technology in action chapter 7 © 2006 prentice-hall, inc.1 technology in action chapter 7...

16
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc. 1 Technology In Action Technology In Action Chapter 7 Chapter 7 Networking and Security: Connecting Networking and Security: Connecting Computers and Keeping Them Safe from Computers and Keeping Them Safe from Hackers and Viruses Hackers and Viruses NEXT SLIDE

Upload: lindsay-mitchell

Post on 31-Dec-2015

228 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 1

Technology In ActionTechnology In ActionTechnology In ActionTechnology In Action

Chapter 7Chapter 7

Networking and Security: Connecting Networking and Security: Connecting Computers and Keeping Them Safe from Computers and Keeping Them Safe from

Hackers and VirusesHackers and Viruses

Chapter 7Chapter 7

Networking and Security: Connecting Networking and Security: Connecting Computers and Keeping Them Safe from Computers and Keeping Them Safe from

Hackers and VirusesHackers and Viruses

NEXT SLIDE

Page 2: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 2

Networking FundamentalsNetworking FundamentalsNetworking FundamentalsNetworking Fundamentals

• Computer network:Computer network:– Two or more computers connected togetherTwo or more computers connected together

• Network Designs:Network Designs:– Locally controlled:Locally controlled:

Peer-to-peer (P2P)Peer-to-peer (P2P)

– Centrally controlled:Centrally controlled:Client/serverClient/server

• Describe network based on distanceDescribe network based on distance– LANLAN– WANWAN

• Computer network:Computer network:– Two or more computers connected togetherTwo or more computers connected together

• Network Designs:Network Designs:– Locally controlled:Locally controlled:

Peer-to-peer (P2P)Peer-to-peer (P2P)

– Centrally controlled:Centrally controlled:Client/serverClient/server

• Describe network based on distanceDescribe network based on distance– LANLAN– WANWAN

NEXT SLIDE

Page 3: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 3

Network ComponentsNetwork ComponentsNetwork ComponentsNetwork Components

• Transmission mediaTransmission media– Data transfer rateData transfer rate

• Network adaptersNetwork adapters– Network Interface Cards (NIC)Network Interface Cards (NIC)– External Network AdapterExternal Network Adapter

• Navigation devicesNavigation devices– HubsHubs– RoutersRouters

• Network softwareNetwork software

• Transmission mediaTransmission media– Data transfer rateData transfer rate

• Network adaptersNetwork adapters– Network Interface Cards (NIC)Network Interface Cards (NIC)– External Network AdapterExternal Network Adapter

• Navigation devicesNavigation devices– HubsHubs– RoutersRouters

• Network softwareNetwork software

NEXT SLIDE

Telephone wire:Telephone wire:

TTwiwiststed ed papairir

Coaxial cableCoaxial cableFiber-optic cableFiber-optic cableRadio waves:Radio waves:

WirelessWireless

Page 4: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 4

Peer-to-Peer NetworksPeer-to-Peer NetworksPeer-to-Peer NetworksPeer-to-Peer Networks

• Types of P2P networksTypes of P2P networks– Power linePower line– Phone linePhone line– EthernetEthernet– WirelessWireless

• Things to consider:Things to consider:– Existing wiringExisting wiring– Wireless or wiredWireless or wired– Speed of the networkSpeed of the network– Cost of the network Cost of the network

• Types of P2P networksTypes of P2P networks– Power linePower line– Phone linePhone line– EthernetEthernet– WirelessWireless

• Things to consider:Things to consider:– Existing wiringExisting wiring– Wireless or wiredWireless or wired– Speed of the networkSpeed of the network– Cost of the network Cost of the network

Page 5: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 5

Computer ThreatsComputer ThreatsComputer ThreatsComputer Threats

• Cyber-crime, Cyber-criminalCyber-crime, Cyber-criminal• Hackers:Hackers:

– Who they areWho they are– What they doWhat they do

Steal information from computers:Steal information from computers: Internet packet sniffingInternet packet sniffing Commit identity theftCommit identity theft Create widespread computer attacks:Create widespread computer attacks: Denial of service attacksDenial of service attacks

– How they gain accessHow they gain access Direct access:Direct access:

– Hacking software Indirect access:Indirect access:

– Internet connection– Logical ports

• Cyber-crime, Cyber-criminalCyber-crime, Cyber-criminal• Hackers:Hackers:

– Who they areWho they are– What they doWhat they do

Steal information from computers:Steal information from computers: Internet packet sniffingInternet packet sniffing Commit identity theftCommit identity theft Create widespread computer attacks:Create widespread computer attacks: Denial of service attacksDenial of service attacks

– How they gain accessHow they gain access Direct access:Direct access:

– Hacking software Indirect access:Indirect access:

– Internet connection– Logical ports

NEXT SLIDE

Page 6: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 6

MovieMovieMovieMovie

• The Net (1995)http://movieweb.com/movie/thenet

• The Net (1995)http://movieweb.com/movie/thenet

Page 7: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 7

Computer SafeguardsComputer SafeguardsComputer SafeguardsComputer Safeguards

• Firewalls Firewalls • Viruses and antivirus softwareViruses and antivirus software

• Firewalls Firewalls • Viruses and antivirus softwareViruses and antivirus software

NEXT SLIDE

Page 8: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 8

Firewalls Firewalls Firewalls Firewalls

• Software programs or hardware designed Software programs or hardware designed to close logical ports to invadersto close logical ports to invaders

• Types of firewalls:Types of firewalls:– Norton Personal FirewallNorton Personal Firewall– McAfee FirewallMcAfee Firewall– Zone AlarmZone Alarm– BlackICE PC ProtectionBlackICE PC Protection– Network routersNetwork routers

• Static addressingStatic addressing• Dynamic addressingDynamic addressing

• Software programs or hardware designed Software programs or hardware designed to close logical ports to invadersto close logical ports to invaders

• Types of firewalls:Types of firewalls:– Norton Personal FirewallNorton Personal Firewall– McAfee FirewallMcAfee Firewall– Zone AlarmZone Alarm– BlackICE PC ProtectionBlackICE PC Protection– Network routersNetwork routers

• Static addressingStatic addressing• Dynamic addressingDynamic addressing

NEXT SLIDE

Page 9: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 9

Software firewall downloadSoftware firewall downloadSoftware firewall downloadSoftware firewall download

• ZoneAlarm—http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp?lid=pdb_zal

• Sygate— http://soho.sygate.com/• Norton Personal Firewall—

http://www.symantec.com/sabu/nis/npf/

• ZoneAlarm—http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp?lid=pdb_zal

• Sygate— http://soho.sygate.com/• Norton Personal Firewall—

http://www.symantec.com/sabu/nis/npf/

Page 10: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 10

Computer VirusesComputer VirusesComputer VirusesComputer Viruses

• A program that attaches itself to another A program that attaches itself to another program and spreads itself to other program and spreads itself to other computerscomputers

• Viruses are hidden within the code of a Viruses are hidden within the code of a host programhost program

• A program that attaches itself to another A program that attaches itself to another program and spreads itself to other program and spreads itself to other computerscomputers

• Viruses are hidden within the code of a Viruses are hidden within the code of a host programhost program

Norton AntiVirus Response Center Web Page

NEXT SLIDE

Page 11: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 11

What Viruses DoWhat Viruses DoWhat Viruses DoWhat Viruses Do

• Replicate themselves:Replicate themselves:– Slow down networksSlow down networks

• Secondary objectives:Secondary objectives:– Annoying messagesAnnoying messages– Delete files on the hard driveDelete files on the hard drive– Change computer settingsChange computer settings

• Replicate themselves:Replicate themselves:– Slow down networksSlow down networks

• Secondary objectives:Secondary objectives:– Annoying messagesAnnoying messages– Delete files on the hard driveDelete files on the hard drive– Change computer settingsChange computer settings

Love Letter – Fastest spreading virus

Melissa – Caused $80 million damage

Nimda – Affected more than 1 million computers

NEXT SLIDE

Page 12: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 12

Types of VirusesTypes of VirusesTypes of VirusesTypes of Viruses• Boot-sector viruses:Boot-sector viruses:

– Replicate themselves in the boot sector of the hard driveReplicate themselves in the boot sector of the hard drive

• Logic bombs:Logic bombs:– Activate when certain conditions are met Activate when certain conditions are met – Michelangelo virusMichelangelo virus

• Worms:Worms:– Travel between systems through networks Travel between systems through networks – Sasser wormSasser worm

• Boot-sector viruses:Boot-sector viruses:– Replicate themselves in the boot sector of the hard driveReplicate themselves in the boot sector of the hard drive

• Logic bombs:Logic bombs:– Activate when certain conditions are met Activate when certain conditions are met – Michelangelo virusMichelangelo virus

• Worms:Worms:– Travel between systems through networks Travel between systems through networks – Sasser wormSasser worm

March 6

NEXT SLIDE

Page 13: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 13

Types of VirusesTypes of VirusesTypes of VirusesTypes of Viruses

• Script viruses:Script viruses:– Hidden on Web pagesHidden on Web pages– Mini programs Mini programs

• Macro viruses:Macro viruses:– Attached to documentsAttached to documents– Series of commandsSeries of commands– Melissa virusMelissa virus

• Trojan horses:Trojan horses:– Backdoor programsBackdoor programs– Control remote computersControl remote computers

• Script viruses:Script viruses:– Hidden on Web pagesHidden on Web pages– Mini programs Mini programs

• Macro viruses:Macro viruses:– Attached to documentsAttached to documents– Series of commandsSeries of commands– Melissa virusMelissa virus

• Trojan horses:Trojan horses:– Backdoor programsBackdoor programs– Control remote computersControl remote computers

NEXT SLIDE

Page 14: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 14

Virus ClassificationsVirus ClassificationsVirus ClassificationsVirus Classifications

• Polymorphic viruses:Polymorphic viruses:– Periodically rewrite themselves to avoid detectionPeriodically rewrite themselves to avoid detection

• Multipartite viruses:Multipartite viruses:– Infect multiple file typesInfect multiple file types

• Stealth viruses:Stealth viruses:– Erase their code from the hard drive and reside in the Erase their code from the hard drive and reside in the

active memoryactive memory

• Polymorphic viruses:Polymorphic viruses:– Periodically rewrite themselves to avoid detectionPeriodically rewrite themselves to avoid detection

• Multipartite viruses:Multipartite viruses:– Infect multiple file typesInfect multiple file types

• Stealth viruses:Stealth viruses:– Erase their code from the hard drive and reside in the Erase their code from the hard drive and reside in the

active memoryactive memory

NEXT SLIDE

Page 15: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 15

Antivirus SoftwareAntivirus SoftwareAntivirus SoftwareAntivirus Software

• Programs designed to detect viruses:Programs designed to detect viruses:– Scan files looking for virus signatures (unique code)Scan files looking for virus signatures (unique code)– Provides options for deleting or fixing infected filesProvides options for deleting or fixing infected files

• Detect known virusesDetect known viruses• Antivirus programs need to be updated Antivirus programs need to be updated

frequentlyfrequently

• Programs designed to detect viruses:Programs designed to detect viruses:– Scan files looking for virus signatures (unique code)Scan files looking for virus signatures (unique code)– Provides options for deleting or fixing infected filesProvides options for deleting or fixing infected files

• Detect known virusesDetect known viruses• Antivirus programs need to be updated Antivirus programs need to be updated

frequentlyfrequently

NEXT SLIDE

Page 16: Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them

Technology In Action Chapter 7

© 2006 Prentice-Hall, Inc. 16

Chapter 7 Summary QuestionsChapter 7 Summary QuestionsChapter 7 Summary QuestionsChapter 7 Summary Questions

• What is a firewall and how does it keep my What is a firewall and how does it keep my computer safe from hackers?computer safe from hackers?

• From which types of viruses do I need to From which types of viruses do I need to protect my computer?protect my computer?

• What can I do to protect my computer What can I do to protect my computer from viruses?from viruses?

• What is a firewall and how does it keep my What is a firewall and how does it keep my computer safe from hackers?computer safe from hackers?

• From which types of viruses do I need to From which types of viruses do I need to protect my computer?protect my computer?

• What can I do to protect my computer What can I do to protect my computer from viruses?from viruses?

LAST SLIDE