1 Computer Network 2 Computer Network A Computer

  • Slides: 34
Download presentation
1

1

Computer Network 2

Computer Network 2

Computer Network A Computer Network is a communication system that connect tow or more

Computer Network A Computer Network is a communication system that connect tow or more computers so they can exchange information and share resources. the most well-known computer network is the Internet. 3

Benefits of Computer Networks 4

Benefits of Computer Networks 4

Benefits of Computer Networks § Exchanging Information §Sharing of resources: • Software • hardware

Benefits of Computer Networks § Exchanging Information §Sharing of resources: • Software • hardware 7

CLASSIFICATION OF NETWORKS: Computer networks are classified into different types, based on the following:

CLASSIFICATION OF NETWORKS: Computer networks are classified into different types, based on the following: §According to the network's Transport Media (Wired and Wireless) §According to the network's Geographical Area (PAN, LAN, MAN and WAN) §According to the network's Management System (Peer to Peer, Client – Server) 8

Types Of Networks According to Transport Media §Wired Networks §Wireless Networks 9

Types Of Networks According to Transport Media §Wired Networks §Wireless Networks 9

CLASSIFICATION OF NETWORKS: Computer networks are classified into different types, based on the following:

CLASSIFICATION OF NETWORKS: Computer networks are classified into different types, based on the following: §According to the network's Transport Media (Wired and Wireless) §According to the network's Geographical Area (PAN, LAN, MAN and WAN) §According to the network's Management System (Peer to Peer, Client – Server) 10

Types Of Networks According to Geographical Area: §personal area network (PAN) 11

Types Of Networks According to Geographical Area: §personal area network (PAN) 11

Types Of Networks According to Geographical Area: §Local Area Network (LAN) A local area

Types Of Networks According to Geographical Area: §Local Area Network (LAN) A local area network (LAN) is a computers network that interconnects computers within a limited area such as school, university or office building. LAN can span over a limited distance up to one mile. 12

Types Of Networks According to Geographical Area: §Metropolitan Area Network (MAN) These networks are

Types Of Networks According to Geographical Area: §Metropolitan Area Network (MAN) These networks are considered larger than LAN as they connect several LANs in the same city and are usually used to connect organizations, companies, banks and government agencies. MAN can span over a distance up to 100 miles 13

Types Of Networks According to Geographical Area: §Wide Area Network (WAN) Wide area network

Types Of Networks According to Geographical Area: §Wide Area Network (WAN) Wide area network (WAN) is a countrywide or worldwide network, which covers distances greater than 100 miles. It uses microwave relays and satellites to reach users over long distances. The widest of all WANs is the Internet, which spans the entire globe. 14

CLASSIFICATION OF NETWORKS: Computer networks are classified into different types, based on the following:

CLASSIFICATION OF NETWORKS: Computer networks are classified into different types, based on the following: §According to the network's Transport Media (Wired and Wireless) §According to the network's Geographical Area (PAN, LAN, MAN and WAN) §According to the network's Management System (Peer to Peer, Client – Server) 15

Types Of Networks According to the network's Management System • Client-Server Network 16

Types Of Networks According to the network's Management System • Client-Server Network 16

17

17

Types Of Networks According to the network's Management System • Client-Server Network Client-server network

Types Of Networks According to the network's Management System • Client-Server Network Client-server network systems use one computer (server) to coordinate and supply services to other computers (clients) in the network. The server provides access to resources such as web pages, databases, application software, and hardware. 18

Types Of Networks According to the network's Management System Peer-to-Peer Network 19

Types Of Networks According to the network's Management System Peer-to-Peer Network 19

Types Of Networks According to the network's Management System Peer-to-Peer Network A peer-to-peer network

Types Of Networks According to the network's Management System Peer-to-Peer Network A peer-to-peer network system doesn't have a central computer (server). All nodes have equal authority and can act both as clients and servers. For example, when a file passes through many computers on a network, these computers act as both server and client. 20

Internet is a huge network of computer networks. The Internet can be termed as

Internet is a huge network of computer networks. The Internet can be termed as a network of networks. The Internet is the global network system of private, public, academic, business and government networks. 21

USES OF THE INTERNET §AS A SOURCE OF INFORMATION §SHOPPING §ENTERTAINMENT §Education §communication 22

USES OF THE INTERNET §AS A SOURCE OF INFORMATION §SHOPPING §ENTERTAINMENT §Education §communication 22

INFORMATION SECURITY 23

INFORMATION SECURITY 23

The password: A Password is a set of characters used to get access to

The password: A Password is a set of characters used to get access to a computer, web page, network resource or data TIPS FOR CREATING PASSWORDS Creating a strong password is the responsibility of the owner. Below are the recommendations for creating a strong password: • The password should be difficult to guess. • The password should not be less than the length of 8 characters. • The password should contain a mixture of numbers, characters • The password should not contain the user's name. • The password should not contain the user's personal information, as name, street address, phone number, date of birth etc. 24

The password: TIPS FOR THE USE OF PASSWORD • Do not share your passwords

The password: TIPS FOR THE USE OF PASSWORD • Do not share your passwords with others. • Do not use the same password everywhere such as e-mail, bank account … • Do not keep a written record of passwords on a paper or in an e-mail • Avoid using the "Remember Password" option everywhere. 25

MALICIOUS SOFTWARE Malicious software, also known as Malware, is any program or file that

MALICIOUS SOFTWARE Malicious software, also known as Malware, is any program or file that is harmful to a computer or the privacy of users. The harm done by malware can vary from something slight as changing the author's name on a document to full access of your machine 26

TYPES OF MALICIOUS PROGRAMS Malware types can be categorized as follows: • Viruses •

TYPES OF MALICIOUS PROGRAMS Malware types can be categorized as follows: • Viruses • Worms • Spywares • Trojan Horse 27

Viruses A computer virus is a malicious program that attaches itself to a file

Viruses A computer virus is a malicious program that attaches itself to a file or a program, enabling it to spread and infect different files. Viruses can be transmitted as attachments to an e-mail or in a downloaded file. Viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program 28

Worms are stand alone malicious software and do not require a host program or

Worms are stand alone malicious software and do not require a host program or human help to spread. It replicates its functional copies and can consume system memory. 29

Spywares Spyware is classified as privacy-invasive software. The most common spyware function is to

Spywares Spyware is classified as privacy-invasive software. The most common spyware function is to steal personal information and address book 30

Trojan Horse A Trojan is another type of malware. It is a harmful piece

Trojan Horse A Trojan is another type of malware. It is a harmful piece of software tha looks genuine. Users are typically tricked into loading and executing it on their systems. After it is activated, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files or activating and spreadin other malware). Trojans are also known to create back doors to give malicious user access to the system. 31

To stay protected from malicious software: • Avoid using the "auto-run" option in Windows

To stay protected from malicious software: • Avoid using the "auto-run" option in Windows OS for portable drives. • Use anti-spyware software, anti-virus software and scan and update regularly. • always be wary of strange e-mails, especially ones with attachments. • While browsing the Internet, always confirm what you click , download and install. 32

THE BACKUP §Local Backup §Internet Backup (Cloud Storage) EX : Drop Box , Google

THE BACKUP §Local Backup §Internet Backup (Cloud Storage) EX : Drop Box , Google Drive and One Drive 33

COPYRIGHT 34

COPYRIGHT 34