4.2 Network Issues and Communication
4.2 Network Issues and Communication
• Network communication
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
Security Issues
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
Authentication techniques are used to ensure only authorised users are able gain access to a
Network via User Names/Passwords, Biometrics, Swipe Cards, TAN, Two Factor authentication
etc.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
When users log onto to their online accounts they may also be asked for additional
information to verify their accounts.
Security Question:
• Users may be asked to answer security questions related to their
account.
• Typical questions includes mothers maiden name.
Personal Image:
• QNB (Qatar National Bank) require users to identify an image when
they log in on the website for online banking. .
• Users will have to confirm if the image shown is one they selected as
their account image.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
Device Overview/Advantages
Biometrics • Biometrics use unique data.
• Finger Prints • Only the person with the biometric features can access the
• Retina Scan network.
• Iris Scans
• Can not copy/replicate biometric data
• Face Scans
• Vocal Recognition
Magnetic Swipe • Swipe cards are used to gain access to the system by swiping the
Cards card into the reader.
• Swipe cards are quite easy to use and update.
• Could also be used to gain entry into a room (hotel room).
Two factor • Two Factor Authentication involves the user typing in their
authentication password and then typing in a code.
• The code is sent to the registered phone number of the account
as a text.
• If an unauthorised attempt is made to log into an account then
the text message will alert the user.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
A computer virus is a piece of programming code/software which can install and replicate it self
on to a computer system without the user’s permission. A computer virus can cause the
following problems.
1. Causes the computer to crash – become slower
2. Sometimes files can be deleted – leads to computer malfunction.
3. Data files can be copied by the hacker or the files could be corrupted.
4. Could stop production until the virus has been quarantined.
Spyware gathers data from computers without the user knowing. Spyware could
monitor key presses to gain personal information or passwords. This information
would be sent back to the hacker.
Installing anti virus and spyware software and the use of a firewall is not
enough to keep your computer safe. You also need to pay attention to the
following points.
• Do not download any files from untrusted sources including email attachments.
• Do not install illegal software onto your computer.
• Do not click on links from unknown websites.
• Do not connect storage devices (e.g. USB) from unknown sources.
• Ensure virus software is up to date and virus definitions are regularly updated.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
Encryption
Disadvantages
• Data can still be deleted from system
• Criminals can use encryption to keep incriminating material secure
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
Proxy Server
Data protection Act applies to paper based or electronic forms of data stored on a computer.
The data protection act is to protect rights of the individual who the data is obtained from.
Web based business such as Amazon or Ebay store sensitive data about customers including
payment details. They would have to abide by the data protection act to keep the data secure.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
Network communication
Type of Overview/Advantages Disadvantage
Communication
Physical Faxing • Requires a fax machine and a telephone line. • Anyone can access faxed
• Number of the recipient dialled before the documents.
document is copied and sent. • The fax may be out of paper or
• Physical documents are printed and can be ink (toner).
signed. • No notification of fax received.
Email • Can send multiple attachments. • Email attachments may include
Communication • Can send to multiple recipients in one viruses.
message. • May receive spam (unwanted
• Emails can be received instantly and accessed mail).
on many platforms including tablets and • May receive phishing (scam)
phones. emails to obtain personal data.
Electronic Faxing • Electronic Fax is sent via a internet connection.
• No need to buy a fax machine, ink or paper.
• Electronic Fax documents are sent to an email which will ensure the correct person
will receive the fax – less chance of document being intercepted.
• Electronic Fax's can also be sent directly to a fax machine.
• Send fax's from any location with an internet connection.
• No additional cost to send fax over internet network.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
Network communication
Fax Email
Advantages • Documents can be signed which are • Emails are password protected so less
legally accepted. likely chance of data being intercepted.
• Physical copies of documents can be • Emails can be received instantly.
sent and automatically printed. • Attachments can be edited and sent back.
• Can send to many recipients at the same
time.
Disadvantages • Data is more likely to be intercepted • Cant be used when documents need to be
once it is printed from the fax signed.
machine. • Viruses can be download from
• There could be delays in receiving attachments.
the fax due to a busy telephone line • Unwanted emails could be received
or lack of paper or ink. (Phishing/Spam).
• Fax can only be received during
office hours.
• Not everyone has a fax machine.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
Network communication
• Screen/Monitor
Advantages • No need to travel to have meetings which would cut down
on travelling costs (including flights and hotel) and
travelling time.
• Video conference can be held at short notice.
• Facilitates long distance learning – students can access live • Speaker
lectures without travelling.
Disadvantages • Technical problems with the internet or hardware could
effect the quality of the video conference.
• Set up costs to purchase hardware/software and to provide
• Microphone
relevant training to staff.
• Lack of personal contact you would have if it was a face to
face meeting.
• Different time zones could make it difficult to find to find a
suitable time to have a meeting.
• Not possible to sign documents.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
Network communication
WWW.YAHMAD.CO.UK