conference is about to
SECURITY ISSUES
REGARDING DATA start, the organiser dials the conference
TRANSFER
PASSWORDS phone number and, once they are
OTHER
AUTHENTICATION connected, keys in their personal PIN
METHODS
ANTI-MALWARE
(2151 in this case).
SOFTWARE
ELECTRONIC
LECTRONIC
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PROCEDURE: AUDIO CONFERENCING
AND
COMMUNICATION
4. The participants then call the same
SECURITY ISSUES
REGARDING DATA conference number to join in – once
TRANSFER
PASSWORDS they get through they each input the PIN
OTHER
AUTHENTICATION given to them by the organiser (8422 in
METHODS
ANTI-MALWARE
this case). Without this PIN, it would be
SOFTWARE
ELECTRONIC
LECTRONIC
impossible to join the phone conference.
CONFERENCING
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
AUDIO CONFERENCING USING A COMPUTER
AND
COMMUNICATION
The use of Voice over Internet Protocol
SECURITY ISSUES
REGARDING DATA (VoIP).
TRANSFER
PASSWORDS
OTHER
AUTHENTICATION
METHODS
It is also possible to connect an internet
ANTI-MALWARE
SOFTWARE telephone, which usually plugs into the
ELECTRONIC
LECTRONIC
CONFERENCING router or other internet device.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
AUDIO CONFERENCING USING A COMPUTER
AND
COMMUNICATION
Equipment needed
SECURITY ISSUES
REGARDING DATA
TRANSFER a computer (with built-in
PASSWORDS
OTHER
microphones and speakers)
AUTHENTICATION
METHODS
external microphone and/or speakers
ANTI-MALWARE
SOFTWARE
ELECTRONIC
LECTRONIC an internet phone
CONFERENCING
a standard phone.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
VOIP (VOICE OVER INTERNET PROTOCOL)
AND
COMMUNICATION
allows an organiser to create a group of
SECURITY ISSUES
REGARDING DATA people to take part in the conference call
TRANSFER
PASSWORDS
OTHER
allows communication using voice,
AUTHENTICATION
METHODS
instant messaging and video (by using an
ANTI-MALWARE
SOFTWARE
attached webcam)
ELECTRONIC
LECTRONIC
CONFERENCING allows adding actual telephone numbers
for users with no Internet
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
WEB CONFERENCING
AND
COMMUNICATION
Often referred to as a webinar or webcasts,
SECURITY ISSUES
REGARDING DATA it uses the internet to permit conferencing to
TRANSFER
PASSWORDS take place.
OTHER
AUTHENTICATION
METHODS allows multiple computers (each connected to
ANTI-MALWARE
SOFTWARE the Internet)
ELECTRONIC
LECTRONIC
CONFERENCING
carried out in real time
allows different types of meeting to take place
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
WEB CONFERENCING
AND
COMMUNICATION
Equipment and other tools needed:
SECURITY ISSUES
REGARDING DATA
TRANSFER computer
PASSWORDS
OTHER
AUTHENTICATION
webcam
METHODS
ANTI-MALWARE microphone
SOFTWARE
ELECTRONIC
LECTRONIC
CONFERENCING
speaker
high-speed internet
N M I
TEACHnology
web conferencing app (or website)
CHAPTER 4
LESSON 1
NETWORK ISSUES
MAIN FEATURES
AND
COMMUNICATION
slide presentations can be posted on the
SECURITY ISSUES
REGARDING DATA conference website in advance of the
TRANSFER
PASSWORDS meeting
OTHER
AUTHENTICATION
METHODS
host’s computer screen can be shared for
ANTI-MALWARE
SOFTWARE
live presentations/demonstrations.
ELECTRONIC
LECTRONIC
CONFERENCING delegates can draw or write on a
‘whiteboard’ using their own keyboard or
N M I
mouse
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
MAIN FEATURES
AND
COMMUNICATION
can transmit images or videos using the
SECURITY ISSUES
REGARDING DATA webcam throughout the conference
TRANSFER
PASSWORDS
OTHER
documents can be shared
AUTHENTICATION
METHODS
it is possible to chat verbally or by using
ANTI-MALWARE
SOFTWARE instant messaging throughout the
ELECTRONIC
LECTRONIC
CONFERENCING conference.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
SMART CARDS
AND
COMMUNICATION
By inserting a tag (chip and antenna) into a
security card, it can act as a smart
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS contactless card.
OOTHER
THER that is, it can be read from a
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS The chip can store distance
data such and (ex.
does name,
not have to
ANTI-MALWARE
SOFTWARE security number, date of birth
be swiped and aacard
through PIN).
ELECTRONIC reader be used as a
Smart cards can therefore
CONFERENCING
security device.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
SMART CARDS
AND
COMMUNICATION
By inserting a tag (chip and cards
Smart antenna)
caninto a
security card, it can act as a smart
SECURITY ISSUES
REGARDING DATA
TRANSFER therefore be used as a
PASSWORDS contactless card.
OOTHER
THER
security device.
AAUTHENTICATION
UTHENTICATION
MMETHODS
ETHODS
ANTI-MALWARE
SOFTWARE
The chip can store data
ELECTRONIC
CONFERENCING
(ex. name, security number, date of birth
and a PIN).
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
PHYSICAL TOKENS
AND
COMMUNICATION
a form of authentication in the form of a
physical, solid object.
SECURITY ISSUES
REGARDING DATA
TRANSFER The OTP is shown on a small screen.
PASSWORDS
user’s interaction with a login system
OOTHER
THER
The code changes on a regular basis
AAUTHENTICATION
M
UTHENTICATION
METHODS
ETHODS proves the
anduser’s possession
is usually of for
only valid theless
token
than a
ANTI-MALWARE
SOFTWARE
contain internal
minute. clocks and when a PIN and
ELECTRONIC
CONFERENCING
other authentication details are entered, then
a one-time password (OTP) is generated
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
ELECTORNIC TOKENS
AND
COMMUNICATION
The website server
runs the same software
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS as the app. Once
Because
the OTP and other form of
OOTHER
THER
AAUTHENTICATION
UTHENTICATION both the server and
authentication are verified by the
MMETHODS
ETHODS
ANTI-MALWARE smartphonewebsite,
have the user will be allowed access.
SOFTWARE
ELECTRONIC
synchronised clocks,
they will generate the
CONFERENCING
same numbers.
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
COMMON FEATURES
AND
COMMUNICATION
possible
Thefiles
user or
may programs
know thatwhich areor
the file
SECURITY ISSUES
REGARDING DATA infected are putis into
program quarantine
not infected which:
by a virus – this
TRANSFER
is known as a false positive and is one of
PASSWORDS
OTHER
-the
allows the virus to be automatically
drawbacks of anti-virus software).
AUTHENTICATION
METHODS
deleted, or
ANTI
NTI-MALWARE
MALWARE
SOFTWARE - allows the user to make the decision
ELECTRONIC
CONFERENCING about deletion
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
WEB CONFERENCING
AND
COMMUNICATION
Often referred to as a webinar or webcasts,
SECURITY ISSUES
REGARDING DATA it uses the internet to permit conferencing to
TRANSFER business meetings to discuss new
PASSWORDS take place.
OTHER
ideas
AUTHENTICATION
METHODS allows multiple computers (each connected to
presentations
ANTI-MALWARE
SOFTWARE the Internet)
ELECTRONIC
LECTRONIC
online education or training.
CONFERENCING
carried out in real time
allows different types of meeting to take place
N M I
TEACHnology
CHAPTER 4
LESSON 1
NETWORK ISSUES
AND
COMMUNICATION
SECURITY ISSUES
REGARDING DATA
TRANSFER
PASSWORDS
OTHER
AUTHENTICATION
METHODS
ANTI-MALWARE
SOFTWARE
ELECTRONIC
CONFERENCING
N M I
TEACHnology