Sunday, 22 November 2015

Network issues and communication

Security issues and regarding data transfer

Security issues with using a computer network:

["If your computer is connected to a network, other people can connect to your computer."]

There are several security issues that you computer might get to face when using or connecting with a computer network such as:


  • Hacking....A person who gains unauthorized access to a computer system are called HACKER. They usually discovered and exploited computer system failure. 
  • Viruses....Software that can 'infect' a computer (install itself) and copy itself to other computers, without the users knowledge or permission.
  • Malware...is short for malicious software. Malware is the name given to any software that could harm a computer system, interfere with a user's data, or make the computer perform actions without the owner's knowledge or permission. 
Sometimes the internet is not policed; and you might existence to the unappropriated websites. 
Physical security:
  • Don't let an unauthorized sit in front of your computer.
  • Keep your office door lock.
  • Use password
You can prevent these by: using anti-malware software; using firewall; secure your network, etc.

Avoiding password interception:

  • Use anti-spyware
  • Change the password regularly...[The password should be strong and hard to identify, with lowercase and uppercase alphabets and numbers (number should not be easy to guess e.g. date/month/year of birth or age etc). You also can use the symbols show on the keyboard if they allow].
  • Preventing unauthorized access
  • Securing your data...Encrypt
  • Installed firewall

Authentication Techniques (security):

  • Biometric methods: refers to metric related with human characteristics such as fingerprint recognition,  iris recognition, face recognition, voice authentication, retina scan etc.......
  • Magnetic stripes: 
  • Id cards: 
  • Passports:   
  • Physical tokens: e.g. security token, hardware token, authentication token, USB token, cryptography token, software token, virtual token, or key fob are used to prove one's identity electronically.

Antivirus software and avoiding viruses:

There are some simple ways to prevent your computer from getting viruses:
  • Install antivirus software;-detect and prevent viruses from getting into your computer
  • Download and install software from internet can infected your computer with viruses
  • Don't open attachment from strangers in the email.
  • Install firewall to protect your computer. 

Data Encryption:

Encryption is a process of converting information into a form that is meaningless to anyone except holders of a ‘key’. 
Uses; 
  • Secure the important or personal data.
  • Encrypt data.
  • Prevent the data from the hacker.

Typical data protection act:

Many governments have realized the need to protect peoples' data from misuse, and have created Data Protection Acts. These are a legal rules that must be followed by any business of organisation that keeps a database containing peoples' personal data.

A typical Data Protection Act might include the following rules;
  • Data must only be kept if it is necessary for the business / organisation (e.g. a store shouldn't keep details of your political or religious views - they don't need to know this!)
  • Data must be accurate and kept up-to-date (it is the duty of the business / organisation to make sure the data has no errors)
  • Data must not be kept longer than necessary (e.g. you can't keep a customer's details forever - only whilst they are still your customer)
  • Data must be kept secure (e.g. databases should be encrypted, firewalls should be used for networks, etc.)
  • Data must not be transferred to any country that does not have a similar data protection laws

KEEP YOUR NETWORK SAFE:)



Sunday, 15 November 2015

Networks

Network Devices:


  • NIC (Network Interface Card); The small circuit board, which use to add to the motherboard. A computer that is to be connected to the network need to have this. 
  • Hub; A device that connects a number of computers to make a LAN. It sent the message that it receive to every computers on the network.
  • Switch; A device that connects number of computers to make a LAN, like a hub, but it only sent the message to the address that the message addressed to.
  • Bridge; A device that links together two different parts of a LAN.
  • Modems; A device that use to converts from analogue to digital or digital to analogue.

Router:

Router; A network device that connects together 2 or more networks.
Router is commonly use to connect your LAN to the internet (WAN) by the cable or wireless LAN connection (WiFi) with wireless router.







WiFi and Bluetooth:

WiFi
WLAN is a LAN that use radio signals (WiFi) to connect the computers to the network instead of cables. There is a wireless switch or router at the centre of the WLAN, which used to receive and sent data to the computer.








Bluetooth
Bluetooth device contain low power transmitters and receivers. When there is another Bluetooth devices that are in range, they will detect each other and can be paired (connected).

Comparing&Contrast 
  • Bluetooth has a short-range connections (only a few metres), but WiFi range wireless connections is about 50 m.
  • Bluetooth is design to get rid of the cables e.g. USB cables. When using bluetooth to connect to the keyboard or mouse or the printer, there won't be any wires or cable around. However, using WiFi is for connecting to the network, but when using keyboard, mouse and printer there need to have the USB cables to connect.

Internet:

Internet is a inter global connection (connections that are linked together), which connects millions of computers together. This type of network are generally public.

Intranet:

A private network is called 'Intranet', which mean only an intranet users that can access. This type of network provides similar services to the Internet such as email, web page, etc. 


Intranet and Internet

  • Intranet is an private network.
  • Internet is a public space, a world-wide network. 
  • Intranet limited the number of users.
  • Number of people using Internet is unlimited.
  • Intranet only contain specific group information.
  • Internet contain many different source of information and is available for all.
  • Internet contains a large number of intranets.
  • Intranet can be accessed from internet but protected by a password and accessible only authorized users.

LAN:

LAN stand for Local Area Network, which interconnect in an local/limited area such as school, resident and office building. 

WAN:

WAN stand for Wide Area Network, is a computer network that can be connect in a large area distance.

WLAN:

WlAN stand for Wireless Local Area Network or WiFi, which links two or more devices using wireless distribution method within a limited area such as home, school or office building. 

Using different types of computer to access to internet:

Desktop computer:
Advantages
  • Big screen
  • Fast processor
  • Lots of memory space
  • No battery
Disadvantages
  • Not portable
  • Big and heavy
  • Requires a separate monitor
  • Needs keyboard and mouse
  • Probably without wireless connection
Laptop:
Advantages
  • Easy to carry
  • Small and light weight
  • Portable 
  • Powered by battery
  • Can connect with wireless network
Disadvantages
  • Less memory space than a desktop computer
  • Can  go over heat easily
  • Easy to be steal or loose
Tablet:
Advantages
  • Small and light weight
  • Recognizes handwriting
  • Long battery life time
  • Can connect to internet from anywhere
  • Multi-touch screen
  • Portable
Disadvantages
  • Easy to be damage
  • Weak capability
  • Small screen
  • Can't work with massive amount of data
Phone:
Advantages
  • Constant internet access
  • Lots of application are in one device
  • Portable
  • Touchable screen
  • Small, can be put in pocket
  • Allow easy and quick access to information
Disadvantages
  • Small screen
  • Weak capability
  • Not able to work with massive amount of data