Академический Документы
Профессиональный Документы
Культура Документы
1
OVERVIEW
• Broadband:
• Computer network
Two or more connected computers
Major components in simple network
• Client and server computers
• Network interfaces (NICs)
• Connection medium
• Network operating system
• Hubs, switches, routers
Software-defined networking (SDN)
• Functions of switches and routers managed by central program
Components of a Simple Computer Network
Illustrated here is a very simple computer network, consisting of computers, a network operating
system residing on a dedicated server computer, cabling (wiring) connecting the devices, network
interface cards (NIC), switches, and a router.
TELECOMMUNICATIONS AND NETWORKING IN TODAY’S
BUSINESS WORLD
Today’s corporate
network infrastructure is
a collection of many
different networks from
the public switched
telephone network, to
the Internet, to corporate
local area networks
linking workgroups,
departments, or office
floors.
TELECOMMUNICATIONS AND NETWORKING IN TODAY’S
BUSINESS WORLD
2. Packet switching
• Method of slicing digital messages into parcels
(packets), sending packets along different
communication paths as they become available,
and then reassembling packets at destination
• Packet switching more efficient use of network’s
communications capacity
Packet-Switched Networks and Packet Communications
Data are grouped into small packets, which are transmitted independently over various
communications channels and reassembled at their final destination.
TELECOMMUNICATIONS AND NETWORKING IN TODAY’S
BUSINESS WORLD
A modem is a device that translates digital signals into analog form (and vice versa) so that
computers can transmit data over analog networks such as telephone and cable networks.
COMMUNICATIONS NETWORKS
The Internet
• World’s most extensive network
• Internet service providers (ISPs)
• Provide connections
Internet addressing and architecture
• Internet protocol (IP) addresses: Every computer on
internet is assigned a unique address
The Domain name system (DNS)
• Converts IP addresses to domain names
• Hierarchical structure
• Top-level domains
The Domain Name System
The Domain Name
System is a hierarchical
system with a root
domain, top-level
domains, second-level
domains, and host
computers at the third
level.
Internet Network Architecture
Client computers running Web browser and other software can access an array of services on
servers over the Internet. These services may all run on a single server or on multiple specialized
servers.
THE GLOBAL INTERNET
The Web
Hypertext Markup Language (HTML)
Hypertext Transfer Protocol (HTTP):
Communications standard used for transferring Web pages
Uniform resource locators (URLs):
Addresses of Web pages
http://www.megacorp.com/content/features/082602.html
Web servers
– Software for locating and managing Web pages
Search engines
• Started as simpler programs using keyword indexes
• Google improved indexing and created page ranking
system
How Google Works
The Google search engine is continuously crawling the Web, indexing the content of each page,
calculating its popularity, and storing the pages so that it can respond quickly to user requests to see
a page. The entire process takes about one-half second.
THE WIRELESS REVOLUTION
RFID (cont.)
• Passive RFID:
• Range is shorter
• Smaller, less expensive
• Powered by radio frequency energy
Common uses:
• Automated toll-collection
• Tracking goods in a supply chain
Requires companies to have special hardware
and software
How RFID Works
RFID uses low-powered radio transmitters to read data stored in a tag at distances ranging from 1 inch
to 100 feet. The reader captures the data from the tag and sends them over a network to a host
computer for processing.
Securing information systems
You’re on LinkedIn? Watch Out!
The architecture of a Web-based application typically includes a Web client, a server, and corporate
information systems linked to databases. Each of these components presents security challenges and
vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any
point in the network.
SYSTEM VULNERABILITY AND ABUSE
Internet vulnerabilities
– Network open to anyone
– Size of Internet means abuses can have wide impact
– Use of fixed Internet addresses with cable / DSL
modems creates fixed targets for hackers
– E-mail, IM
• Interception
• Attachments with malicious software
• Transmitting trade secrets
WI-FI SECURITY CHALLENGES
Malware (cont.)
• Trojan horses
• Software that appears benign but does something other
than expected
• SQL injection attacks
• Hackers submit data to Web forms that exploits site’s
unprotected software and sends rogue SQL query to
database
• Spyware
• Small programs install themselves surreptitiously
on computers to monitor user Web surfing activity
and serve up advertising
SYSTEM VULNERABILITY AND ABUSE
• Phishing
• Setting up fake Web sites or sending e-mail messages
that look like legitimate businesses to ask users for
confidential personal data.
SYSTEM VULNERABILITY AND ABUSE
• Pharming
• Redirects users to a bogus Web page, even when
individual types correct Web page address into his or
her browser
• Click fraud
• Occurs when individual or computer program
deceptively clicks on online ad without any intention
of learning more about the advertiser or making a
purchase
• Cyberterrorism and Cyberwarfare
SYSTEM VULNERABILITY AND ABUSE
• Software vulnerability
– Commercial software contains flaws that create
security vulnerabilities
• Hidden bugs (program code defects)
• Flaws can open networks to intruders
– Patches
• Small pieces of software to repair flaws
• Exploits often created faster than patches can be
released and implemented
BUSINESS VALUE OF SECURITY AND CONTROL
Security policy
• Ranks information risks, identifies acceptable
security goals, and identifies mechanisms for
achieving these goals
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL
MIS audit
• Examines firm’s overall security environment as well as
controls governing individual information systems
• Reviews technologies, procedures, documentation,
training, and personnel.
• May even simulate disaster to test response of
technology, IS staff, other employees
• Lists and ranks all control weaknesses and estimates
probability of their occurrence
• Assesses financial and organizational impact of each
threat
TECHNOLOGIES AND TOOLS FOR PROTECTING INFORMATION
RESOURCES
Firewall:
Combination of hardware and software that prevents
unauthorized users from accessing private networks
TECHNOLOGIES AND TOOLS FOR PROTECTING INFORMATION
RESOURCES