Network Security and Communication in Networks

Chapter 2: Networks
Bridges
  • Definition: Bridges are devices used to connect whole Local Area Networks (LANs) to another LAN, provided both LANs utilize the same network protocol.

Routers
  • Definition: Routers are hardware devices that read address information to determine the final destination of packets.

  • Functions of a Router:

    • Used to connect a LAN to another Wide Area Network (WAN) or the internet.

    • Facilitates data transfer between networks.

    • Receives data packets from any sender and directs them to the appropriate switch, which then sends them to the correct computer.

    • Maintains an IP address table to store information about computers and devices in the network.

  • Data Packet Routing Process:

    1. When a data packet is received, the router inspects the IP addresses to determine if the packet is intended for its network.

    2. If the data is for a device within the network, the data packet is either sent directly to the device or to the hub/switch of the network by referencing the IP address table. If the data is not for the network, it is redirected to another router.


Chapter 2: Physical and Health Security
Health Risks
  • Back and Neck Pain

  • Repetitive Strain Injury (RSI)

  • Eyestrain

  • Headaches

Causes of Health Issues:
  • Prolonged periods in the same position.

  • Continuous keyboard and mouse usage.

Mitigation Strategies:
  • Take regular breaks.

  • Use foot rests and maintain correct posture.

  • Utilize tilted screens and ergonomic equipment.

  • Proper wrist positioning during work.

  • Activate voice-controlled software if applicable.

  • Implement screen filters to avoid glare and flickering.

Eye Health:
  • Ensure proper lighting and ventilation.

  • Test eyes regularly, especially after prolonged screen exposure.


Chapter 2: Safety and Electronic Security
Risks:
  • Electrocution

  • Fire Hazards

  • Heavy Equipment Risks

Prevention Methods:
  • Always check wire insulation.

  • Avoid food near computers.

  • Secure/heavy-duty desks/tables should be in use.

  • Ensure proper cable management and check that equipment vents are not blocked.

  • Maintain electrical units and avoid overloading outlets with multiple devices.


Chapter 2: Internet Safety and Data Security
Internet Browsing Safety Tips:
  • Avoid disclosing personal information to unknown entities.

  • Do not share photos of yourself.

  • Adjust privacy settings on social media platforms.

  • Ensure websites are secure (look for HTTPS).

  • Only open emails from known sources.

  • Block suspicious users and never arrange personal meetings without adult supervision.

Data Security Risks:
  • Hacking: Unauthorized access to personal information.

  • Phishing: Emails soliciting personal information, often leading to identity theft.

  • Smishing (SMS Phishing): Using mobile messages for phishing purposes.

  • Vishing (Voice Phishing): Phone calls attempting to solicit private information.

  • Viruses and Spyware: Malicious software copying data or causing malfunctions.

  • Spam: Repeated unsolicited messages leading to information overload.

Ways to Prevent Risks:
  • Utilize firewalls and anti-virus software.

  • Regularly update passwords and account security settings.

  • Be cautious with links and avoid opening suspicious attachments.

  • Employ spam filters to manage unsolicited emails.


Chapter 2: Additional Security Protocols
Firewall
  • Function: Monitors and controls incoming and outgoing network traffic.

  • Limitations: Cannot prevent individuals from accessing networks with carelessness; can be disabled on standalone computers.

Security Protocols:
  • SSL (Secure Socket Layer): Ensures secure data transmission over the internet, indicated by HTTPS.

  • TLS (Transport Layer Security): Provides enhanced encryption and authentication for data integrity and security.

    • Handshake Protocol: Authenticates the user and server during sessions.

    • Session Caching: Reduces processing time by allowing new or modified sessions.

Encryption
  • Purpose: Protects data from unauthorized access by encoding messages using a secret key.

  • Key Types:

    • Encryption Key: Used to encode the message.

    • Decryption Key: Used to decode the message.

  • Terminology:

    • Cipher Text: Encrypted message.

    • Plain Text: Decrypted message.


Chapter 2: Authentication
Digital Certificates
  • Contain both a public and a private key, linking information to a trusted source.

  • Include:

    • Email Address

    • Certificate Owner

    • Serial Number

    • Expiry Date

    • Public Key

    • Issuing Authority

Passwords
  • Should be complex, combining uppercase, lowercase, numbers, and symbols.

  • Regular updates are recommended, and a limited number of login attempts is essential.

Alternative Authentication Methods:
  1. Zero Login: Allows login without a password, typically through OTPs (One-Time Passwords).

    • Advantages: Fast, reduces forgotten password issues.

    • Disadvantages: Vulnerable if the secondary method is compromised.

  2. Physical Tokens: Devices like USB keys used for identity confirmation (strong 2FA).

  3. Electronic Tokens: Apps on smartphones for verification (e.g., Google Authenticator).

  4. Biometric Methods: Uses physical traits for identity verification (e.g., fingerprints, facial recognition).

    • Advantages: Unique and non-intrusive; quick confirmation.

    • Disadvantages: Expensive and can be intrusive; anomalies may affect reliability.


Chapter 2: Communication Constraints
Legal Aspects:
  • Obtain permission before sending emails in many jurisdictions.

  • Ensure emails include a valid postal address for verification, particularly when sent from organizations.

Acceptable Language in Communication:
  • Avoid offensive, obscene, or otherwise inappropriate language.

Copyright Issues:
  • Ensure compliance with copyright laws in forwarding emails or using specific content.

Security Measures:
  • Strong passwords and spam filters are critical to maintaining email security.


Chapter 5: Audience Appreciation in Presentations
Factors Influencing Presentations:
  1. Age: Tailor content for children versus adults.

  2. Audience Experience: Consider the sophistication of the audience (students vs. professionals).

  3. Expectations: Align content with what the audience is interested in.

  4. Knowledge Level: Differentiate approaches based on the audience's background in the subject matter.

Research Methods for Audience Understanding:
  1. Conduct interviews.

  2. Distribute questionnaires.

  3. Perform thorough market research for audience analysis.