technology in action chapter 7 © 2006 prentice-hall, inc.1 technology in action chapter 7...
TRANSCRIPT
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 1
Technology In ActionTechnology In ActionTechnology In ActionTechnology In Action
Chapter 7Chapter 7
Networking and Security: Connecting Networking and Security: Connecting Computers and Keeping Them Safe from Computers and Keeping Them Safe from
Hackers and VirusesHackers and Viruses
Chapter 7Chapter 7
Networking and Security: Connecting Networking and Security: Connecting Computers and Keeping Them Safe from Computers and Keeping Them Safe from
Hackers and VirusesHackers and Viruses
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 2
Networking FundamentalsNetworking FundamentalsNetworking FundamentalsNetworking Fundamentals
• Computer network:Computer network:– Two or more computers connected togetherTwo or more computers connected together
• Network Designs:Network Designs:– Locally controlled:Locally controlled:
Peer-to-peer (P2P)Peer-to-peer (P2P)
– Centrally controlled:Centrally controlled:Client/serverClient/server
• Describe network based on distanceDescribe network based on distance– LANLAN– WANWAN
• Computer network:Computer network:– Two or more computers connected togetherTwo or more computers connected together
• Network Designs:Network Designs:– Locally controlled:Locally controlled:
Peer-to-peer (P2P)Peer-to-peer (P2P)
– Centrally controlled:Centrally controlled:Client/serverClient/server
• Describe network based on distanceDescribe network based on distance– LANLAN– WANWAN
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 3
Network ComponentsNetwork ComponentsNetwork ComponentsNetwork Components
• Transmission mediaTransmission media– Data transfer rateData transfer rate
• Network adaptersNetwork adapters– Network Interface Cards (NIC)Network Interface Cards (NIC)– External Network AdapterExternal Network Adapter
• Navigation devicesNavigation devices– HubsHubs– RoutersRouters
• Network softwareNetwork software
• Transmission mediaTransmission media– Data transfer rateData transfer rate
• Network adaptersNetwork adapters– Network Interface Cards (NIC)Network Interface Cards (NIC)– External Network AdapterExternal Network Adapter
• Navigation devicesNavigation devices– HubsHubs– RoutersRouters
• Network softwareNetwork software
NEXT SLIDE
Telephone wire:Telephone wire:
TTwiwiststed ed papairir
Coaxial cableCoaxial cableFiber-optic cableFiber-optic cableRadio waves:Radio waves:
WirelessWireless
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 4
Peer-to-Peer NetworksPeer-to-Peer NetworksPeer-to-Peer NetworksPeer-to-Peer Networks
• Types of P2P networksTypes of P2P networks– Power linePower line– Phone linePhone line– EthernetEthernet– WirelessWireless
• Things to consider:Things to consider:– Existing wiringExisting wiring– Wireless or wiredWireless or wired– Speed of the networkSpeed of the network– Cost of the network Cost of the network
• Types of P2P networksTypes of P2P networks– Power linePower line– Phone linePhone line– EthernetEthernet– WirelessWireless
• Things to consider:Things to consider:– Existing wiringExisting wiring– Wireless or wiredWireless or wired– Speed of the networkSpeed of the network– Cost of the network Cost of the network
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 5
Computer ThreatsComputer ThreatsComputer ThreatsComputer Threats
• Cyber-crime, Cyber-criminalCyber-crime, Cyber-criminal• Hackers:Hackers:
– Who they areWho they are– What they doWhat they do
Steal information from computers:Steal information from computers: Internet packet sniffingInternet packet sniffing Commit identity theftCommit identity theft Create widespread computer attacks:Create widespread computer attacks: Denial of service attacksDenial of service attacks
– How they gain accessHow they gain access Direct access:Direct access:
– Hacking software Indirect access:Indirect access:
– Internet connection– Logical ports
• Cyber-crime, Cyber-criminalCyber-crime, Cyber-criminal• Hackers:Hackers:
– Who they areWho they are– What they doWhat they do
Steal information from computers:Steal information from computers: Internet packet sniffingInternet packet sniffing Commit identity theftCommit identity theft Create widespread computer attacks:Create widespread computer attacks: Denial of service attacksDenial of service attacks
– How they gain accessHow they gain access Direct access:Direct access:
– Hacking software Indirect access:Indirect access:
– Internet connection– Logical ports
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 6
MovieMovieMovieMovie
• The Net (1995)http://movieweb.com/movie/thenet
• The Net (1995)http://movieweb.com/movie/thenet
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 7
Computer SafeguardsComputer SafeguardsComputer SafeguardsComputer Safeguards
• Firewalls Firewalls • Viruses and antivirus softwareViruses and antivirus software
• Firewalls Firewalls • Viruses and antivirus softwareViruses and antivirus software
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 8
Firewalls Firewalls Firewalls Firewalls
• Software programs or hardware designed Software programs or hardware designed to close logical ports to invadersto close logical ports to invaders
• Types of firewalls:Types of firewalls:– Norton Personal FirewallNorton Personal Firewall– McAfee FirewallMcAfee Firewall– Zone AlarmZone Alarm– BlackICE PC ProtectionBlackICE PC Protection– Network routersNetwork routers
• Static addressingStatic addressing• Dynamic addressingDynamic addressing
• Software programs or hardware designed Software programs or hardware designed to close logical ports to invadersto close logical ports to invaders
• Types of firewalls:Types of firewalls:– Norton Personal FirewallNorton Personal Firewall– McAfee FirewallMcAfee Firewall– Zone AlarmZone Alarm– BlackICE PC ProtectionBlackICE PC Protection– Network routersNetwork routers
• Static addressingStatic addressing• Dynamic addressingDynamic addressing
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 9
Software firewall downloadSoftware firewall downloadSoftware firewall downloadSoftware firewall download
• ZoneAlarm—http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp?lid=pdb_zal
• Sygate— http://soho.sygate.com/• Norton Personal Firewall—
http://www.symantec.com/sabu/nis/npf/
• ZoneAlarm—http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp?lid=pdb_zal
• Sygate— http://soho.sygate.com/• Norton Personal Firewall—
http://www.symantec.com/sabu/nis/npf/
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 10
Computer VirusesComputer VirusesComputer VirusesComputer Viruses
• A program that attaches itself to another A program that attaches itself to another program and spreads itself to other program and spreads itself to other computerscomputers
• Viruses are hidden within the code of a Viruses are hidden within the code of a host programhost program
• A program that attaches itself to another A program that attaches itself to another program and spreads itself to other program and spreads itself to other computerscomputers
• Viruses are hidden within the code of a Viruses are hidden within the code of a host programhost program
Norton AntiVirus Response Center Web Page
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 11
What Viruses DoWhat Viruses DoWhat Viruses DoWhat Viruses Do
• Replicate themselves:Replicate themselves:– Slow down networksSlow down networks
• Secondary objectives:Secondary objectives:– Annoying messagesAnnoying messages– Delete files on the hard driveDelete files on the hard drive– Change computer settingsChange computer settings
• Replicate themselves:Replicate themselves:– Slow down networksSlow down networks
• Secondary objectives:Secondary objectives:– Annoying messagesAnnoying messages– Delete files on the hard driveDelete files on the hard drive– Change computer settingsChange computer settings
Love Letter – Fastest spreading virus
Melissa – Caused $80 million damage
Nimda – Affected more than 1 million computers
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 12
Types of VirusesTypes of VirusesTypes of VirusesTypes of Viruses• Boot-sector viruses:Boot-sector viruses:
– Replicate themselves in the boot sector of the hard driveReplicate themselves in the boot sector of the hard drive
• Logic bombs:Logic bombs:– Activate when certain conditions are met Activate when certain conditions are met – Michelangelo virusMichelangelo virus
• Worms:Worms:– Travel between systems through networks Travel between systems through networks – Sasser wormSasser worm
• Boot-sector viruses:Boot-sector viruses:– Replicate themselves in the boot sector of the hard driveReplicate themselves in the boot sector of the hard drive
• Logic bombs:Logic bombs:– Activate when certain conditions are met Activate when certain conditions are met – Michelangelo virusMichelangelo virus
• Worms:Worms:– Travel between systems through networks Travel between systems through networks – Sasser wormSasser worm
March 6
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 13
Types of VirusesTypes of VirusesTypes of VirusesTypes of Viruses
• Script viruses:Script viruses:– Hidden on Web pagesHidden on Web pages– Mini programs Mini programs
• Macro viruses:Macro viruses:– Attached to documentsAttached to documents– Series of commandsSeries of commands– Melissa virusMelissa virus
• Trojan horses:Trojan horses:– Backdoor programsBackdoor programs– Control remote computersControl remote computers
• Script viruses:Script viruses:– Hidden on Web pagesHidden on Web pages– Mini programs Mini programs
• Macro viruses:Macro viruses:– Attached to documentsAttached to documents– Series of commandsSeries of commands– Melissa virusMelissa virus
• Trojan horses:Trojan horses:– Backdoor programsBackdoor programs– Control remote computersControl remote computers
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 14
Virus ClassificationsVirus ClassificationsVirus ClassificationsVirus Classifications
• Polymorphic viruses:Polymorphic viruses:– Periodically rewrite themselves to avoid detectionPeriodically rewrite themselves to avoid detection
• Multipartite viruses:Multipartite viruses:– Infect multiple file typesInfect multiple file types
• Stealth viruses:Stealth viruses:– Erase their code from the hard drive and reside in the Erase their code from the hard drive and reside in the
active memoryactive memory
• Polymorphic viruses:Polymorphic viruses:– Periodically rewrite themselves to avoid detectionPeriodically rewrite themselves to avoid detection
• Multipartite viruses:Multipartite viruses:– Infect multiple file typesInfect multiple file types
• Stealth viruses:Stealth viruses:– Erase their code from the hard drive and reside in the Erase their code from the hard drive and reside in the
active memoryactive memory
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 15
Antivirus SoftwareAntivirus SoftwareAntivirus SoftwareAntivirus Software
• Programs designed to detect viruses:Programs designed to detect viruses:– Scan files looking for virus signatures (unique code)Scan files looking for virus signatures (unique code)– Provides options for deleting or fixing infected filesProvides options for deleting or fixing infected files
• Detect known virusesDetect known viruses• Antivirus programs need to be updated Antivirus programs need to be updated
frequentlyfrequently
• Programs designed to detect viruses:Programs designed to detect viruses:– Scan files looking for virus signatures (unique code)Scan files looking for virus signatures (unique code)– Provides options for deleting or fixing infected filesProvides options for deleting or fixing infected files
• Detect known virusesDetect known viruses• Antivirus programs need to be updated Antivirus programs need to be updated
frequentlyfrequently
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 16
Chapter 7 Summary QuestionsChapter 7 Summary QuestionsChapter 7 Summary QuestionsChapter 7 Summary Questions
• What is a firewall and how does it keep my What is a firewall and how does it keep my computer safe from hackers?computer safe from hackers?
• From which types of viruses do I need to From which types of viruses do I need to protect my computer?protect my computer?
• What can I do to protect my computer What can I do to protect my computer from viruses?from viruses?
• What is a firewall and how does it keep my What is a firewall and how does it keep my computer safe from hackers?computer safe from hackers?
• From which types of viruses do I need to From which types of viruses do I need to protect my computer?protect my computer?
• What can I do to protect my computer What can I do to protect my computer from viruses?from viruses?
LAST SLIDE