0% found this document useful (0 votes)
2 views6 pages

12,13,14

The document outlines the advantages and disadvantages of computer networks, highlighting benefits such as resource sharing, collaboration, and centralized data management, while also addressing security threats and maintenance costs. It compares wired and wireless networks, noting that wired networks offer greater speed and security, while wireless networks provide mobility and ease of installation. Additionally, it details various threats to computer networks and the internet, including malware, phishing, and unauthorized access, along with mitigation strategies to enhance security.

Uploaded by

Teferi Costa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views6 pages

12,13,14

The document outlines the advantages and disadvantages of computer networks, highlighting benefits such as resource sharing, collaboration, and centralized data management, while also addressing security threats and maintenance costs. It compares wired and wireless networks, noting that wired networks offer greater speed and security, while wireless networks provide mobility and ease of installation. Additionally, it details various threats to computer networks and the internet, including malware, phishing, and unauthorized access, along with mitigation strategies to enhance security.

Uploaded by

Teferi Costa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

A. Write advantages and disadvantages of computer network.

A computer network is a collection of interconnected devices that communicate with each


other to share resources, exchange data, and perform tasks collaboratively.

These devices, also called nodes, can include computers, servers, smartphones, printers, and
other hardware components.

Networking plays a crucial role in modern life by enabling communication, supporting


businesses, and powering the internet.

Advantages of Computer Networks


1. Resource Sharing: Computer networks allow multiple users to share resources such as
printers, files, and internet connections, reducing costs and enhancing efficiency.

2. Data Sharing and Collaboration: Networks facilitate easy sharing of data and collaborative
work among users, improving productivity in business and academic environments.

3. Centralized Data Management: Networks allow centralized storage and management of data,
ensuring easier backups, better organization, and enhanced security.

4. Cost-Effectiveness: Shared resources reduce hardware and software costs, as multiple users
can access the same tools without needing individual copies.

5. Scalability: Networks are scalable, meaning they can grow with an organization’s needs by
adding more nodes or users without major structural changes.

6. Remote Access: Networks enable users to access files, applications, and services from
anywhere, supporting remote work and mobile computing.

7. Real-Time Communication: Communication tools such as email, video conferencing, and


instant messaging rely on networks, enabling fast and effective interaction.

Disadvantages of Computer Networks

1. Security Threats: Networks are vulnerable to cyberattacks such as hacking, malware, and
unauthorized access, requiring robust security measures.
2. Cost of Setup and Maintenance: Initial setup of a network, including hardware, software, and
infrastructure, can be expensive. Regular maintenance also incurs costs.

3. Complexity: Managing and troubleshooting a network requires skilled personnel, as issues


can arise due to hardware failure, software conflicts, or configuration errors.

4. Dependence on the Network: If the network experiences downtime or failures, users may
lose access to resources and services, disrupting productivity.

5. Spread of Malware: A networked environment increases the risk of viruses and malware
spreading quickly across devices, affecting multiple users simultaneously.

6. Limitations: High traffic can lead to slow network performance, particularly if the bandwidth
is insufficient to handle the load.

7. Privacy Concerns: Sharing information across a network may raise privacy concerns,
especially if data is not adequately protected.

B. Compare and contrast wired and wireless network.

A wired network uses physical cables like Ethernet or fiber optics to connect devices, while a
wireless network relies on radio waves or wireless signals for communication. These two types
of networks differ significantly in their features, advantages, and limitations.

Wired networks offer greater speed and reliability compared to wireless networks. The use of
physical cables ensures stable connections with minimal interference, making them ideal for
data-intensive tasks like gaming, video streaming, or office setups. In contrast, wireless
networks are more prone to signal interruptions caused by obstacles, weather, or interference
from other devices. However, advances in wireless technologies like Wi-Fi 6 have narrowed the
performance gap in many scenarios.

One major advantage of wireless networks is their mobility. Users can connect and move freely
within the network’s coverage area without the constraints of physical cables. Wired networks,
on the other hand, limit mobility as devices must remain connected to cables, which can be
cumbersome in dynamic environments.
In terms of installation and cost, wired networks require more time, effort, and expense due to
the need for cabling, switches, and other hardware components. Wireless networks, being
cable-free, are simpler to set up and more cost-effective initially, although additional devices
like signal extenders may be required in large areas.

Security is another critical factor. Wired networks are generally more secure because physical
access to cables is required for unauthorized use. Wireless networks, however, are more
susceptible to hacking and eavesdropping if proper encryption protocols are not implemented.

Scalability is easier with wireless networks since adding new devices involves minimal effort. In
contrast, wired networks require additional cables and infrastructure, making scaling more
complex and expensive.

In conclusion, wired networks are best suited for scenarios requiring high-speed, reliable, and
secure connections, such as offices and fixed setups. Wireless networks excel in environments
where mobility, convenience, and ease of setup are prioritized, such as homes, public spaces,
and mobile workplaces.

C. Write threats of computer network or Internet.

Computer networks and the internet have revolutionized communication, business, and daily
life. However, they are also vulnerable to a variety of threats that can compromise data, disrupt
services, and harm individuals or organizations.

Below are some of the most significant threats

1. Malware: Malware, short for malicious software, includes viruses, worms, Trojans, and
ransomware. These programs are designed to harm, exploit, or disrupt computer systems. For
example, ransomware encrypts files and demands payment for their release, while viruses
replicate and spread, corrupting data and programs.

2. Phishing Attacks: Phishing is a social engineering attack where attackers impersonate


legitimate entities to trick users into revealing sensitive information, such as passwords, credit
card numbers, or bank account details. These attacks often occur via emails or fake websites.
3. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks: DoS and DDoS
attacks flood a network or server with excessive traffic, causing it to become slow or
unavailable to legitimate users. These attacks are commonly used to disrupt businesses and
online services.

4. Unauthorized Access (Hacking): Hackers exploit vulnerabilities in network systems to gain


unauthorized access to sensitive data or systems. This can lead to data breaches, theft of
intellectual property, or unauthorized control over devices.

5. Insider Threats: Insider threats occur when employees or individuals with legitimate access
misuse their privileges to harm the network or steal sensitive data. This threat can arise from
malicious intent, negligence, or lack of awareness.

6. Data Interception and Theft: Attackers can intercept data being transmitted over a network,
particularly in unsecured or poorly encrypted systems. This can lead to theft of confidential
information such as personal data, financial details, or business secrets.

7. Man-in-the-Middle (MITM) Attacks: In MITM attacks, a hacker intercepts and manipulates


communication between two parties without their knowledge. This type of attack is often used
to steal sensitive information or alter communications.

8. Exploitation of Software Vulnerabilities: Outdated or poorly maintained software can contain


vulnerabilities that attackers exploit to gain access to a network or system. Regular updates and
patches are essential to mitigate this risk.

9. Botnets: A botnet is a network of infected devices controlled by a malicious actor. These


devices, often unknown to their owners, are used to carry out cyberattacks, send spam, or mine
cryptocurrency.

10. Lack of Encryption: Unencrypted communication over networks exposes data to


interception and misuse. Without strong encryption protocols, sensitive information can easily
be accessed by attackers.
Mitigation Strategies

 Use robust antivirus and anti-malware software.


 Employ firewalls and intrusion detection/prevention systems (IDS/IPS).
 Educate users on identifying phishing and social engineering attempts.
 Regularly update software and apply security patches.
 Use strong encryption for data transmission and storage.
 Implement multi-factor authentication and access control measures.
References:

TutorialsPoint. (n.d.). Common Network Security Threats. https://www.tutorialspoint.com

Norton. (n.d.). Internet Security Threats. https://us.norton.com

TutorialsPoint. (n.d.). Difference Between Wired and Wireless Network.


https://www.tutorialspoint.com

Tanenbaum, A. S., & Wetherall, D. J. (2011). Computer Networks (5th ed.). Pearson.

You might also like