network problems last week, we talked about 3 disadvantages of networks. what are they?
TRANSCRIPT
![Page 1: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/1.jpg)
Network problems
• Last week, we talked about 3 disadvantages of networks.
• What are they?
![Page 2: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/2.jpg)
Why Not Use Networks?
• The computer is vulnerable to hackers
• If the network breaks, many tasks become very difficult
• Your computer can more easily be attacked by a virus
![Page 3: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/3.jpg)
Network security
• Why would someone want to attack your computer?
![Page 4: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/4.jpg)
Why?
• To access your data
• To use your computer to attack other computers
![Page 5: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/5.jpg)
Accessing your data
• What details could be stolen from you?
• For what purpose could they be used?
![Page 6: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/6.jpg)
Spyware
• Collects personal data
• Collects internet usage history
• Often used for unwanted advertising
![Page 7: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/7.jpg)
Unwanted advertising!
![Page 8: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/8.jpg)
Fraud
• Using your personal data to steal money!
• Credit card details targetted.
![Page 9: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/9.jpg)
Botnet
![Page 10: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/10.jpg)
Storm Botnet
• Estimated: between 200,000 and 1,000,000 computers infected
• Estimated 8% of all malware on Windows
• Used for spam email
• Used to attack international banks
![Page 11: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/11.jpg)
Kraken Botnet
• About 400,000 computers infected
• 50 Fourtune 500 companies infected
• Sends about 9,000,000,000 spam email messages/day
![Page 12: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/12.jpg)
Srizbi Botnet
• Roughly 400,000 infected computers
• Estimated 60,000,000,000 spam emails sent/day
• Nov 2008 – controlling network taken offline– Global spam email decreased 75%
![Page 13: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/13.jpg)
How is a computer attacked?
• What do you know?
![Page 14: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/14.jpg)
How is a computer attacked?
• Port scanning
• Phishing
• Trojan
![Page 15: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/15.jpg)
Port Scanning
• This is an active attack
• A hacker runs a program to find vulnerable spots in the network
• The hacker can then run another program to access your computer
![Page 16: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/16.jpg)
Port Scanning
![Page 17: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/17.jpg)
Port scanning protection
• Firewall
• Updates
![Page 18: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/18.jpg)
Firewall
• A program that checks incoming data
• If it is not from a trusted source, the data is blocked
![Page 19: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/19.jpg)
Updates
• The hacker must find a vulnerable program
• When a vulnerability is found, the company will patch the software
• The patch fixes the vulnerability
• The hacker can’t attack in that way
![Page 20: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/20.jpg)
Phishing
• An attack through email or IM
• A fake link that takes you to a dangerous website
• The website can then run a dangerous program, or collect your information
![Page 21: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/21.jpg)
Phishing Email
![Page 22: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/22.jpg)
Phishing – How to identify
![Page 23: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/23.jpg)
Phishing – how to prevent it
• Read emails and IM’s carefully
• Be suspicious of links
• Run ONE anti-virus program
![Page 24: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/24.jpg)
Trojan
• A program that says it will do something, but does something else.
![Page 25: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/25.jpg)
Sources of trojans
• Email attachments
• A downloaded program (.exe files, like cracks or keygens)
• Dangerous programs on the internet
![Page 26: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/26.jpg)
Trojans – how to prevent!
• Don’t run a program you don’t trust
• Scan suspicious files with an anti-virus tool
• Run Windows as a user, not as administrator
![Page 27: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/27.jpg)
If you have a virus
• Run ONE anti-virus program
• Run anti-spyware and/or anti-adware scans
• Update all programs!
![Page 28: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/28.jpg)
Homework exercise
• Remember, there will be a quiz next week very similar to this exercise.
• If you have questions, ask!
![Page 29: Network problems Last week, we talked about 3 disadvantages of networks. What are they?](https://reader035.vdocuments.site/reader035/viewer/2022062718/56649ebc5503460f94bc469f/html5/thumbnails/29.jpg)
Homework exercise
• Imagine you are the class teacher for your class. You must create a database of your students.
• Create a table in design view containing the fields you think are important. Remember to choose a primary key.
• Add data to the database. You can invent the data, it does not have to be true. Fill in 3 records.