0% found this document useful (0 votes)
67 views

4.2 Network Issues and Communication

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views

4.2 Network Issues and Communication

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

ICT IGCSE Theory – Revision Presentation

4.2 Network Issues and Communication


Chapter 4: Networks and the effects of using them

• Security issues regarding data transfer

• Network communication

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them

Security Issues

How can hackers effect your network and data?


Hackers
Introduce of viruses & spyware to the Network.
Viruses Threat to Data:
Spyware • Data could be deleted, edited, corrupted or be replicated.
\ • Data could be sold or passed on to other people.

Phishing Threat to Network:


Pharming • Network may have to be shut down to quarantine virus.
• This could stop production and cost an organisation a lot of
money.

Should the Advantages Disadvantages


internet be • To protect vulnerable users gaining • It would be extremely difficult and expensive
policed? access to undesirable websites. to police the internet.
• To prevent illegal material (software, • Infrastructure including staff and offices
videos) be openly posted and shared by would have to be required.
web users. • Would be difficult to enforce different rules in
• To bring to justice those users who different countries.
continually misuse the internet for their • Could go against freedom of speech.
personal gain.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them

User Name & Passwords: Methods of Authentication (Network Security)

Authentication techniques are used to ensure only authorised users are able gain access to a
Network via User Names/Passwords, Biometrics, Swipe Cards, TAN, Two Factor authentication
etc.

Passwords are Disadvantages Avoiding password interception


a method of
• Passwords can be guessed especially • Set strong passwords which include
authentication. if they are simple. multiple characters such letters and
numbers.
• Passwords may be seen by others.
• Ensure password is regularly changed.
• Passwords can be stolen and used by
other people. • Avoid using the same passwords for all
of your accounts.
• Spyware could be used to logs key
presses to get passwords. • Install spyware software which will
block the installation of any key logging
• Passwords can be hacked by using software.
password generating software.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them

User Name & Passwords: Methods of Authentication (Network Security)

Setting a strong Password:


• Use at least 8 characters
• Includes letters and numbers
• Avoid using names or words which could be easily guessed.
• Use upper and lower case letters.

When users log onto to their online accounts they may also be asked for additional
information to verify their accounts.

Security Question:
• Users may be asked to answer security questions related to their
account.
• Typical questions includes mothers maiden name.

Personal Image:
• QNB (Qatar National Bank) require users to identify an image when
they log in on the website for online banking. .
• Users will have to confirm if the image shown is one they selected as
their account image.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them

Alternatives Methods of Authentication (Network Security)

Device Overview/Advantages
Biometrics • Biometrics use unique data.
• Finger Prints • Only the person with the biometric features can access the
• Retina Scan network.
• Iris Scans
• Can not copy/replicate biometric data
• Face Scans
• Vocal Recognition

Magnetic Swipe • Swipe cards are used to gain access to the system by swiping the
Cards card into the reader.
• Swipe cards are quite easy to use and update.
• Could also be used to gain entry into a room (hotel room).

Transaction • TAN is used by online banking services.


authentication • User will insert their bank card into the TAN reader which will
number (TAN) then provide a code which will need to be entered to complete
a transaction.

Two factor • Two Factor Authentication involves the user typing in their
authentication password and then typing in a code.
• The code is sent to the registered phone number of the account
as a text.
• If an unauthorised attempt is made to log into an account then
the text message will alert the user.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them

Security issues regarding data transfer: Viruses & Spyware

A computer virus is a piece of programming code/software which can install and replicate it self
on to a computer system without the user’s permission. A computer virus can cause the
following problems.
1. Causes the computer to crash – become slower
2. Sometimes files can be deleted – leads to computer malfunction.
3. Data files can be copied by the hacker or the files could be corrupted.
4. Could stop production until the virus has been quarantined.

Spyware gathers data from computers without the user knowing. Spyware could
monitor key presses to gain personal information or passwords. This information
would be sent back to the hacker.

Installing anti virus and spyware software and the use of a firewall is not
enough to keep your computer safe. You also need to pay attention to the
following points.
• Do not download any files from untrusted sources including email attachments.
• Do not install illegal software onto your computer.
• Do not click on links from unknown websites.
• Do not connect storage devices (e.g. USB) from unknown sources.
• Ensure virus software is up to date and virus definitions are regularly updated.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them

Security issues regarding data transfer: Firewall

Prevents computer accessing Monitors and controls incoming


undesirable/unauthorised sites and outgoing data traffic.

Prevents unauthorised computers


using the internet accessing the
computer

Helps to prevent malware


(viruses) getting into
computer/from the internet

Keeps a list of undesirable sites/IP addresses


Keeps a list of acceptable sites/IP addresses

Warns you regarding threats/allows you


to accept/reject downloaded programs
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them

Encryption

Encryption is the process of converting information into a form that is meaningless


to anyone except holders of a ‘key’.

1. Data is scrambled up (Data is


Encrypted).

2. If the data is intercepted it then it


prevents people from understanding
and reading the data.

3. The person with the key is able to


Decrypt and understand the data.

Disadvantages
• Data can still be deleted from system
• Criminals can use encryption to keep incriminating material secure

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them

Proxy Server

Can be used to monitor Internet usage

Can block certain sites

Server passes on requests to the Internet


Passes the requested web pages to individual computers

Can cache/store the webpages

Can act as a buffer (between Internet and LAN)

Can act as a web server


WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them

Security issues regarding data transfer: Data Protection Act

Data protection Act applies to paper based or electronic forms of data stored on a computer.
The data protection act is to protect rights of the individual who the data is obtained from.
Web based business such as Amazon or Ebay store sensitive data about customers including
payment details. They would have to abide by the data protection act to keep the data secure.

Principles of the Data Protection Act

1. Data must be fairly and lawfully processed.


2. Data can only be processed for the stated purpose.
3. Data must be adequate, relevant and not excessive.
4. Data must be accurate.
5. Data must not be kept longer than necessary.
6. Data must be processed in accordance with the data subject rights.
7. Data must be kept secure.
8. Data must not be transferred to another country unless they have
adequate protection.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them

Network communication
Type of Overview/Advantages Disadvantage
Communication
Physical Faxing • Requires a fax machine and a telephone line. • Anyone can access faxed
• Number of the recipient dialled before the documents.
document is copied and sent. • The fax may be out of paper or
• Physical documents are printed and can be ink (toner).
signed. • No notification of fax received.
Email • Can send multiple attachments. • Email attachments may include
Communication • Can send to multiple recipients in one viruses.
message. • May receive spam (unwanted
• Emails can be received instantly and accessed mail).
on many platforms including tablets and • May receive phishing (scam)
phones. emails to obtain personal data.
Electronic Faxing • Electronic Fax is sent via a internet connection.
• No need to buy a fax machine, ink or paper.
• Electronic Fax documents are sent to an email which will ensure the correct person
will receive the fax – less chance of document being intercepted.
• Electronic Fax's can also be sent directly to a fax machine.
• Send fax's from any location with an internet connection.
• No additional cost to send fax over internet network.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them

Network communication

Advantages and Disadvantages of using email compared with faxing

Fax Email
Advantages • Documents can be signed which are • Emails are password protected so less
legally accepted. likely chance of data being intercepted.
• Physical copies of documents can be • Emails can be received instantly.
sent and automatically printed. • Attachments can be edited and sent back.
• Can send to many recipients at the same
time.

Disadvantages • Data is more likely to be intercepted • Cant be used when documents need to be
once it is printed from the fax signed.
machine. • Viruses can be download from
• There could be delays in receiving attachments.
the fax due to a busy telephone line • Unwanted emails could be received
or lack of paper or ink. (Phishing/Spam).
• Fax can only be received during
office hours.
• Not everyone has a fax machine.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them

Network communication

Type of Communication Overview Hardware


Video • Video conferencing uses both video and sound • Web Camera
Conferencing using an internet connection.
• It can be used to have business meeting when
people are in different locations.

• Screen/Monitor
Advantages • No need to travel to have meetings which would cut down
on travelling costs (including flights and hotel) and
travelling time.
• Video conference can be held at short notice.
• Facilitates long distance learning – students can access live • Speaker
lectures without travelling.
Disadvantages • Technical problems with the internet or hardware could
effect the quality of the video conference.
• Set up costs to purchase hardware/software and to provide
• Microphone
relevant training to staff.
• Lack of personal contact you would have if it was a face to
face meeting.
• Different time zones could make it difficult to find to find a
suitable time to have a meeting.
• Not possible to sign documents.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them

Network communication

Type of Communication Overview Hardware


Audio- Audio conference can be done over the telephone network • Telephone
Conferencing or using a computer making use of VOIP.

1. The organiser of the phone conference is given a


unique Pin which can be shared participants.
2. For Participants to join they have to dial the
conference phone number. VOIP
3. Then they would have to enter a PIN. • Microphone
• Speakers

Web- • Web conference can be done using internet • Same as


Conferencing connection. video
• It is very similar to video conference as participants can conferencing.
hear audio and see a live video stream.
• Participants can join the web conference by clicking on • Keyboard
the supplied link from the organiser. could be use
• Participants can join and leave the web conference at for IM.
any time.
• Instant messaging (IM) feature is available to
communicate with other participants.
• Participants can be given permission to speak and can
share content such as images, video or presentations.

WWW.YAHMAD.CO.UK

You might also like