Communications, Networks, & Cyberthreats: Presented by Satriyo Adhy

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 75

Communications,

Networks, &
Cyberthreats
presented by
Satriyo Adhy

Chapter 6
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter Topics

UNIT6A:
UNIT 6A:Networks
Networks&&Wired
Wired&&Wireless
WirelessData
Data
6.1 From
6.1 Fromthe
theAnalog
Analogtotothe
theDigital
DigitalAge
Age
Introduction to Information Technology

6.2 Networks
6.2 Networks
6.3 Wired Communications
6.3 Wired Communications Data Data
6.4 Wireless
6.4 WirelessCommunications
CommunicationsMedia
Media
UNIT6B:
UNIT 6B:Cyberthreats,
Cyberthreats,Security,
Security,&&Privacy
PrivacyIssues
Issues
6.5
6.5 Cyberintruders:Trolls,
Cyberintruders: Trolls,Spies,
Spies,Hackers,
Hackers,&&Thieves
Thieves
6.6
6.6 Cyberattacks&&Malware
Cyberattacks Malware
6.7 Concerns
6.7 Concernsabout
aboutPrivacy
Privacy&&Identity
IdentityTheft
Theft 2
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Digital convergence is the gradual merger of computing and
communications into a new information environment, in
which the same information is exchanged among many kinds
Introduction to Information Technology

of equipment, using the language of computers.


• At the same time, there has been a convergence of several
important industries—computers, telecommunications, consumer
electronics, entertainment, mass media— producing new
electronic products that perform multiple functions.

3
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
6.1 From the Analog
Introduction to Information Technology

to the Digital Age

4
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Digital
• Computers use digital signals—0s and 1s, off and on.
• All the data that a computer processes is a series of
0s and 1s.
Introduction to Information Technology

• Each signal is a bit.


Analog
• But most phenomena in life are analog.
• Analog signals use wave variations, continuously changing.
• Sound, light, and temperature are analog forms.
• Traditional TV and radio use analog signals.
• Humans’ vision operates in analog mode.

But analog data can be converted into digital form. Even though digital data is not as exact
as analog data, it is easier to manipulate. 5
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• For data transmission over telephone lines and cables, modems
are needed to convert analog data into digital data that computers
can use.
Introduction to Information Technology

• Modem is short for modulate/demodulate. Modems modulate


(convert) a computer’s digital data to analog data, transmit it, then
demodulate (reconvert) it back to digital data for the receiving
computer.
• Modems can convert data by modulating either a analog wave’s
amplitude or its frequency.

6
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology

7
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology

6.2 Networks

8
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Network: system of interconnected computers, telephones, and/or
other communications devices that can communicate with one
another and share applications and data.
Introduction to Information Technology

• Benefits of Networks
• Share peripheral devices, such as printers, scanners, disk drives
• Share software
• Share data and information
• Better communications
• Accessing databases
• Centralized communications
• Security of information, because of improved backup systems 9
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Types of networks: WANs, MANs, & Others
•Wide area network (WAN): Communications network that covers a wide geographic
area, such as a country or the world. Most long-distance and regional telephone
Introduction to Information Technology

companies are WANs. WANs are used to connect local area networks. The best example
of a WAN is the Internet.
•Metropolitan area network (MAN): Communications network covering a city or a
suburb. Many cellphone systems are MANs.
•Local area network (LAN): Connects computers and devices in a limited geographic
area, such as one office, one building, or a group of buildings close together. LANs are
the basis for most office networks, and the organization that runs the LAN owns it. WANs
and MANs generally use a common carrier—a telecommunications company that hires
itself out to the public to provide communications transmission services—for at least part
of its connections. (A home area network is a LAN.)
(continued) 10
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UPDATE
Introduction to Information Technology

11
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Network Architecture: How Networks Are Structured
1. Client/Server
• Consists of clients, which are computers that request data, and servers, which
Introduction to Information Technology

are computers that supply data.


• File servers act like a network-based shared disk drive.
• Database servers store data but don’t store programs.
• Print servers connect one or more printers and schedule and control print jobs.
• Mail servers manage email.
2. Peer-to-Peer (P2P)
• All computers on the network are “equal” and communicate directly with
one another, without relying on servers.

12
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology

13
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Intranets, Extranets, & VPNs: Use the Internet as their base
• Intranets—use infrastructure and standards of the Internet and the web, but
for an organization’s internal use only.
Introduction to Information Technology

• Extranets—similar to intranets but allows use by selected outside entities,


such as suppliers.
• VPNs (virtual private networks): use a public network (usually the Internet)
plus intranets and extranets to connect an organization’s various sites) but
on a private basis, via encryption and authentication; regular Internet users
do not have access to the VPN’s data and information.
All use firewalls for security, a system of hardware and/or software that
protects the system from intruders.
14
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Network Components — all networks have several things in
common:
• wired = twisted-pair, coaxial cable, fiber-optic cable
Introduction to Information Technology

• wireless = infrared, microwave, radio, Wi-Fi, satellite


• Hosts and Nodes: Client/server network has a host computer, which
controls the network; a node is any device attached to the network.
• Packets—fixed-length blocks of data for transmission, reassembled after
transmission.
• Protocols—set of conventions, or rules, governing the exchange of data
between hardware and/or software components in the network; built into
the hardware or software you are using. (continued)
15
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• The protocol in your communications software specifies how receiver devices
will acknowledge sending devices, a matter called handshaking. Handshaking
establishes the fact that the circuit is available and operational. It also
Introduction to Information Technology

establishes the level of device compatibility and the speed of transmission.


• In addition, protocols specify the type of electronic connections used, the
timing of message exchanges, and error-detection techniques.
• Each packet, or electronic message, carries four types of information that will
help it get to its destination;
1. the sender’s address (IP)
2. the intended receiver’s address
3. how many packets the complete message has been broken into
4. the number of this particular packet. The packets carry the data in the protocols that the
Internet uses—that is, TCP/IP
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Network linking devices:
• Switch—Device that connects computers to a network; sends only to intended
recipients; operates back and forth at the same time.
Introduction to Information Technology

• Bridge—Interface device that connects same type of networks.


• Gateway—Interface device that connects dissimilar networks.
• Router—Device that directs messages among several networks, wired or
and/or wireless.
• Backbone—Main Internet highway that connects all networks in an
organization; includes switches, gateways, routers, etc.
• NIC (Network interface card)—inserted in a slot on the motherboard, enables
computer to operate as part of a network.
• NOS (network operating system)—the system software that manages network
activity. 17
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology

18
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Network topology: The layout (shape) of a network
• Star – all nodes are connected through a central network switch
Introduction to Information Technology

• Ring – all nodes are connected in a continuous loop


• Bus – all nodes are connected to a single wire or cable
• Tree – a bus network of star networks
• Mesh – messages sent to the destination can take any possible shortest,
easiest route to reach its destination. There must be at least two paths to
any individual computer to create a mesh network. (Wireless networks
are often implemented as a mesh, and the Internet is a mesh.)

19
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Star
Network
Introduction to Information Technology

21
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Ring
Introduction to Information Technology

Network

22
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology

Bus
Network

23
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Ethernet
• Network standard for linking all devices in a local area network
that describes how data can be sent between computers and other
Introduction to Information Technology

networked devices usually in close proximity.


• Ethernet deals with LAN collisions; Ethernet is a LAN technology that
can be used with almost any kind of computer and that describes how
data can be sent between computers and other networked devices usually
in close proximity.
• The Ethernet communications protocol is embedded in software and
hardware devices intended for building a local area network (LAN), and
it is commonly used in star topologies.
26
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
6.3 Wired Communications
Introduction to Information Technology

Media

27
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Communications media are the means of interchanging or
transmitting and receiving information.
• Twisted-Pair Wire (dial-up connections)
Introduction to Information Technology

• 2 strands of insulated copper wire twisted around each other


• Twisting reduces interference (crosstalk) from electrical signals
• Data rates are 1 – 128 megabits per second (slow)
• Coaxial Cable
• Insulated copper wire wrapped in a metal shield and then in an external plastic
cover
• Used for cable TV and cable Internet electric signals
• Carries voice and data up to 200 megabits per second

28
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Fiber-optic cable
• Dozens or hundreds of thin strands of glass or plastic that transmit pulses of light,
Introduction to Information Technology

not electricity
• Can transmit up to 2 gigabits per second (very fast)
• Have lower error rate than twisted-pair or coax
• More expensive than twisted-pair or coax
• Lighter and more durable than twisted-pair or coax
• More difficult to tap into than twisted-pair or coax

29
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Wired connections media for the home:
• Ethernet
• Connect to PC’s Ethernet network interface card (NIC)
Introduction to Information Technology

• For several PCs, get a switch to connect them all


• 10 or 100 megabits per second
• HomePNA
• Uses existing telephone wiring and jacks
• Requires HomePNA NIC in your PC
• Speeds of about 320 megabits per second
• Homeplug
• Uses existing home electrical lines
• Speeds of 200 megabits per second

30
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
6.4 Wireless
Introduction to Information Technology

Communications Media

31
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Electromagnetic spectrum of radiation is the basis of all
telecommunications signals, wired and wireless.
Introduction to Information Technology

• Radio-frequency (RF) spectrum is the


part of the electromagnetic spectrum
that carries most communications
signals.

32
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology

(continued) 33
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology

34
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Bandwidth: range (band) of frequencies that a transmission
medium can carry in a given period of time
Introduction to Information Technology

• Analog bandwidth is expressed in hertz, digital bandwidth usually in bits


per second (bps)
• Narrowband (voiceband): used for regular telephone communications
• Transmission rate 1.5 megabits per second or less
• Broadband: For high-speed data and high-quality audio and video; wide
band of frequencies
• Transmission rate 1.5 megabits per second to 1 gigabit per second or more

35
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• TC/IP (Ch. 2) is the protocol for getting wired devices connected to the
Internet
• WAP (wireless application protocol): Wireless handheld devices such
Introduction to Information Technology

as cellphones use the Wireless Application Protocol for connecting


wireless users to the Web. Just as the protocol TCP/IP was designed to
provide a wired connection to your Internet access provider, WAP is a
standard designed to link nearly all mobile devices telecommunications
carriers’ wireless networks and content providers.

36
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Five Types of Wireless Communications Media
• Infrared Transmission
• Sends signals using infrared light (TV remotes)
Introduction to Information Technology

• Frequencies are too low to see (1-16 megabits per second)


• Broadcast Radio
• AM/FM, CB, ham, cellphones, police radio
• Sends data over long distances using a transmitter and a receiver (up to 2 megabits
per second)
• Cellular Radio
• Form of broadcast radio
• Widely used in cellphones and wireless modems
• Transmits voice and digital messages
37
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Five Types of Wireless Communications Media (continued)
• Microwave Radio
• Superhigh-frequency radio transmit voice and data at 45 megabits per second
Introduction to Information Technology

• Requires line-of-sight transmitters and receivers


• More than ½ of today’s telephones systems use microwave
• Communications Satellites
• Microwave relay stations in orbit around the earth
• Basis for Global Positioning Systems (GPS)
• Cover broad service area

(continued)

38
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Communications Satellites (continued)
• Can be placed at different heights: GEO, MEO, LEO
• GEO – geostationary earth orbit
Introduction to Information Technology

• 22,300 miles above earth; travel at the same speed as the earth and so appear to us to be
stationary
• Always above equator
• Transmission delay (latency) can make conversations difficult; not good for applications
requiring real-time user input
• MEO – medium-earth orbit
• 5,000 – 10,000 miles up
• LEO – low-earth orbit
• 200 – 1,000 miles up
• Has no signal delay

39
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Long-Distance Wireless: One-Way Communication
• GPS (Global Positioning System)
• 24 to 32 MEO satellites continuously transmitting timed radio signals to identify
Introduction to Information Technology

Earth locations
• Each satellite circles earth twice each day at 11,000 miles up
• GPS receivers pick up transmissions from up to 4 satellites and pinpoint the
receiver’s location
• Accurate within 3 – 50 feet, with a norm of 10 feet accuracy
• Not all services based on GPS technology are reliable

40
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
GPS
Introduction to Information Technology

41
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Long-Distance Wireless: One-Way Communication (continued)
• One-way Pagers: radio receivers that receive data sent from a special
radio transmitter
Introduction to Information Technology

• Radio transmitter sends out signals over the special frequency; pagers are
tuned to that frequency
• When a particular pager hears its own code, it receives and displays the
message
• Often used in hospitals and areas where smartphones are not allowed

42
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Long-Distance Wireless: Two-Way Communication
• 1G: First-Generation Cellular Service
• Analog cellphones
Introduction to Information Technology

• Designed for voice communication using a system of hexagonal ground-


area cells around transmitter-receiver cell towers
• Good for voice – less effective for data because of handing off
• 2G: Second-Generation Cellular Service
• Uses digital signals
• First digital voice cellular network

43
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Long-Distance Wireless: Two-Way Communication (continued)
• 3G: Third-Generation Cellular Service
• Broadband technology
Introduction to Information Technology

• Carries data at high speeds: 144 kilobits per second up to 3.1 megabits per
second
• Accepts e-mail with attachments
• Displays color video and still pictures
• Plays music

44
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Long-Distance Wireless: Two-Way Communication (continued)
• 4G: Fourth-Generation Cellular Service
• A nationwide 4G network is in development; up to 100 megabits/second
Introduction to Information Technology

• Enables faster Internet surfing


• Includes LTE (Long Term Evolution), an international standard widely
adopted in the United States and several countries in Europe and Asia.
LTE supports data transfer rates of up to 100 megabits per second over
cellular networks.

45
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cellphone
Connections
Introduction to Information Technology

46
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Short-Range Wireless: Two-Way Communication
• Local Area Networks
• Range 100 – 228 feet
Introduction to Information Technology

• Include Wi-Fi (802.11) type networks


• Wi-Fi n is the latest and fastest Wi-Fi technology
• Personal Area Networks
• Range 30 – 33 feet
• Use Bluetooth, ultra wideband, and wireless USB
• Home Automation networks
• Range 100 – 150 feet
• Use Insteon, ZigBee, and Z-Wave standards
47
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Two-Way Communication
Short-Range Wireless: Wi-Fi b, a, g, & n for local area networks (LANs)
• Named for variations on the IEEE 802.11 standard
Introduction to Information Technology

• Data ranges: 11 megabits per second up to 228 feet


• Wireless devices must use the same communications standard to communicate. Many
products conform to the 802.11a, 802.11b, 802.11g, or 802.11n wireless standards. People
have Wi-Fi networks in their homes, and go online through wireless hot spots at cafes and
other establishments, including airports and hotels.
• Be sure the Wi-Fi connection is secure against cyberspying. Also, Wi-Fi connections can
be made without your knowledge, so disable your Wi-Fi software, instead of leaving it on
to auto connect, whenever you’re not using it. This can keep you from unknowingly
connecting to a fraudulent network.
• Use cellphone security software!
• WiMax is similar to Wi-Fi but has a greater range (10 – 30 miles). 48
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Wi-Fi setup in a
restaurant
Introduction to Information Technology

49
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
General Wi-Fi
Network
Introduction to Information Technology

50
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Short-Range Wireless: Two-Way Communication (continued)
• Personal Area Wireless
• Bluetooth
Introduction to Information Technology

• Short-range wireless standard to link cellphones, computers, and peripherals at


distances usually up to 33 ft.
• Often used with headsets
• Transmits up to 24 Mbps per second
• When Bluetooth devices come into range of each other, they negotiate. If they
have information to exchange, they form a temporary wireless network.

51
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Short-Range Wireless: Two-Way Communication (continued)
• Personal Area Wireless (continued)
• Ultra Wideband (UWB)
Introduction to Information Technology

• Operates in 480 megabits - 1.6 gigabits per second, range up to 30 ft.


• Uses a low power source to send out millions of bursts of radio waves each
second
• Wireless USB
• USB is the most used interface on PCs
• Range of 32 ft. and maximum data rate of 110 - 480 megabits per second; used
in game controllers, printers, scanners, digital cameras, MP3 players, hard
disks, and flash drives

52
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Short-Range Wireless: Two-Way Communication (continued)
• Short-Range Wireless for Home
• Insteon
Introduction to Information Technology

• Combines electronic power line and wireless technology


• Can send data at 13.1 kilobits per second with 150 ft. range
• ZigBee
• Entirely wireless sensor technology
• Can send data at 128 kilobits per second with 250 ft. range
• Z-Wave
• Entirely wireless power-efficient technology
• Can send data at 127 kilobits per second to range of 100 ft.

53
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UNIT 6B: Cyberthreats: Trolls, Spies, & Hackers & Thieves

The ongoing dilemma of the Digital Age is balancing convenience against


Introduction to Information Technology

security.

• Security consists of safeguards for protecting information technology


against unauthorized access, system failures, and disasters that can result
in damage or loss.

54
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology

6.5 Cyberintruders
Trolls, Spies, Hackers, & Thieves

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Trolls aren’t necessarily destructive, but they can be disruptive
on online comment boards. A troll is a person who posts
intentionally offensive, incendiary, or off-topic comments
Introduction to Information Technology

online, to upset people.


• Many companies have extensive data-collection efforts that
constantly track (spy on) our personal activities.

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Malicious hackers break into computers for malicious purposes.

• Script kiddies are technically unsophisticated teenagers who use downloadable software for
perform break-ins.
Introduction to Information Technology

• Hacktivists are hacker activists who break into systems for a political or a socially motivated
purpose.
• Black-hat hackers break into computers to steal or destroy information or to use it for illegal
profit.
• Cyberterrorists attack computer systems so as to bring physical, political or financial harm to
groups, companies, or nations.
• Benign hackers (thrill-seeker hackers) illegally access computer systems simply for the
challenge of it, not to damage or steal anything; their reward is the achievement of breaking
in.
• Benevolent hackers (ethical hackers or white-hat hackers) are usually computer professionals
who break into computer systems and networks with the knowledge of their owners to expose
security flaws that can then be fixed. 57
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Thieves may be a company’s employees or suppliers or
professionals.
Introduction to Information Technology

• Employees
• Outside partners & suppliers
• Hardware thieves
• Con artists, scammers, & counterfeiters

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
6.6 Cyberattacks &
Introduction to Information Technology

Malware

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Networks and computer systems are susceptible to attacks by all kinds of
malware.
Introduction to Information Technology

• Some common cyberthreats are denial-of-service attacks; viruses; worms;


Trojan horses; rootkits and backdoors; blended threats; zombies;
ransomware; and time, logic, and email bombs.

60
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cyberthreats:
• Denial of Service Attack
Introduction to Information Technology

• Consists of making repeated requests of a computer or network device, thereby


overloading it and denying access to legitimate users.
• Used to target particular companies or individuals.
• Virus
• Deviant program that hides in a file or a program on a disk, flash memory drive, in
an e-mail, or in a web link and that causes unexpected effects such as destroying or
corrupting data.
• Usually attached to an executable file that you must run or open (to activate the
virus).

61
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cyberthreats (continued)
• Worms
• A program that copies itself repeatedly into a computer’s memory or disk
Introduction to Information Technology

drive.
• May copy itself so much it crashes the infected computer.
• Trojan Horses
• Programs that pretend to be a useful program such as a free game or a
screensaver but that carry viruses or malicious instructions that damage your
computer or install a backdoor or spyware.
• Backdoors and spyware allow others to access your computer without your
knowledge.
62
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cyberthreats (continued)
• Rootkits
• In many computer operating systems, the “root” is an account for system
Introduction to Information Technology

administration. A “kit” is the malware secretly introduced into the computer. A rootkit
gives an attacker “super powers” over computers—for example, the ability to steal
sensitive personal information.
• Blended Threats
• A blended threat is a more sophisticated attack that bundles some of the worst aspects
of viruses, worms, Trojan horses, and other malware into one single threat. Blended
threats can use server and Internet vulnerabilities to initiate, then transmit and also
spread an attack. Blended threats are designed to use multiple modes of transport—
email, flash drives, networks, and so on.

63
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cyberthreats (continued)
• Zombies & Bots
• A botmaster uses malware to hijack hundreds to many thousands of computers and is
Introduction to Information Technology

able to remotely control them all, including the ability to update the malware and to
introduce other programs such as spyware. Hijacked computers are called zombies.
• A botnet (robot network) is a network of computers in which each computer has
been implanted with instructions to wait for commands from the person controlling
the botnet.
• Ransomeware
• A botnet may be used to install ransomeware, which holds the data on a computer or
the use of the computer hostage until a payment is made. Ransomware encrypts the
target’s files, and the attacker tells the victim to make a payment of a specified
amount to a special account to receive the decryption key.
64
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Time, Logic, & Email Bombs: A time bomb is malware programmed to “go off” at
a particular time or date. A logic bomb is “detonated” when a specific event occurs
—for example, all personnel records are erased when an electronic notation is made
that a particular person was fired. Email bombs overwhelm a person’s email account
Introduction to Information Technology

by surreptitiously subscribing it to dozens or even hundreds of mailing lists.


• Phone Malware: Worms and viruses and other malware are attacking smartphones.
The most common type of cellphone infection occurs when a cellphone downloads
an infected file from a PC or the Internet, but phone-to-phone viruses are also on the
rise.
• Infected files usually show up disguised as applications such as games, security patches, add-
on functionalities, and free stuff. Future possibilities include cellphone spyware—so someone
can see every number you call and listen to your conversations—and viruses that steal
financial information, which will become more serious as smartphones are used as common
payment devices.

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cyberthreats (continued)
• Cellphone Malware
• Spread via Internet downloads, MMS attachments, and Bluetooth transfers
Introduction to Information Technology

• Usually show up disguised as applications such as games, security patches, add-on


functionalities, erotica, and free programs
• Protect your phone:
• Turn off Bluetooth discoverable mode
• Check security updates to learn about filenames to watch out for
• Install security software

66
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cyberthreats (continued)
• How they spread

Introduction to Information Technology

Via e-mail attachments


• By infected disks and flash drives
• By clicking on infiltrated websites
• By downloading infected files from websites
• Through infiltrated Wi-Fi hotspots
• From one infected PC on a LAN to another
• What can you do about it?
• Install antivirus and firewall software
and subscribe to the manufacturer’s automatic antivirus
update service
67
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Online Safety
• Use antivirus software, and keep it current
• Install a firewall to monitor network traffic and filter out undesirable types of
Introduction to Information Technology

traffic and undesirable sites


• Don’t use the same password for multiple sites
• Don’t give out any password information
• Use robust passwords:
• Minimum 8 characters with letters, numbers, characters
• 4cats is not a good password; f0UrK@tTz is safer
• Use biometric identification
• Use encryption

68
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Online Safety (continued)
• Install antispyware software
• Encrypt financial and personal records so only you can read them
Introduction to Information Technology

• Back up your data, so if your PC is attacked and must be reformatted,


you can restore your data
• Never download from a website you don’t trust
• Consider biometric authentication

69
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Online Safety (continued)
• Encryption
• Process of altering readable data into unreadable form to prevent unauthorized
Introduction to Information Technology

access
• Uses powerful mathematical ciphers to create coded messages that are difficult to break
• Unencrypted messages are known as plain text
• Encrypted text is known as cybertext
• You use an encryption key to encrypt and decrypt codded messages

70
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
6.7 Concerns about Privacy
Introduction to Information Technology

& Identity Theft

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• The proliferation of networks and databases have put privacy
under great pressure.
Introduction to Information Technology

• Privacy is the right of people not to reveal information about


themselves.
• Some threats to privacy:
• Name migration
• Résumé rustling & online snooping
• Government prying & spying

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Identity (ID) theft, or theft of identity (TOI), is a crime in
which thieves hijack your name and identity and use your
information and credit rating to get cash or buy things.
Introduction to Information Technology

• Wallet or purse theft


• Mail theft
• Mining the trash
• Telephone solicitation
• Insider access to database
• Outsider access to database

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• If ID theft happens, contact:
• Credit card companies
Introduction to Information Technology

• Your bank
• Department of Automotive Vehicles
• Utility companies
• Phone companies
• Local police
• Federal Trade Commission
• Other organizations you belong to

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

You might also like