Document Details

NiftyDune1110

Uploaded by NiftyDune1110

Imam Abdulrahman Bin Faisal University

2024

Tags

computer skills network security internet fundamentals computer science

Full Transcript

Imam Abdulrahman Bin Faisal Deanship of Preparatory Year & University Support Studies ‫جامعة اإلمام عبدالرحمن بن فيصل‬ ‫عمادة السنة التحضيرية والدراسات‬ ‫المساندة‬ Computer...

Imam Abdulrahman Bin Faisal Deanship of Preparatory Year & University Support Studies ‫جامعة اإلمام عبدالرحمن بن فيصل‬ ‫عمادة السنة التحضيرية والدراسات‬ ‫المساندة‬ Computer Skills Chapter 1 Computing Fundamentals Week 3 – Lesson 2 Networks and Security Term 1: 2024-2025 Test your knowledge  What do know about networks?  What is the Internet?  What is the Internet Security?  How do you protect yourself while surfing the Net? 2 Lesson outcomes Explain the basics of networking. Explain how the Internet works. Describe cybersecurity, hackers, malware, and other online annoyances and the threats they pose to your digital security. Describe various ways to protect your digital property and data from theft and corruption. 3 Networks: Connection Computing Devices & How the Internet works Networks  A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource- sharing among a wide range of users.  Networks are used to: Facilitate communication via email, video conferencing, instant messaging, etc. Enable multiple users to share a single hardware device like a printer or scanner Enable file sharing across the network Allow for the sharing of software or operating programs on remote systems Make information easier to access and maintain among network users. 5 How fast does data move through ?networks  Data Transfer Rate (also called Bandwidth) is the maximum speed at which data can be transmitted between two nodes on a network.  Data transfer rate are usually measured in megabits per second (Mbps) or gigabits per second (Gbps). 6 Network architectures  Networks can range from the smallest network of just one person, in one room with multiple connected devices, to the largest network that spans between cities and even the world.  One of the major differences is the geographical area they cover.  The following are common types of networks: Local Area Networks (LANs): Network in small geographical area (Room, Building or Campus). Metropolitan Area Networks (MAN): Network in a City. Wide Area Networks (WANs): Network spread geographically (Country or across Globe). 7 The Internet  The Internet is a global network that links computer networks all over the world so that users can share resources and communicate with each other.  People use it as a medium to connect with other people, sharing files, entertainment, information and lots of other activities that are useful and beneficial in many terms.  Connection could be: Wired using telephone lines or cables. Wireless based on communication satellites.  Internet Service Providers (ISP): companies that provide the user with access to the internet. Examples of ISP: STC, Mobily, Zain … 8 The Internet and How It Works  The Internet-connected devices communicate with each other as we do when we ask a question or reply with an answer.  A computer (or other device) connected to the Internet acts in one of two ways: o Client: a computer that asks for data. o Server: a computer that receives the request and returns the data to the client.  Because the Internet uses clients and servers, it’s referred to as a client/server network.  When a client computer puts out a request for information from the server computer, the request travels along transmission lines. These transmission lines are similar to our highway system of roads,9 Connecting to the Internet What exactly is broadband Internet ?access  Broadband, often referred to as high-speed Internet, refers to a type of connection that Whatoffers typesa means to connect toare of broadband the Internet with fast throughput. ?available  The standard wired broad- band technologies in most areas are: o Cable. o DSL (digital subscriber line). o Fiber-Optic service. o Satellite broadband is used mostly in rural or mountain areas where DSL, cable, or fiber-optic service is unavailable or very costly. 10 Connecting to the Internet How do I get mobile ?broadband  Just as you have an ISP for Internet access for your desktop or laptop computer, you must have a wireless Internet service provider (or wireless ISP) such as STC, Zain and Mobily to connect your smartphone to the Internet.  Mobile broadband technologies are categorized in generations: 4G & 5G. 11 The Internet and How It Works  The World Wide Web (WWW) or (The Web), known as the Web, it is a global interactive system that lets you access information on the Internet.  The web is based on the HyperText Transfer Protocol (HTTP), which is why you see an http:// at the beginning of web addresses.  HTTP is the protocol that allows files to be transferred from a web server—a computer that hosts the website you’re requesting—so that you can see it on your computer.  The HTTP protocol is what the web is based on. Since it is so universal, most current browsers no longer require you to enter the http:// protocol 12or How does the data get sent to the ? correct computer  Each time you connect to the Internet, your computer is assigned a unique identification number, called Internet Protocol (IP) address.  IP address is a set of four groups of numbers separated by periods, and is commonly referred to as a dotted quad or dotted decimal (Such as 123.45.245.91).  IP address is a unique identification number that defines each computer, service, or other device connected to the Internet. Example: Amazon’s website has an IP address of 72.21.211.176 and a name of www.amazon.com. When you enter www.amazon.com into your browser, your computer (with its unique IP address) looks for Amazon’s IP address (72.21.211.176). 13 I’ve been on the Internet, so why have I ?never seen IP addresses  Because the numbers that make up IP addresses are difficult for people to remember, websites are given text versions of their IP addresses called Domain Name.  Domain name is a name that takes the place of an IP address, making it easier for people to remember.  For example, google.com is a domain name. The server where Google’s main website is deployed has an IP address (such as 173.194.205.101), but it’s much easier for you to remember to tell your browser to go to google.com. 14 ?What a URL means  Web Address or URL: Stands for Uniform Resource Locator. Web addresses usually start with the letters WWW and end with a dot followed by letters that indicate the type of website or called domain. Domains divided the web sites into categories based on their natures or provided services. Common domains are: 1..com = commercial enterprise or business 2..org = non-profit organization 3..edu = educational institution 4..gov = government agency 5..mil = military agency 6..net = another ending for a commercial website 15 ?What is a web browser exactly  A web browser is software that lets you locate, view, and navigate the web.  Most browsers today are graphical browsers, meaning they can display pictures (graphics) in addition to text and other forms of multimedia such as sound and video. 16 Computer Security: Securing your System ?What defines a hacker  A hacker is most commonly defined as anyone who unlawfully breaks into a computer system—either an individual computer or a network. o White-hat hackers (ethical hackers)  3 types of hackers: Break into systems for non-malicious reasons, such as to test system security vulnerabilities or to expose undisclosed weaknesses. o Black-hat hackers Break into systems to destroy information or for illegal gain. o Gray-hat hackers Are a bit of a cross between black and white—they often illegally break into systems merely to flaunt 18their expertise. Cybersecurity  Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.  These cyber threats are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.  Attackers are always looking for new ways to exploit emerging weaknesses. 19 Type of Cyber Threats (1) Malware  Malware is intentionally malicious software or code that is designed to damage your computer or collect information without your knowledge. Viruses, Worms, Trojan horses, and ransomware are all considered malware. 1. A virus is a self-replicating program that is designed to infect a computer by rapidly spreading from one file to another, sometimes causing great harm. 2. Worms are similar to viruses; except they are usually spread over a network without human help. 3. Trojan horse is a type of malware that appears to be benign or desirable and thus tricks the user into allowing the program access to their computer, usually through a download or email attachment. 20 Type of Cyber Threats (2) Malware 4. Spyware is a type of malware that collects information about users without their knowledge, often to track browsing habits and to create pop-up advertisements. Along with invading your privacy, it can sometimes interfere with a computer’s functions. 5. Ransomware: A type of malware that locks down files, data or systems, and threatens to erase or destroy the data - or make private or sensitive data to the public - unless a ransom is paid to the cybercriminals who launched the attack. 21 Type of Cyber Threats (3) Online Annoyances  Adware is software that displays sponsored advertisements in a section of your browser window or as a pop-up box. It’s considered a legitimate, though sometimes annoying, means of generating revenue for those developers who don’t charge for their software or information. Web browsers such as Safari, Chrome, and Edge have built-in pop- up blockers to reduce the occurrence of annoying pop-ups.  Spam: o Is an unwanted or junk e-mail. o If you’ve used your e-mail address to purchase anything online, open an online account, or participate in a social network such as Facebook, your e-mail address eventually will appear on one of the lists that spammers get. o One way to avoid spam in your primary account is to create a secondary e-mail address that you use only when you fill out forms or buy items on the Web. 22 Protect Your Self  Get a good antivirus software  Antivirus software can protect you from infected email attachments, corrupt Websites, Internet worms, and spyware  The protection you obtain should include the following three components: 1. Antivirus: Specifically protects against viruses. 2. Anti-spyware: Protects against malicious software that may be gathering your information without your knowledge. 3. Firewall: Screens out threats that try to reach your computer over the Internet.  Some security suites offer several additional protections, but these are the three main components you.will need 23 Keeping Your Data Safe 1) Protecting your personal information 2) Backing up your data Backups are copies of files that you can use to replace the originals if they’re lost or damaged. 24 How to Protect yourself against cyber ? attack  Update your software and operating system.  Use anti-virus software.  Use strong passwords.  Do not open email attachments from unknown senders.  Do not click on links in emails from unknown senders or unfamiliar websites.  Avoid using unsecure WiFi networks in public places. 25 ! Thanks For Your Attention ?ANY QUESTIONS 26

Use Quizgecko on...
Browser
Browser