Network Security and Communication in Networks
Chapter 2: Networks
Bridges
Definition: Bridges are devices used to connect whole Local Area Networks (LANs) to another LAN, provided both LANs utilize the same network protocol.
Routers
Definition: Routers are hardware devices that read address information to determine the final destination of packets.
Functions of a Router:
Used to connect a LAN to another Wide Area Network (WAN) or the internet.
Facilitates data transfer between networks.
Receives data packets from any sender and directs them to the appropriate switch, which then sends them to the correct computer.
Maintains an IP address table to store information about computers and devices in the network.
Data Packet Routing Process:
When a data packet is received, the router inspects the IP addresses to determine if the packet is intended for its network.
If the data is for a device within the network, the data packet is either sent directly to the device or to the hub/switch of the network by referencing the IP address table. If the data is not for the network, it is redirected to another router.
Chapter 2: Physical and Health Security
Health Risks
Back and Neck Pain
Repetitive Strain Injury (RSI)
Eyestrain
Headaches
Causes of Health Issues:
Prolonged periods in the same position.
Continuous keyboard and mouse usage.
Mitigation Strategies:
Take regular breaks.
Use foot rests and maintain correct posture.
Utilize tilted screens and ergonomic equipment.
Proper wrist positioning during work.
Activate voice-controlled software if applicable.
Implement screen filters to avoid glare and flickering.
Eye Health:
Ensure proper lighting and ventilation.
Test eyes regularly, especially after prolonged screen exposure.
Chapter 2: Safety and Electronic Security
Risks:
Electrocution
Fire Hazards
Heavy Equipment Risks
Prevention Methods:
Always check wire insulation.
Avoid food near computers.
Secure/heavy-duty desks/tables should be in use.
Ensure proper cable management and check that equipment vents are not blocked.
Maintain electrical units and avoid overloading outlets with multiple devices.
Chapter 2: Internet Safety and Data Security
Internet Browsing Safety Tips:
Avoid disclosing personal information to unknown entities.
Do not share photos of yourself.
Adjust privacy settings on social media platforms.
Ensure websites are secure (look for HTTPS).
Only open emails from known sources.
Block suspicious users and never arrange personal meetings without adult supervision.
Data Security Risks:
Hacking: Unauthorized access to personal information.
Phishing: Emails soliciting personal information, often leading to identity theft.
Smishing (SMS Phishing): Using mobile messages for phishing purposes.
Vishing (Voice Phishing): Phone calls attempting to solicit private information.
Viruses and Spyware: Malicious software copying data or causing malfunctions.
Spam: Repeated unsolicited messages leading to information overload.
Ways to Prevent Risks:
Utilize firewalls and anti-virus software.
Regularly update passwords and account security settings.
Be cautious with links and avoid opening suspicious attachments.
Employ spam filters to manage unsolicited emails.
Chapter 2: Additional Security Protocols
Firewall
Function: Monitors and controls incoming and outgoing network traffic.
Limitations: Cannot prevent individuals from accessing networks with carelessness; can be disabled on standalone computers.
Security Protocols:
SSL (Secure Socket Layer): Ensures secure data transmission over the internet, indicated by HTTPS.
TLS (Transport Layer Security): Provides enhanced encryption and authentication for data integrity and security.
Handshake Protocol: Authenticates the user and server during sessions.
Session Caching: Reduces processing time by allowing new or modified sessions.
Encryption
Purpose: Protects data from unauthorized access by encoding messages using a secret key.
Key Types:
Encryption Key: Used to encode the message.
Decryption Key: Used to decode the message.
Terminology:
Cipher Text: Encrypted message.
Plain Text: Decrypted message.
Chapter 2: Authentication
Digital Certificates
Contain both a public and a private key, linking information to a trusted source.
Include:
Email Address
Certificate Owner
Serial Number
Expiry Date
Public Key
Issuing Authority
Passwords
Should be complex, combining uppercase, lowercase, numbers, and symbols.
Regular updates are recommended, and a limited number of login attempts is essential.
Alternative Authentication Methods:
Zero Login: Allows login without a password, typically through OTPs (One-Time Passwords).
Advantages: Fast, reduces forgotten password issues.
Disadvantages: Vulnerable if the secondary method is compromised.
Physical Tokens: Devices like USB keys used for identity confirmation (strong 2FA).
Electronic Tokens: Apps on smartphones for verification (e.g., Google Authenticator).
Biometric Methods: Uses physical traits for identity verification (e.g., fingerprints, facial recognition).
Advantages: Unique and non-intrusive; quick confirmation.
Disadvantages: Expensive and can be intrusive; anomalies may affect reliability.
Chapter 2: Communication Constraints
Legal Aspects:
Obtain permission before sending emails in many jurisdictions.
Ensure emails include a valid postal address for verification, particularly when sent from organizations.
Acceptable Language in Communication:
Avoid offensive, obscene, or otherwise inappropriate language.
Copyright Issues:
Ensure compliance with copyright laws in forwarding emails or using specific content.
Security Measures:
Strong passwords and spam filters are critical to maintaining email security.
Chapter 5: Audience Appreciation in Presentations
Factors Influencing Presentations:
Age: Tailor content for children versus adults.
Audience Experience: Consider the sophistication of the audience (students vs. professionals).
Expectations: Align content with what the audience is interested in.
Knowledge Level: Differentiate approaches based on the audience's background in the subject matter.
Research Methods for Audience Understanding:
Conduct interviews.
Distribute questionnaires.
Perform thorough market research for audience analysis.