Вы находитесь на странице: 1из 44

Chapter 3

Computer Communication
and Security

Chapter 3 Objectives
Communications
and Network
terminology and
applications

Various
communications
devices, media,
and procedures

Type of Computer
Networks

Describe the types


of computernetwork & Internet
security risks

Identify ways to
safeguard against
Network-based
attacks

Techniques to
prevent Network
Attacks

Communications
What are computer communications?

Process in which two or more computers or devices transfer data, instructions, and
information

Communications
What is needed for successful communications?
Sending device
Initiates instruction to transmit data, instructions, or information. Commonly in software
forms
Communications device
Connects the sending device to the communications channel

Communications channel
Media on which data, instructions, or information travel
Communications device
Connects the communications channel to the receiving device
Receiving device

Accepts transmission of data, instructions, or information

Communication Software
What is communications software?
Programs that help users
establish connection to
Internet, other network,
or another computer

Programs that help users


manage transmission of
data, instructions,
and information
Programs that provide an
interface for users to
communicate with one
another

Communication Devices
What are examples of communications
devices?
Common types are [dial-up modems, ISDN & DSL
modems, broadband/cable modems] For
Internet Communication, and [network cards,
wireless access points, routers, and
hub/switches] for General Computer Network
Communications

Communication Devices
What is a modem?

Converts digital signals to analog signals and vice versa


Notebook computers often use PC Card modem

Dial Up Modems

Cable and Wireless Broadband Modems


Faster Internet Connection

Communications Devices
What is a network card?
Adapter card, PC Card, or
compact flash card that
enables computer or
device to access network
Sometimes called network
interface card (NIC)

Communications Devices
What is a wireless access
point?
Central communications
device that allows
computers and devices to
transfer data wirelessly
among themselves or to
wired network

Communications Devices
What is a router?
Connects computers and
transmits data to correct
destination on network
Routers forward data on
Internet using fastest
available path

Communications Devices

Communications Devices
What is a switch/hub?
Device that provides
central point for cables in
network

Communications Channel
What is a channel?
Transmission media on which data travels in
communications system

Transmission media
are materials
capable of carrying
one or more signals

Bandwidth is
amount of data
that can travel
over channel

Transmission Media
Physical
Optical Fiber
Twisted Pair
Cables
Coaxial Cable

Wireless
Communications
Sattelite
Microwave Radio
Cellular Radio (2G,
2,5G, 3G, etc)
Broadcast Radio
(Wi-fi, Bluetooth)
Infrared

Computer Network
What is a network?
Collection of computers
and devices connected
via communications
devices and
transmission
media

Computer Network
What is a local area
network (LAN)?
Network in limited
geographical area such
as home or office
building
Metropolitan area
network (MAN)
connects LANs in city or
town

Computer Network
How to Join a computer into a LAN

IP address is a numerical label assigned to each device


(e.g., computer, printer) participating in a computer
network

Computer Network
What is a wide area
network (WAN)?
Network that covers
large geographic area
using many types of
media
Internet is worlds
largest WAN

Computer Network
What is a client/server
network?
One or more computers act
as server and other
computers, or clients, access
server

Computer Network
What is an Intranet?
Internal network that uses Internet technologies

Makes information accessible to employees


Typically includes connection to Internet

Extranet allows customers or suppliers to access


part of companys intranet

Network Risks & Security

Computer Security Risks


What is a computer security risk?
Action that causes loss of or damage to computer
system
Mostly happened when computer connected into
a network
Easier to access, more unpredictable than attacking
unattended computer

Computer Viruses, Worms, and Trojan Horses

What are viruses, worms, and Trojan horses?


Virus is a potentially
damaging
computer
program

Can spread
and
damage
files

Worm copies
itself repeatedly,
using up
resources
and possibly
shutting down
computer or
network

Trojan horse hides


within
or looks like
legitimate program
until triggered

Does not
replicate
itself on
other
computers

Payload
(destructive
event) that is
delivered when
you open file, run
infected program, or
boot computer with
infected disk
in disk drive

Computer Viruses, Worms, and Trojan Horses

How can a virus spread through an e-mail


message?
Step 1. Unscrupulous

Step 2. They use

programmers create a virus


program. They hide the
virus in a Word document
and attach the Word
document to an e-mail
message.

the Internet to send


the e-mail message
to thousands of
users around the
world.

Step 3a. Some

Step 3b. Other users do not

users open the


attachment and
their computers
become infected
with the virus.

recognize the name of the


sender of the e-mail message.
These users do not open the
e-mail message. Instead they
delete the e-mail message.
These users computers are not
infected with the virus.

Computer Viruses, Worms, and Trojan Horses

What are some tips for preventing virus,


worm, and Trojan horse infections?
Never download or
install suspicious
software from
untrusted sources
If the antivirus
program flags an
e-mail attachment
as infected, delete
the attachment
immediately

Install an antivirus
program on all of your
computers

Check all
downloaded
programs for
viruses, worms,
or Trojan horses

Never open an
e-mail attachment
unless you are
expecting it and
it is from a
trusted source

Install a personal
firewall program

DOS & Backdoor


What is a denial of service (DOS) attack and
back door?
A denial of service attack is an assault which
disrupts computer access to an Internet service
such as the Web or e-mail

A back door is a program or set of instructions


in a program that allow users to bypass
security controls when accessing a computer
resource

Spoofing
What is spoofing?
Makes a
network
or Internet
Transmission appear legitimate

IP spoofing occurs when an intruder


computer fools a network into believing
its IP address is from a trusted source
Perpetrators of IP spoofing trick their
victims into interacting
with a phony Web site

Solutions
Best way to prevent spoofing and DOS is to
build a firewall

Implemented on network or installed on host as


software (personal firewall)

Solutions
What is firewall?
Security system consisting of hardware and/or
software that prevents unauthorized intrusion

Solutions
What is personal firewall?
Program that protects personal computer and its data from
unauthorized intrusions
Monitors transmissions to and from computer
Informs you of attempted intrusion

Unauthorized Access and Use


Unauthorized Access
Use of a computer or network without
permission.
By connecting to it and then logging in as a
legitimate user.
Do not cause damages.
Merely access the data, valuable information or
programs in the computer.
In some manners, can be categorized as
Information theft

Unauthorized Access and Use


Unauthorized Use
Use of a computer or its data for unapproved or
illegal activities.
Ex: gaining access to a bank computer and
performing an unauthorized bank transfer etc.

Solutions
How to prevent unauthorized access and use?
Make a good use of authorization control

Solutions (Cont.)
How to make good passwords?
GOOD

Example:
@k|_|-@n@6-4L4Y
Longer, alay-er, better

NEVER USE IT

Your birth-day
Your mother/dad/lover name
Very predictable words
Plain, not combinated
characters is weak against
brute-force attacks

Solutions (Cont.)
How to prevent unauthorized access and use?
Disable file and printer sharing on Internet connection

File and
printer
sharing
turned off

enable just
when you need it

Solutions (Cont.)
How to make information thief lifes much
harder?
Use encryption
Safeguards against information theft
Process of converting plaintext (readable data) into
ciphertext (unreadable characters)
Use key to generate cipherkey as combinations
To read the data, the recipient must decrypt, or
decipher, the data
See the demonstration

Internet Security Risk


Information Sniffing, How?

H or L can get all sensitive un-encrypted information


passed on network such as username and password

Internet Security Risk


Website phising, How?

Impersonated Login Page

Username,
Passwords,
Credit cards details

https://ib.bankmandiri.co.id/retail/Login.do?action=form

https://ib.bangmandiri.co.id/retail/Login.do?action=form
Username,
Passwords,
Credit cards details

Normal Login Page


Bank Mandiris
Server

Crackers Computer

Internet Security Risk


Website phising commonly
spread using emails and
social media
Best implemented when
combined with social
engineering technique.

Internet Security Risk


Social engineering is an nontechnical, outside hacker's use
of psychological tricks on
legitimate users of a computer
system, in order to gain the
information (usernames and
passwords) one needs to gain
access to the system.
It utilizes two human weakness:
no one wants to be considered
ignorant
human trust

Solutions
Web browsers provide secure data
transmission
Many Web browsers
use encryption

Secure site
Choose Web site that
uses encryption to
secure data
Valid Digital
certificate
Guarantees Web site
is legitimate

Solutions
Provides encryption of
all data that passes
between client and
Internet server
Web addresses
beginning with https
indicate secure
connections

Solutions
Protect yourselves from social engineering
Be educated, aware, and a little bit paranoid.
Never give out:
Usernames / ID numbers
Passwords / PIN numbers
System information
Credit card numbers
Schedules
Other Sensitive data
Be aware of what is being asked

End of Chapter 3

Вам также может понравиться