Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
71 views100 pages

Design Your Own Network - Shape and Size

cs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views100 pages

Design Your Own Network - Shape and Size

cs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 100

r o w n

n y o u
De s ig a p e
r k: S h
n e t w o
siz e
an d
Brainstorming
What is a network?
• A network is a group of two or more things
linked together.
e.g. Rail network, road network, people
network etc.
What is a computer network?
A computer network consists of two or more
computers or other electronic devices linked
together for sharing resources such as
printers, exchange fi les, or electronic
communicati on.

Note:- The Internet is a global network of


networks.
What is the diff erence between a computer network and social
network?

What are the two types of connecti on?


Ans: wired and wireless
The computer in a network is called a node.

Intranet
The network specific to the users within the
organisation is called the Intranet.
Advantages of a computer network
Resource Sharing:
Computer networks enable the sharing of hardware resources, such as printers,
scanners, and storage devices, as well as software resources, such as
applications and databases, among multiple users. This leads to cost savings and
improved efficiency.
Communication:
Networks facilitate communication between users through email, instant
messaging, video conferencing, and other collaboration tools. This improves
productivity and enables real-time collaboration regardless of geographical
locations.
Centralized Data Management:
In networked environments, data can be centrally stored and managed, making
it easier to backup, secure, and access information. This reduces data
redundancy and ensures data consistency.
Advantages of a computer network
Remote Access:
With network access, users can remotely access resources and data stored
on the network from anywhere with an internet connection. This flexibility
allows for remote work and increases productivity.
Scalability:
Computer networks can easily scale to accommodate the addition of new
users, devices, or resources without significant changes to the infrastructure.
This scalability supports business growth and changing needs.
Cost Efficiency:
Sharing resources and infrastructure across multiple users reduces costs
associated with hardware, software, maintenance, and administration. This
makes computer networks a cost-effective solution for businesses and
organizations.
Disadvantages of a computer network
If many users work at the same time with a same network, the transfer and
sharing the files will become slow.

Security Risks: Computer networks are susceptible to security threats such as


viruses, malware, hacking, and unauthorized access. Protecting network
resources and data requires robust security measures and constant vigilance.

Complexity: Designing, implementing, and managing computer networks can be


complex and requires specialized knowledge and skills. Complexity increases with
the size and complexity of the network infrastructure.

Dependence on Infrastructure: Network downtime or failures can disrupt


operations and productivity. Organizations need to invest in reliable
infrastructure and backup solutions to minimize the impact of network outages.
Disadvantages of a computer network
Data Privacy Concerns: Sharing data and resources on a network raises
concerns about data privacy and confidentiality. Organizations must
implement appropriate access controls and encryption measures to protect
sensitive information.

Bandwidth Limitations: Network performance may be affected by


bandwidth limitations, especially in large networks or during peak usage
periods. Slow network speeds can impact productivity and user experience.

Compatibility Issues: Integrating diverse hardware and software


components within a network can lead to compatibility issues and
interoperability challenges. Ensuring compatibility requires careful planning
and testing.
Types of network
Personal Area Network (PAN)
Local area network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)

Personal Area Network (PAN)


With in 10 metres
Can be wired, wireless (Bluetooth or
infrared)
Bluetooth PANs are called piconets.
Advantages of Personal Area Network (PAN)
Ease of Setup:
PANs are relatively easy to set up and configure, making them suitable for home and
small office environments where simplicity and efficiency are valued.
Connectivity: PAN allows for seamless connectivity among personal devices such as
smartphones, tablets, laptops, printers, and wearable devices within a close range,
typically within a few meters.
Cost-effective:
Setting up a PAN often requires minimal investment as it utilizes existing wireless
technologies like Bluetooth or Wi-Fi, reducing the need for additional infrastructure.
Privacy and Security:
PANs offer a higher level of privacy and security since communication occurs within a
limited physical area, reducing the risk of unauthorized access or interception
compared to larger networks.
Disadvantages of Personal Area Network (PAN)
Limited Range:
PANs have a limited range, typically within a few meters. This limitation restricts communication
and connectivity to devices within close proximity, which may not be suitable for scenarios
requiring broader coverage.
Interference:
PAN uses technologies such as Bluetooth and Wi-Fi leading to potential interference issues.
Interference can degrade signal quality and disrupt communication between devices.
Dependency on Battery Power:
Devices may run out of powerdisrupting communication and connectivity until batteries are
recharged or replaced.
Data Transfer Speed:
Slower than wired connections or other wireless technologies designed for highspeed data
transmission.
Local area network (LAN)
With in a short distance or confined area such as office, a building or a college
campus.
Advantages of LAN
Resource Sharing:
Centralized Data Management:
Facilitates Collaboration:
Cost-Effective: (than WAN):
Disadvantages
Initial setup cost
Limited Range:
Security Concerns:
Network Congestion: as the number of devices increase…
Single Point of Failure: if central server fails..
Metropolitan Area Network
A network spread over an entire
city.
e.g. cable television, branches of a
school/office/bank in the same city.
Owned by a single entity, such as an
organisation.
Advantages of MAN
• High Speed: compared to LAN because of fibre optic cable.
• Scalability: can be easily expanded. (add or remove nodes)
• Cost-effective (compared to WANs):
• Improved Communication: MANs foster better communication and resource
sharing within a localized area, such as universities, hospitals, or government
agencies spread across a city.
Disadvantages
• Security Challenges: Securing a MAN can be complex due to its larger
coverage area compared to a LAN.
• Higher Costs (compared to LANs): because of expensive fibre optic cables
• Management Complexity:
Wide Area Network
Global network of networks.
Spread across the cities, countries
or continents.
Is not restricted to a geographical
location, although it might be
confined within the bounds of a
state or country. A WAN connects
several LANs, and may be limited to
an enterprise (a corporation or an
organization) or accessible to the
public.

The internet and ATMs are


examples of WAN.
Advantages of WAN
Vast Geographical Coverage:
Resource Sharing:
Improved Communication: from different locations
Centralized Management:
Scalability: easily expandable.
Increased Efficiency and cost saving: by eliminating the need of physical
transportation of data. Collaboration in real time. Experts can be hired.
Improved Disaster Recovery:
Disadvantages
Disdvantages of WAN
Cost:
Security Concerns:
Complexity:
Bandwidth Limitations: WAN bandwidth is typically limited compared to
LAN bandwidth.
May lag in real time applications:
Network devices
The devices that are required to connect
computers or peripherals in a network
are called network devices.
Some of the devices are
Modem
Rj-45
NIC
Hub and switch
Repeater
Bridge
Router
Modem
Modem stands for modulator-
demodulator.
Modulator – converts digital signal
from the computer to analog form so
that it can be transmitted over telephone
wires.
Demodulator – converts analog signal
to digital signal.
Telephone Modem Line Cable
RJ-45
RJ-45 (Registered jack-45) connector is used
for computer network cables.
RJ45 connectors are primarily used for
plugging an internet-enabled device directly
into hardware such as a modem, router, or
server.
Ethernet Network Interface Card
Also known as Network Interface Card
(NIC). They are essential part of a
network. NIC is used to connect a
computer to another computer or to a
server.
It is used to transmit data from the
network to your computer by using
network cable ( usually RJ-45)
Hub
Hub is the device used to connect
multiple computers or networking
devices together.
It may have 8, 12 or 24 ports.
Usually hubs are used to create a LAN.
Hub is commonly used to connect
segments of a LAN (Local Area
Network). A hub contains multiple ports.
When a packet arrives at one port, it is
copied to the other ports so that all
segments of the LAN can see all packets.
Hub acts as a common connection point
for devices in a network.
Switch
Just like hubs, a switch is
used to connect multiple
hosts together.
A switch is more efficient
than hub because it can
inspect the data packet and
send it to the intended
recipient instead of
sending to all the devices.
Repeater
A device which can
regenerate the incoming
signal.
Then, it places the same
on the communication
channel again.
It is used to increase the
length of the network.
Bridge
A bridge is a device
which is used to connect
two LANs together It
will have only two ports.
It can store MAC address
of the device.
It can send data packets
to only the intended
recipient so reduce the
traffic..
Router
A router is a device for
networks, which is able to
route (forward) network
packets, based on their
addresses, to other
networks or devices when
the destination address is
outside its network.
That’s why they are used
for internet connection.
The process of forwarding
data is called routing.
Advantages of Router Disadvantages of Router
• It provides connection between • They are expensive compared
different network architectures to other network devices.
such as ethernet . • They are slower as they need to
• It can choose best path across analyze data
the internetwork using dynamic • They require considerable
routing algorithms. amount of initial configurations.
• It can reduce network traffic
• They are configurable which
allows network manager to
make policy based on routing
decisions.
Difference between hub and switch
Hub Switch
• Hubs are “dumb” devices that pass on • Switches are intelligent devices that
anything received on one connection learn which devices are on which
to all other connections. connection.
• It is less expensive, less • A switch does what a hub does, but
intelligent, and less complicated than more efficiently. By paying attention to
switch. Its job is very simple: anything the traffic that comes across it, it
that comes in one port is sent out to learns which computers are connected
the others. to which port.
Servers
A server is a powerful computer that provides services or resources
to other computers or devices on a network.
The advantages and disadvantages are same as computer network. In
addition to that…
Advantages:
• Data Backup and Recovery:
• 24/7 Availability
• Can be accessed from anywhere if connected to internet.
• Individual physical space not required to store data.
• You can purchase server space according to your requirement
• It helps in maintaining the security of a network. Antivirus, anti-
spyware and firewall applications on the server keep all the
networked devices safe.
Disadvantages:
• Single Point of Failure:
• Energy Consumption
Types of server
Different types of server provide different services for the
devices connected to them via the network.
File server:
It offer devices on a network a place to store and access files.
It is a type of server that stores and manages files, allowing
multiple users or devices to access, share, and collaborate on
those files over a network.
This can be beneficial in a business or organisation where a
number of people need to access the same files.
Print servers
enable devices on a network to share printers.
imagine a large office, it would not be feasible for every device to have its own
printer. A print server manages which devices can print to a single printer so
that users can share it
Mail servers
store email messages and allow users to authenticate themselves so that they
can send and receive messages
It handles email-related tasks such as:
• Receiving Emails: It accepts incoming emails from other servers or clients.
• Storing Emails: It keeps emails until users retrieve them.
• Sending Emails: It sends outgoing emails to other servers or clients.
• Routing Emails: It directs emails to the correct destination based on the email
address.
Tpes of mail servers
• SMTP Server (Simple Mail Transfer Protocol):
• SMTP servers handle the sending and routing of email. When you send an email, it
travels from your email client (like Outlook or Gmail) to an SMTP server, which then
routes it to the recipient's mail server. SMTP is responsible for sending emails over the
internet.
• POP3 Server (Post Office Protocol version 3):
• POP3 servers manage email retrieval. They allow email clients to download messages
from the mail server to a local device. Typically, after emails are downloaded, they're
deleted from the server. This approach is useful when you want to access your emails
offline, but it means that email is stored on the user's device rather than on the server.
• IMAP Server (Internet Message Access Protocol):
• IMAP servers also manage email retrieval but offer more flexibility than POP3. Unlike
POP3, IMAP keeps emails on the server, allowing users to access their emails from
multiple devices. This approach is ideal for users who need to access email from
different locations or devices.
Web servers
provide internet-accessible files and transmit files to users over the
world wide web.
A web server is a computer or software system that serves web pages
and other web content to users over the internet. Its primary function is
to deliver content in response to requests from web browsers or other
clients, enabling users to access websites and web-based services.
Network Topology
The arrangement with which computer systems or network
devices are connected to each other is called network topology.
The way nodes are connected depends on various factors such
as arrangement, cost, flexibility and reliability.
Arrangement: The distance between the nodes.
Cost: With minimum distance, the cost (for cabling) can be
reduced.
Flexibility: The design should be flexible to insert or remove
nodes from the network (for the changes in the system)
Reliability: Performance of the network. It should be fault-free.
If one node fails, network performance should not be affected.
Depending on the arrangement there are four common types
of topology
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Tree Topology
1. Bus Topology
In a bus topology each computer or device is
connected to a common central line called
backbone.
All the nodes, printer and the server are
connected to this central line through small
cable segments called drop-cables.
Data travels along this central line until it
reaches the computer or device that requires
it.
The ends of the line have terminators to
prevent signal bounce, which would cause
data interference.
Advantages
• It is easy to add a new computer or device to the
network.
• If one device or computer fails, it does not affect
the rest of the network.
• It uses less cable than used by other topologies.
Disadvantages
• It is difficult to isolate any fault on the network if
the entire networking stops working.
• If the central line has a fault then the whole
network fails.
• Data sharing becomes slow as more and more
devices/computers are added.
Star Topology
With a star network, each computer or device
is connected via a central hub or switch or
server.
Through this server, the drop cables extend in
all the direction.
Data is sent to the hub which then sends out
data along every cable to every computer or
device
This is the most common network topology.
Advantages
• It is easy to add or remove nodes.
• It is a reliable topology because if one computer or
device fails, then the rest of the network is unaffected.
• Easy to identify the problem and work can be carried
out on a faulty device without affecting the rest of the
network.
• It has good network security as two nodes cannot
communicate without going through the server.
Disadvantages
• It has the most expensive layout.
• If the central hub breaks down, the whole network
crashes.
• To expand the network extra hubs or switches might be
required.
Ring Topology
In this network, every computer is connected in a ring, including the server.
First and last node connected to each other forms a ring. Data is transmitted
around the ring in a circle until it reaches its destination. The data flows in a
single direction only.
Advantages
• Data travelling on a ring network flows only
one way, which means that data does not
collide.
• This network works well under heavy loading
• Less cabling required.
Disadvantages
• Adding a new device or computer to the
network can be difficult since it has to be
placed between two existing devices.
• If there is a fault in the wiring between two
computers then the whole network will fail.
• Data reach late at their destination since it
has to pass through every computer.
Tree Topology
A type of network topology in
which nodes are connected in
such a way that it looks like a
tree.
Tree topology is a
combination of bus topology
and star topology. In a bus
topology nodes are connected
to the central bus. While in a
star topology nodes are
connected to hubs. Tree
topology is an expansion of
tree and bus topology.
It is also known as an
extended star topology.
Tree topology is flexible and reliable. Tree
network can be connected to large network also.
This network is connected in such a way that it
reduces network traffic also. You can connect as
many servers to the network as you want. The
information is shared among all the computers in
the network. If any computer wants to send a
message then it will broadcast the message
through hub/switch and the hub/switch will
redirect the message to the destination computer.
Advantages
• Adds features of both star and bus topology.
• It is easy to expand the network. You just need an extra
hub and cables. More star networks are added to the
main cable or bus without any issue.
• It is easy to identify the error in the network. As every
node is connected to a hub or switch so the hub/switch
can detect which node has a problem in it and you can
easily replace the cable or node.
• Better security: as connected through hub/switch.
Reliable:
• If any node gets disconnected from the tree network
then other nodes will function regularly. The
performance of the network is not affected by
removing any node.
Disadvantages
• Tree topology is dependent on the main bus
cable. If the main bus gets any problem the whole
network will fail to perform.
• If more and more segments/nodes are added to
the network then it becomes a problem to
manage/maintain the network.
• If any hub stops working then some nodes in the
network become disconnected from the network.
• This network is more costly than bus and star
topology. The length of cables and additional hub
cost more money.
Network protocols
Protocol: A protocol is a set of rules to be
followed.
Imagine if computer manufacturers created
devices that could communicate only with other
devices made by the same manufacturer.
Smartphones wouldn’t be able to join cellular
networks unless the mast was made by that
manufacturer. PCs wouldn’t be able to
communicate with each other unless the same
company made them. Network switches would
communicate only with devices that were made
by the same company as the switch manufacturer
Network protocols are rules and standards that enable computers to
communicate with each other and share data over a network.
or
Protocols are an agreed set of rules for communicating over a network.
protocols used in modern technology allow all kinds of devices to
communicate with each other, regardless of who manufactured them.
Two types of protocol
• TCP/IP Protocol
• HTTP and HTTPS
TCP/IP
Transmission Control Protocol/Internet Protocol (TCP/IP) is a
collection of rules that govern how computers can communicate
with each other over a network.
When sending data from one device to another on a network, TCP/
IP is the protocol used to break the data into packets, address the
data, transmit the data, route the data and receive any data from
other devices.
The Transmission Control Protocol (TCP) is responsible for breaking
the data into smaller sections called packets. Imagine that you
wanted to send an image file from one computer to another. TCP
would send part of the image data in each data packet.
TCP/IP
Each packet has extremely strict rules about how it should look.
Along with the image data, the TCP protocol adds information to
each packet, including how many packets there are in total and the
number of each packet.
Think of a packet as being like a letter, which needs to include the
address of where the packet is being sent. The Internet Protocol (IP)
adds the IP address of the sender and the receiver to the packet.
The example below shows a single packet that is ready to be sent
over a network.
Packet switching
Packet switching is a method of data
transmission in which a message is broken up
into a number of packets.
Each packet can then be sent independently
from start point to end point.
Example:
When transmitting a video file across a network ,
the file would be split as follows:

In reality, packets are so small that a video file


would likely be split into thousands of packets.
Packets contain the data that is being sent, and the
sender IP address and receiver IP address, so that the
data can be directed to the correct destination
When the packets are
assembled, they are sent
across the network. Packets
can be sent across the
network using different routes,
often travelling through many
different devices before they
reach their destination.
The receiving computer will put the packets in order to check
that they have all been received. If there have been any
‘dropped packets’, the receiver will re-request that packet and
it will be transmitted across the network again.
HTTP and HTTPS
Hypertext Transfer Protocol (HTTP) and
Hypertext Transfer Protocol Secure (HTTPS)
are protocols that exist to allow web browsers
to fetch documents from web servers.
Documents could include web pages, text,
images or videos. HTTPS is encrypted, which
can prevent unauthorised access if data is
intercepted.
Each time a user on a web
browser tries to view a
document on the world wide
web, the
device sends a request to the
web server for the
information.
Here is an example of a
request that is sent when the
browser tries to visit
www.google.com:
Scalable considerations
Network scalability means how well a network can cope if it
suddenly needs to move a lot more data between more
devices.
It means if it is required to add more devices to a network, the
network should be able to handle it.
To assess the scalability of a network accurately, you need to
consider the following
Security, Storage solutions, Accessibility of data
Innovation in networking
Cloud computing: makes use of servers on the internet to
provide services to store, manage or process data.
data transmission
Transmitting data:
Network devices transmit data in binary form which consists 1s
and 0s.
Basing on number of bits sent at the same time data
transmission can be of two types.
Serial and Parallel
Serial data transmission
• SERIAL DATA TRANSMISSION is when data is sent, one
bit at a time, over a single wire or channel (bits are sent
one after the other in a single stream).
Serial data transmission
• SERIAL: This method of data transmission works well
over long distances. However, data is transmitted at a
slower rate than parallel data transmission.
• Since only one wire or channel is used, there is no problem
of data arriving at its destination.
Example1: sending data from a computer to a modem for
transmission over a telephone line.
2. connecting a computer to a printer via a USB connection
Parallel data transmission
• PARALLEL DATA TRANSMISSION is when several bits
of data (usually 1 byte) are sent down several wires or
channels at the same time; one wire or channel is used to
transmit each bit.
Parallel data transmission
• This method of data transmission works very well over
short distances (over longer distances, the bits can become
‘skewed’ – this means they will no longer be synchronised).
It is, however, a faster method of data transmission than
serial.
Example:. The internal circuits in a computer use parallel
data transmission since the distance travelled between
components is very short and high-speed transmission is
essential.
Parallel data transmission
• Parallel data transmission is used in the
internal electronics of the computer system.
The pathways between the CPU and the
memory all use this method of data
transmission. Integrated circuits, buses and
other internal components all use parallel
data transmission because of the need for
high speed data transfer.
• 8-bit, 16-bit, 32-bit and 64-bit buses are used.
• it is essentially synchronous in nature and an
internal clock is used to ensure the correct
timing of data transfer.
Transmission errors
Errors can occur during data transmission due to:
• Interference to the Wi Fi signal can cause bits to flip (0 can be
changed to 1 and vice versa)
• skewing of data (this occurs during parallel data transmission
and can cause data corruption if the bits arrive out of
synchronisation-one bit can reach late or early than others).
• A power surge on one of the networked devices that the data
is travelling through could cause a bit to flip.
Importance of error free transmission
Examples
Air traffic control system in an airport.
If the messages sent to the pilots from control room is not correct, then an
aeroplane could be landing on a runway before another plane has taken off, which
would be a disaster.
Hospitals
have complex network structures that rely on data transmission to show how many
beds they have available in various departments. If this is not accurate, people
could be turned away from a hospital because the network showed that there were
no beds available, when in fact there were.
Large skyscrapers
often use network-connected carbon-monoxide and heat detectors. What if a
computer mistakenly reported that a heat detector was cold, when there was a fire
in the room it was monitoring?
Error checking methods
• echo check
• parity checks
• Checksum
• Check digits
• Automatic Repeat Requests (ARQs)
Echo check
• Data is sent to another device (receiving device)
• a copy of the data is sent back to the sender
• the returned data is compared with the original data by the sender’s
computer
• if there are no differences, then the data was sent without error
• if the two sets of data are different, then an error occurred at some stage
during the data transmission.
For example, a computer transmits the binary number 00000001 (which
represents denary 1). An error occurs causing 10000000 (denary 128) to be
received. 10000000 is sent back to the first computer and the error is highlighted
as the values do not match, so the original data is sent again.
Problems with echo check
If there is an error, it impossible to tell whether the error occurred
when the data was originally sent, or when it was returned to the
sender.
Echo checks mean that a lot more data is sent over a network as a copy
of original data is sent back to the sending device again for checking.
Security concerns
Different types of error checking methods can be used to
help detect errors. But…..
How do you know that:
the data that is being transmitted is secure?
What are the threats to networks?
Security concerns
There are different types of threats
• Viruses
• Ransomware
• Spyware
• Unauthorised access
Viruses
Vital Information resources under seize
• A virus is a destructive computer program usually
hidden within another program or file
• It can self-replicate and attach with other files and
spread across the system or network.
• Viruses exist to cause harm, often damaging or deleting
data without the owner’s consent
Examples: I love you, Mellisa (macro virus), Stuxnet
Ransomware
Ransomware is a type of
malicious software
(malware) designed to
block access to a
computer system or its
data, typically by
encrypting files or locking
a device, until a ransom is
paid.
Ransomware
Example: Wannacry (in 2017)
targeted users of Windows
operating systems and told
them that they had to pay a fee,
otherwise all their files would be
encrypted and deleted, making
them impossible to recover. This
hit around 230,000 computers
globally, including hospitals and
doctors’ surgeries
Spyware
Spyware is a type of malicious software (malware)
designed to secretly monitor and collect information
from a user's computer or device without their
knowledge or consent.
It can capture a wide range of data, including personal
information, browsing habits, keystrokes, passwords,
credit card numbers, and more.
Spyware can enter your system through software
downloads, email attachments, infected websites.
Spyware
Spyware can be used for various purposes, including
identity theft, financial fraud, tracking user behaviour for
marketing.
It may gather sensitive information such as login
credentials.
Spyware
Different types of spyware:
Keyloggers (which record keystrokes)
Adware (which displays unwanted advertisements),
tracking cookies, and system monitors.
Cookie tracker
System monitors
Unauthorised access
By the hackers who illegally gain access to computers or
networks without authorisation. With various ways the
systems can be hacked
Social engineering
Cracking passwords (Brute-force attacks)
Using information in an unauthorised way
Unauthorised access
Social engineering:
Social engineering is a technique used to manipulate
people into revealing confidential information or
performing actions that compromise security.
Instead of exploiting technical vulnerabilities, social
engineering targets human behaviour, taking advantage of
people's trust, curiosity, fear, or lack of awareness.
The ultimate goal is often unauthorized access to systems,
networks, or sensitive data.
Unauthorised access
Cracking passwords (Brute-force attacks):
Hackers use very large ‘dictionary’ files that contain
millions of words or known passphrases and they try
every combination until they find the correct password.
Unauthorised access
Using information in an unauthorised way:
People become hackers when they access networks that
they are not allowed to. For example, if a company has
sacked a member of staff and forgets to disable their
user account, this person could still log into the
company’s systems and cause a threat to the network.
primary prevention methods for network security
threats:
1. Firewalls
Firewalls act as a barrier between internal networks and
external threats. They filter incoming and outgoing traffic based
on predefined rules, blocking potentially harmful traffic while
allowing legitimate communications.
2. Secure Network Configuration
Properly configuring routers, switches, and other network
devices helps to reduce vulnerabilities. This includes disabling
unnecessary services, changing default passwords, and securing
management interfaces.
primary prevention methods for network security
threats:
3. Encryption
Encryption ensures that data transmitted over the
network is secure from eavesdropping or tampering.
4. Regular Software and Hardware Updates
Keeping operating systems, applications, and network
devices updated with the latest patches and firmware
helps to mitigate vulnerabilities that could be exploited
by attackers.
primary prevention methods for network security
threats:
5. Anti-Malware and Anti-Virus Solutions
Installing anti-malware and anti-virus software on systems
and servers helps to detect and remove harmful software
before it can cause damage.
6. Security Awareness Training
Educating users about cybersecurity threats, phishing
attacks, social engineering, and safe online practices is
crucial. A well-informed user base can reduce the risk of
successful attacks.
primary prevention methods for network security
threats:
6. Data Backups: Regularly backing up data can mitigate
the impact of a successful attack. These measures
ensure that data can be restored in the event of
ransomware or other destructive attacks.
7. Do not download files from untrusted websites
What is a computer virus?

A) A piece of code that infects B) A type of computer


computers and can hardware
replicate itself

C) A program that protects D) A game that people


computers from malware play on their computers
How do computer viruses typically spread?

A) By using antivirus B) By visiting secure


software websites

C) By using Bluetooth D) Through email


devices only attachments
What does ransomware do to your files?

A) It makes them publicly B) It deletes them


available permanently

C) It backs them up to a D) It locks or encrypts them


cloud service until a ransom is paid
How can you protect yourself from ransomware?

A) By using public Wi-Fi B) By sharing passwords


for secure transactions with friends

C) By backing up your files D) By ignoring software


regularly updates
What is spyware?

A) A security software that B) A program that secretly


protects your computer monitors and collects
information from your computer

C) A program that removes D) A tool used for system


computer viruses maintenance
What type of information can a spyware collect?

A) Only publicly available B) Computer hardware


information specifications

C) Information from D) Personal details like


antivirus software passwords and credit
card numbers
What does unauthorised access mean?

A) Accessing a computer or B) Using a computer


system without permission without a mouse

C) Opening a document D) Turning off a computer


without reading it without shutting down
Which of these is an example of unauthorized
access?

A) Using your own B) Watching educational


computer at home videos online

C) Logging into a friend's D) Sharing a computer


computer without their with family members
permission
What is one way to prevent unauthorized access to
your computer?

A) By allowing public B) By sharing your


access to your files password with friends

C) By keeping your D) By using strong and


computer unlocked unique passwords
Which of the following is a good practice to avoid
malware, spyware, or ransomware?

A) Downloading software B) Clicking on any link in


from trusted sources emails

C) Ignoring antivirus D) Using the same password


software updates for all accounts
PROJECT TOPICS
• PAN Information Materials required
• LAN Definition Chart paper or A4 size
• MAN paper
Areas of use
• WAN Colours
Devices
required Draw appropriate pictures
Advantages
Disadvantages

You might also like