Chapter 7: Networking and Security 7.1 Networking Fundamentals A network is a computer system that uses communication equipment to connect two or more computers and their resources. In other words, a network is an interconnected system of computers, terminals, and communications channels and devices. Networking includes local area networks (LAN) which are designed to share data and resources among several individual computer users in an office or building. The basic components for networking consists of communication system used to transmit the messages are (1) a sending device (2) a communication channel, and (3) a receiving device. A communication network is any arrangement where a sender transmits a message to a receiver over a channel consisting of some type of medium (communication channel). Figure 7.1 illustrates a simple conceptual model of a telecommunication network, which shows that it consists of five basic categories of components. Telecommunication Processors PCs, NCs and other terminals Telecommunications channels Telecommunication Processors Computers Figure 7.1: The five basic components for telecommunications network Terminals, such as networked personal computers, network computers, or information appliances. Any input/output device that use telecommunication networks to transmit or receive data is a terminal, including telephones and the various computer terminals. Telecommunications processors, which support data transmission and reception between terminals and computers. These devices, such as modems, switches, and routers, perform a variety of control and support functions in a telecommunications network. For example, they convert data from digital to analog and back, code and decode data, and control the speed, accuracy, and efficiency of the communications flow between computers and terminals in a network. Telecommunications channels over which data are transmitted and received. Telecommunications channels may use combinations of media, such as copper wires, coaxial cables, or fiber-optic cables, or use wireless systems like microwave, communications satellite, radio, and cellular systems to interconnect the other components of a telecommunications network. Computers of all sizes and types are interconnected by telecommunications networks so that they can carry out their information processing assignments. For example, a mainframe computer may serve as a host computer for a larger network, assisted by a midrange computer serving as a front-end processor, while a microcomputer may act as a network server in a small network. Telecommunications control software consists of programs that control telecommunications activities and manage the functions of telecommunications networks. Examples include network management programs of all kinds, such as a telecommunications monitors for mainframe host computers, network operating systems for network servers, and Web browsers for micro-computers. 7.2 Network Architectures and Protocols Network Architecture. The goal of network architectures is to promote an open, simple, flexible, and efficient telecommunications environment. This is accomplished by the use of standard protocols, standard communications hardware and software interfaces, and the design of a standard multilevel interface between end users and computer systems. Protocols. A protocol is a standard set of rules and procedures for the control of communications in a network. However, these standards may be limited to just one manufacturer’s equipment, or to just one type of data communications. Part of the goal of communication network architecture is to create more standardization and compatibility among communication protocols. One example of a protocol is a standard for the physical characteristics of the cables and connectors between terminals, computers, modems, and communication lines. Other examples are the protocols that establish the communication control information needed for handshaking which is the process or exchanging predetermined signals and characters to establish a telecommunications session between terminals and computers. Other protocols deal with control of data transmission reception in a network, switching techniques, internetwork connections, and so on. The OSI Model. The International Standards Organization (ISO) has developed a sevenlayer Open Systems Interconnection (OSI) model to serve as a standard model for network architectures. Dividing data communications functions into seven distinct layers promotes the development of modular network architectures, which assists the development, operation, and maintenance of complex telecommunications networks. Figure 7.2 illustrates the functions of the seven layers of the OSI model architecture. The Internet’s TCP/IP. The Internet uses a system of telecommunications protocols that has become so widely used that it is equivalent to a network architecture. The Internet’s protocols suite is called Transmission Control Protocol/Internet Protocol and is known as TCP/IP. As figure 7.2 shows, TCP/IP consists of five layers of protocols that can be related to the seven layers of the OSI architecture. TCP/IP is used by the Internet and by all intranets and extranets. Many companies and other organizations are thus converting their client/server networks to TCP/IP technology, which are commonly known as IP networks. TCP/IP Application for Process Layer Application Layer Provides communications services for end user applications Presentation Layer Provides appropriate data transmission formats and codes Session Layer Support the accomplishment of telecommunications sessions Host-to-Host Transport Layer Transport Layer Supports the organization and transfer of data between nodes in the network Internet Protocol (IP) Network Layer Provides appropriate routing by establishing connections among network links Network Interface Data Link Layer Supports error-free organization and transmission of data in the network Physical Layer Physical Layer Provides physical transmission of data on the telecommunications media in the network Figure 7.2: The seven layers of the OSI communications network architecture, and the five layers of the Internet’s TCP/IP protocol suite 7.3 Type of Communications Networks Many different types of networks serve as the telecommunications infrastructure for the Internet, intranets and extranets. However, from the end user’s point of view, there are only a few basic types, such as wide area and local area networks and client/server, network computing, and peer-to-peer networks. Wide Area Network. Telecommunications networks covering a large geographic area are called wide area network (WAN) (figure 7.3a). Networks that cover a large city or metropolitan area (metropolitan area networks) can also be included in this category. Such large networks have become a necessity for carrying out the day-to-day activities of many business and government organizations and their end users. For example, WANs are used by many multinational companies to transmit and receive information among their employees, customers, suppliers, and other organizations across cities, regions, countries and the world. Figure 7. 3 (a) Wide Area Network (b) Local Area Network Local Area Networks. Local Area Networks (LANs) connects computers and other information processing devices within a limited physical area, such as an office, classroom, building, manufacturing plant, or other work site (figure 7.3b). LANs have become commonplace in many organizations for providing telecommunications network capabilities that link end users in offices, departments and other workgroups. LANs use a variety of telecommunications media, such as ordinary telephone wiring, coaxial cable, or even wireless radio and infrared system, to interconnect microcomputer workstations and computer peripherals. To communicate over the network, each PC usually has a circuit board called a network interface card. Most LANs use a more powerful microcomputer having a large hard disk capacity, called a file server or network server, that contains a network operating system program that controls telecommunications and the use and sharing of network resources. For example, it distributes copies of common data files and software packages to the other microcomputers in the network and control access to shared laser printers and other network peripherals. Virtual Private Networks. Most organizations use Virtual Private Networks (VPNs) to establish secure intranets and extranets. A virtual private networks is a secure network that uses the Internet as its main backbone network but relies on the fire walls and other security features of its Internet and intranet connections and those of participating organizations (figure 7.4a). Thus, for example, VPNs would enable a company to use the Internet to establish secure intranets between its distant branch offices and the manufacturing plants, and secure extranets between itself and its customers and suppliers. Virtual private networks (VPN) provide an encrypted connection between a user's distributed sites over a public network (e.g., the Internet). By contrast, a private network uses dedicated circuits and possibly encryption. This page describes IP-based VPN technology over the Internet, though an organization might deploy VPN's on its internal nets (intranets) to encrypt sensitive information. The basic idea is to provide an encrypted IP tunnel through the Internet that permits distributed sites to communicate securely. The encrypted tunnel provides a secure path for network applications and requires no changes to the application. Client/Server Networks. Client/server networks have become the predominant information architecture of enterprise wide computing. Client/server network consists of one powerful computer that coordinates and supplies to all other nodes on the network. Server nodes coordinate and supply specialized services, and client nodes request the services. In a client/server networks, end-user PC or NC workstations are the clients. They are interconnected by local area networks and share application processing with network servers, which also manage the networks (figure 7.4b). This arrangement of clients/servers is sometimes called two-tier client/server architecture. Local area networks are also interconnected to other LANs and WANs of client workstations and servers. Figure 7.4 (a) Virtual Private Networks (b) Client/Server Networks. A continuing trend is the downsizing of larger computer systems by replacing them with client/server networks. For example, a client/server network of several interconnected LANs may replace a larger mainframe-based network with many end user terminals (figure 7.5). This typically involves a complex and costly effort to install new applications software that replaces the software of older, traditional mainframe-based business information systems, now called legacy systems. Client/server networks are seen as more economical and flexible than legacy systems in meeting end user, workgroup, and business unit needs, and more adaptable in adjusting to a diverse range of computing workloads. Servers Client system Types: PCs, Network computers, workstations, Macintoshes. Functions: Provide user interface, perform some / most processing on an application Types: Servers, workstations, or midrange systems. Functions: Shared computation, application control, distributed databases Host systems/ superservers Types: mainframes and midrange systems. Functions: Central databases control security, directory management, heavyduty processing. Figure 7.5: The functions of the computer systems in client/server networks. Network Computing. Network computing or network-centric concept views networks as the central computing resources of any computing environment. The growing reliance on the computer hardware, software, and data resources of the Internet, intranets, extranets, and other networks has emphasized that for many users, ‘the network is the computer’ (figure 7.6). User interface Network computer and other clients provide a browserbased user interface for applet processing System and application software Application servers for multi-user operating systems, Web server software, and application software applets Database and database management Database servers for Internet/intranet Web databases, operational databases, and database management software Figure 7.6 The functions of the computer systems in network computing Peer-to-peer networks. This network is a civilization –altering event for the media industry. Every consumer now is a producer, distributor, and marketer of intellectual property and information content (a ’human node’) with vast new powers. In a P2P network it creates a computing environment where end users computers connect, communicate, and collaborate directly with each other via Internet or other telecommunications network links. The emergence of peer-to-peer (P2P) networking technologies and applications is being hailed as a development that will revolutionize e-business and e-commerce and the Internet itself. Peer-to-peer network is a powerful telecommunications networking tool for many business applications (figure 7.7). Figure 7.7 Peer-to-peer networks Napster Peer-to-Peer Networks Architecture The program "Napster" came into being in January 1999 when Shawn Fanning, a freshman at Northeastern University, wrote an application to allow music sharing between people in his dormitory. Napster Inc. was founded in May of that year and scaled up to massive 21 million users. It took only until December 1999 before the record industry of America sued Napster for copyright infringements and currently, although Napster is still in operation, it has only a tiny fraction of its once huge user base. Napster is based on a client - server architecture. The role of the server is to hold a searchable index that contains entries of mp3s that all the currently connected clients contain. The server is actually multiple very hi-spec machines load balancing the requests from clients. This makes scaling the service simply a matter of adding machines into the server pool and ensures redundancy in the fact that servers can fail and be replaced without significant disruption to the service they are providing. Redundancy needs to be implemented for the connection between client and server as well so the servers are placed on multiple connections to different large ISPs. The clients have the functionality of being able to index and associate meta-data with shared mp3s on their own machine. This information is then sent to the Napster servers when connecting. At this point the client may search all clients connected on Napster by sending search queries to the Napster server. The server will search its internal indexes of currently shared files and return results to match. The results contain the meta-data about the file, the location of the file and speed of the clients that are sharing the files. If the client wishes to download one of the files contained in the search results then it connects directly to the other client sharing the file and begins the download. The file itself never passes through or is stored on the Napster server. This is the peer-to-peer aspect of the protocol. In the Napster architecture, P2P file-sharing software connects the user’s PC to a central server that contains a directory of all of the other users (peers) in the network. When users request a file, the software searchers the directory for any other users who have that file and are online at the moment. It then sends you a list of the users’ names that are active links to all users. Figure 7.8 Napster Peer-to-peer network architecture Gnutella Peer-to-Peer Networks Architecture On the 14th of March 2000 Nullsoft, a subsidiary of America Online, released a file sharing application called GNUtella that allowed file swapping without the need of a central indexing server and therefore no central point of failure, and no central point to sue for copyright infringements. On April 10th America Online declared GNUtella to be a rogue project and terminated it, but not before the program had been downloaded and replicated by thousands of users around the net. Over the next few weeks the protocol was reverse engineered and GNUtella clones began to appear. The Gnutella architecture is a pure peer-to-peer network since there is no central directory or server. First, the file-sharing software in Gnutella-style P2P network connects your PC with one of the online users in the network. Then an active link to your user name is transmitted from peer to peer to all the online users in the network that the first user (an all other online users) encountered in previous sessions. In this way, active links to more and more peers spread throughout the network the more it is used. GNUtella's architecture is completely decentralised and distributed, meaning that there are no central servers and that all computations and interactions happen between clients. All connections on the network are equal. When a client wishes to connect to the network they run through a list of nodes that are most likely to be up or take a list from a website and then connect to how ever many nodes they want. This produces a random unstructured network topology. Routing in the network is accomplished through broadcasting. When a search request arrives into a client that client searches itself for the file and broadcasts the request to all its other connections. Broadcasts are cut off by a time to live that specifies how many hops they may cover before clients should drop them rather than broadcast them. There is a small degree of anonymity provided on GNUtella networks by this packet routing technique. Any client that receives a packet doesn't know if the client it has received the packet from is the original sender or just another link in the chain. This is somewhat undermined however by the fact that nearly all packets on the network start with a TTL (time to live) of 7 and therefore if you receive a packet with a TTL of 7 you can be nearly certain that the packet has originated from your immediate upstream neighbour. GNUtella allows the functionality of being able to search for files. All other operations such as uploads and downloads occur outside of the network and will be explained later. Figure 7.9 Gnutella Peer-to-Peer Networks Architecture 7.4 Network Topologies Topology describes the appearance or layout of a network and how data flows through the network. A network is a computer system that uses communication equipment to connect computers. They can be connected in different ways. The physical layout of a network is called a topology. There are three common topologies: star, ring, and bus networks. In a network topology, a component is called a node, which is usually a computer on a network. (The term node is also use to refer to any device connected to a network, including the server, computers, and peripheral device such as printers.) Star network. A star network has a hub computer that is responsible for managing the network. A star network features a central connection point called a hub that may be a hub, switch or router (figure 7.10). All devices are connected to a central point called a hub. These hubs collect and distribute the flow of data within the network. Signals from the sending computer go to the hub and are then transmitted to all computers on the network. Large networks can feature several hubs. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet. A star network is easy to troubleshoot because all information goes through the hub, making it easier to isolate problems. Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer’s network access and not the entire LAN. The main advantages of a star network are: a) All messages are routed through the central computer, which act as a traffic cop to prevent collisions. b) Any connection failure between a node and the hub will not affect the overall system. The main disadvantage of a star network is: a) if the hub computer fails the network fails. Figure 7.10 Star Network Ring network. A ring network links all nodes together in a circular chain. Data message travel in only one direction around the ring (figure 7.11). Any data that passes by is examined by the node to see if it is the addressee; it not, the data is passed on to the next node in the ring. In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either “clockwise” or “counterclockwise”). A failure in any cable or device breaks the loop and can take down the entire network. Ring topologies are found in some office buildings or school campuses. The main advantage of a ring network is: a) Since data travels in only one direction, there is no danger of data collision. The main disadvantage of a ring network is: a) is one node fails, the entire network fails. Figure 7.11 Ring Network Bus network. A bus network has a single line to which all the network nodes are attached (figure 7.12). Computers on the network transmit data in the hope that it will not collide with data transmitted by other nodes; if this happens, the sending node simply tries again. Nodes can be attached to or detached from the network without affecting the network. Furthermore, if one node fails, it does not affect the rest of the network. Figure 7.12 BUS Network Bus networks use a common backbone to connect all devices. The backbone is a high capacity communications medium that joins networks and central network devices on the same floor in a building. A single cable, the backbone functions as a shared communication medium, that device attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. The main advantages of a bus network are: Easier to locate problem workstations depending on the backbone can provide very fast networks The main disadvantage of bus networks are: issues with security as data is broadcasted across the network Single point of failure - if hub or backbone goes down 7.5 Keeping Your Home Computer Safe Protect hardware. There is an active market for stolen personal computers and their internal components. As a remedy, all computer hardware and computers’ internal components should be locked. In addition, personal computers users need to be concerned about the computer’s environment. Personal computers are designed to withstand the wear and tear of the office environment. Most manufactures discourage eating and smoking near computers and recommend some specific cleaning techniques, such as vacuuming the keyboard. Back up File. You should back up your files at regular basis. Some people simply make another copy of their hard disk files on diskettes. A better way to back up your files on a tape because it is faster and safer. You can also use software that will automatically back up all your files at certain time of the day. 7.6 Computer Threats: Hackers Hackers are enthusiastic, largely self-taught computer user who gains access to computer systems illegally, usually from a personal computer. The term hackers used to mean a person with significant computer expertise, but the term has taken on more sinister meaning with the advent of computer miscreants. Hackers ply their craft for a variety of reason but most often to show off for their peers or to harass people they do not like. A favorite tricks, for example, is turn a rival’s telephone into a pay phone, so that when his or her parent try to dial a number an operator would interrupt to say, “please deposit 25 cent.” A hacker may have more sinister motives, such as getting computer services without paying for them or getting information to sell. You will probably not be surprised to learn that hackers have invaded websites. These vandals show up with what amounts to a digital spray can, defacing sites with taunting boasts, graffiti, and their own private jokes. Although the victims feel violated, the perpetrator views their activities as mere pranks. Hackers and Other Miscreants Hacking has long been thought the domain of teenagers with time on their hands. The pattern is changing, however. A recent government survey showed that the computer system of over half of the largest U.S. corporations had been invaded, but not by teenagers. Most intruders were competitors stealing proprietary information. For example, suppose a biomedical company discovers just one little research secret in a competitor’s computer files; the snooping company may then be the first to market with a drug that the invaded company has been working on for years. Even more astounding, federal investigators told a U.S. Senate hearing that the abilities of other nations, which, in a worst-case scenario, could seriously degrade the military’s ability to deploy and sustain military forces. Hackers ply their craft by surprisingly low-tech means. Using what is called social engineering, a tongue-in-check term for con artist actions, hackers simply persuade unsuspecting people to give away their passwords over the phone. Recognizing the problem, employers are educating their employees to be alert to such scams. Hackers are only a small fraction of the security problem. The most serious losses are caused by electronic pickpockets who are usually a good deal older and not so harmless. Consider these examples: A brokerage clerk sat at his terminal in Denver and with a few taps of the keys transformed 1700 shares of his own stock, worth $1.50 per share, to the same number of shares in another company worth ten times that much. A Seattle bank employee used her electronic fund transfer code to move certain bank funds to an account held by her boyfriend as a “joke”; both the money and the boyfriend disappeared. A keyboard operator in Oakland, California, changed some delivery address to divert several thousand dollars’ worth of department store goods into the hands of accomplices. A tickets clerk at the Arizona Veteran’s Memorial Coliseum issued full-price basketball tickets for admission and pocketed the difference. These stories point out that computer crime is not always the flashy, front-page news about geniuses getting away with millions of dollars. These people are ordinary employees in ordinary business-committing computer crimes. The problems of computer crime have been aggravated in recent years access to computer. More employees now have access to computer at work, he or she also gains knowledge that-potentially-could be used to harm the company. The Changing Face of Computer Crime Computer crime once fell into a few simple categories, such as theft of software or destruction of data. The dramatically increased access to networks has changed the focus to damage that can be done by unscrupulous people with online access. The most frequently reported computer crimes fall into these categories: Credit card fraud. Costumer numbers are floating all over public and private networks, in varying states of protection. Some are captured and used fraudulently. Data communication fraud. This category covers a board spectrum, including piggybacking on someone else’s network, the use of an office network for personal purposes, and computer-directed diversion of funds. Unauthorized access to computer files. This general snooping category covers everything from accessing confidential employee records to the theft of trade secret and product pricing structure. Unlawful copying of copyrighted software. Whether the casual sharing of copyrighted software among friends or assembly line copying by organized crime, unlawful copying incurs major losses for software vendors. Discovery and Prosecution Prosecution the computer criminal is difficult for several reasons. To begin with, discovery is often difficult. Many times the criminal simply goes undetected. In addition, crimes that are detected are-an estimated 85 percent of the time-never reported to the authorities. By law, banks have to make a report when their computer systems have been compromised but other businesses do not. Often they choose not to report such crimes because they are worried about their reputations and credibility in the community. Most computer crimes are discovered by accident. For example, a bank employee changed a program to add 10cent to every customer service charge under $10 and $1 to every charge over $10. He then placed this overage into the last account, a bank account he opened himself in the name of Zzwicke. The system worked fairly well, generating several hundred dollars each month, until the bank initiated a new marketing campaign in which it singled out for special honors the very first depositorand the very last. In another instance some employees of city welfare department created a fictitious work force, complete with social security numbers, and programmed the computer to issue paychecks, which the employees would then intercept and cash. They were discovered when a police officer investigated and illegally parked overdue rental car and found the fraudulent checks inside. Even if a computer crime is detected, prosecution is by no means assured. There are a number of reasons for this. First, some law enforcement agencies do not fully understand the complexities of computer-related fraud. Second, few attorneys are qualified to handle computer crimes cases. Third, judges and juries are not always educated about computers and may not understand the nature of violation or the seriousness of the crime. In short, the chances of having a computer crime go undetected are, unfortunately, good. And the chances that, if detected, there will be no ramifications are also good: a computer criminal may not go to jail, may not be found guilty if prosecuted. But this situation is changing. Since USA Congress passed the Computer Fraud and Abuse Act in 1986, there has been growing awareness of computer crime on the national level. This law is supplemented by state statues; most states have passed some form of computer crimes law. Computer criminals that are successfully prosecuted are subject to fines, jail time, and confiscation of their computer equipment. 7.7 Computer Safeguards: Firewalls An important method for control and security on the Internet and other networks is the use of firewall computers and security software. Firewall protects computer networks from intrusion by screening all network traffic and serving as a safe transfer point for access to and from other network. A network firewall can be a communication processor, typically a router or a dedicated server, along with firewall software. A firewall serves as a gatekeeper system that protects a company’s intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks. It screens all network traffic for proper passwords or other security codes, and only allows authorized transmissions in and out of the network. Firewalls have become an essential component of organizations connecting to the Internet, because of its vulnerability and lack of security. Firewalls can deter, but not completely prevent, unauthorized access (hacking) into computer networks. In some cases, a firewall may allow access only from trusted locations on the Internet to particular computers inside the firewall. Or it may allow only ‘safe’ information to pass. For example, a firewall may permit users to read e-mail from remote locations but not to run certain programs. In other cases, it is impossible to distinguish safe use of a particular network service from unsafe and so all requests must be blocked. The firewall may then provide substitutes for some network services (such as e-mail or file transfer) that perform most of the same functions but are not so vulnerable to penetration. 7.8 Securing Networks The goal of security of security management is the accuracy, integrity, and the safety of all system processes and resources. Effective security management can minimize errors, fraud and losses in the internetworked computer-based systems that interconnect today’s e-business enterprise. Networks (whether connected to Internet of not) pose unique security and privacy problems. Organizations must be concerned about unauthorized people intercepting data in transmit, whether hackers or thieves or industrial spies. Networks can be secured by the following: Firewall. One fundamental approach to network security is to dedicate one computer called a firewall, whose sole purpose is to talk to the outside world A firewall will provide an organization with greatly increased security because only one network computer is accessible to people outside the network, and that one computer accepts only appropriate access. Encryption. Data being sent over communication lines may be protected by scrambling the messages that is, putting the messages in code that can be broken only by the person receiving the message. The process of scrambling messages is called encryption. Encryption protects data by scrambling data or converting it, prior to transmission, to a secret code that masks the meaning of the data to unauthorized recipients. The American National Standard Institute (ANSI) has endorsed a process called Data Encryption Standard (DES), a standardized public key by which senders and receivers can scramble and unscramble their messages. Although DES code is well known, companies still use it because the method makes it quite expensive to intercept coded messages. Thus, interlopers are forced to use other methods of gathering data – methods that carry greater risk of detection. Encryption software is available for personal computers. A typical package for example offers a variety of security features file encryption, keyboard lock, and password protection. Organizations are advised to have a disaster recovery plan for its computer system. A disaster recovery plan is a method of restoring computer processing operations and data files if operations are halted or files are damaged by major destructions. There are various approaches. Some organizations revert temporarily to manual services, but life without the computer can be difficult indeed. Others arrange to buy time at a service bureau, but this is inconvenient for companies in remote or rural area. If a single act, such as fire, destroys your computing facility, it is possible that a mutual aid pact will help the organization to continue running its business. In such a plan, two or more companies agree to lend each other computing power if one of them has a problem. Other organizations sometimes form a consortium, a joint venture to support a complete computer facility. Such facility is completely available and routinely tested but used only in the event of disaster. 7.9 Computer Threats: Computer Viruses Worms and viruses are rather unpleasant terms that have entered the jargon of the computer industry to describe some of the insidious ways that computer system can be invaded. A worm is a program that transfers itself from computer to computer over a network and plants itself as a separate file on the target computer’s disk. One newsworthy worm, originated by Robert Morris when he was a student at Cornell University, traveled the length and breadth of the land through an electronic mail network, shutting down thousands of computer. The worm was injected into the network and multiplied uncontrollably, clogging the memories of infected computers until they could no longer function. A virus, as its name suggests, is contagious. That is a virus, set of illicit instruction, passes itself on to other programs or document with which it comes in contact. In its most basic form, a virus is digital equivalent of vandalism. It can change or delete files, display words or obscene massage, or produce bizarre screen effects. In its most vindictive form, a virus can slowly sabotage a computer system and remain undetected for months, contaminating data or, in this case of the famous Michelanglo virus, wiping out your entire hard drive. A virus may be dealt with by means of a vaccine, or antivirus, a computer program that stop the spread of and often eradicates the virus. However, a retrovirus has the ability to fight back and may even delete antivirus software. Viruses seem to show up when least expected. In one instance call came to a company’s information center at about 5:00 p.m. The caller’s computer making a strange noise. With the expectation of an occasional beep, computer performing routine business chores do not usually make noises. Soon employees were calling from all over the company, all with “noisy” computers. One caller said that it might be a tune coming from the computer’s small internal speaker. Finally, one caller recognized a tinny rendition of “Yankee Doodle” confirmation that an old virus had struck once again. The Yankee Doodle virus, once attached to a system, is scheduled to go off at 5:00 p.m. every eight days. Viruses, once considered merely a nuisance, are costing American business over $2 billion a year. Unfortunately, viruses are easily transmitted. You may wonder who produces viruses. At one point, the mischief makers were merely teenagers with too much time on their on their hands. Now, virus makers are older and actually trade notes and tips on the Internet. They do what they do, psychologist say, mostly to impress their friends. Experts have estimated that there are hundreds of virus writers worldwide. However, although there are thousands of unknown viruses, most of the damage is cause by only a dozen or so. Transmitting a Virus. A virus can be transmitted easily via Internet. Each time a user runs the virus program, it will be loaded into the memory of the computer that the users used.. The virus stays in memory, infecting any other program loaded until the computer is turned off again. The virus not now has spread to other programs, and the process can be repeated again and again. In fact, each newly infecting program becomes a virus carrier. Although many virus are transmitted just way via networks, the most common method is by passing diskettes from computer to computer. Here is another typical scenario. An office worker puts a copy of a report on a diskette and slips it into her briefcase to take home. After shooing her children away from the new game they are playing on the computer, she sits down to work on the report. She does not know that a virus, borne by the kids’ new software, has infected the diskette. When she takes the disk back down to work, the virus is transmitted from her computer to the entire office network. The most insidious viruses attach to the operating system. One virus, called Cascade, causes random text letter to “drop” to a pike at the bottom to the screen. Viruses attached to the operating system itself have greater potential for mischief. A relative newcomer to the virus scene is the macro virus, which uses a program’s own macro programming language to distribute itself. Unlike previous viruses, a macro virus does not infect a program; it infects a document. When you open the document that has the virus, any other document opened in same session may get virus too. Damage from Viruses. Most viruses remain dormant until triggered by some activity. For example, a virus called Jerusalem B activates itself every Friday the 13 th and proceeds to erase any file you may try to load from your disk. Another virus include instructions to add 1 to a counter each time the virus is copied to another disk. When the counter reaches 4, the virus erases all data files. All the other three copied disks have also been infected. The Concept virus, a relatively benign macro virus, refuses to let users to save their documents after they have made changes., saying the file is ‘read only’. The Nuclear macro virus, among other things destroys vital operating system files on any April 5th. Prevention. Although viruses are most commonly passed via diskettes, viruses can propagate by other means, such as local area network, electronic mail, and the Internet. Furthermore, viruses are rampant on some college campuses. Use these commonsense approaches to new files: Use virus-scanning software to check any file or document before loading it onto your hard disk. Never install a program unless the diskettes come in a sealed package. Be especially wary of software that arrives unexpectedly from companies with whom you have not done business Although there have been isolated instances of viruses in commercial software, viruses tend to show up on free software or software acquired from friends or the Internet. Antivirus software can be installed to scan the hard disk every time the computer is booted or at regular scheduled intervals. Summary A network is an interconnected system of computers, terminals, and communications channels and devices. Networking includes local area networks (LAN) which are designed to share data and resources among several individual computer users in an office or building. Many different types of networks serve as the telecommunications infrastructure for the Internet, intranets and extranets A protocol is a standard set of rules and procedures for the control of communications in a network. Part of the goal of communication network architecture is to create more standardization and compatibility among communication protocols. An important method for control and security on the Internet and other networks is the use of firewall computers and security software. Reference: James O’Brien, Introduction to Information Systems, McGraw-Hill, 2003. H.L. Capron, Computers Tools for an Information Age, Addision Wesley, 1997. Loudon and Loudon, Essentials of Management Information Systems, Prentice Hall, 2001. www.csm.ornl.gov/~dunigan/vpn.html True / False Questions No. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Questions Answer The basic components for networking consists of communication system used to transmit the messages are (1) a sending device (2) a communication channel, and (3) a receiving device. Michelanglo is a protocol standard set of rules and procedures for the control of communications in a network. There are eight layers of the OSI communications network architecture, and the seven layers of the Internet’s TCP/IP protocol suite. The goal of network architectures is to promote an open, simple, flexible, and efficient telecommunications environment. In a client/server networks, end-user PC or NC workstations are the clients. They are interconnected by local area networks and share application processing with network servers. The goal of security of security management is the accuracy, integrity, and the safety of all system processes and resources. In a bus network, all messages are routed through the central computer. A firewall serves as a gatekeeper system that protects a company’s intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks. Installing antivirus software to scan the hard disk every time the computer is booted or at regular scheduled intervals is an example to protect your computer. Many times the computer criminal can be easily detected True False False True True True False True True False Presentation Slides Slide 1 Topic 7 Networking and Security Slide 2 Learning Outcome Learning Outcome At the end of the lesson, the students will be able to: Define what is computer network system. Identify the basic components of computer networking system. Understand the different type of network architectures. Discuss the importance of protocols. Discuss the different type of network topologies. Aware of the potential threat to computer and its network Aware of computer viruses and how they spread. Slide 3 List of Topics Networking Fundamentals Network Architectures and Protocols Type of Communications Networks Network Topologies Keeping Your Home Computer Safe Computer Threats: Hackers Securing Networks Computer Threats: Computer Viruses Slide 4 List of terminology Computer system network Communications systems connecting two or more computers and their peripherals devices to exchange information and share resources. Terminals Any input/output device that uses telecommunication networks to transmit or receive data is a terminal, including telephones and the various computer terminals. Telecommunications Supports data transmission and reception between terminals and processors computers. Telecommunications Over which data are transmitted and received. channels Telecommunications Consists of programs that control telecommunications activities control software and manage the functions of telecommunications networks. E Network Architectures Describes how networks are configured and how the resources are shared. Protocols A standard set of rules and procedures for the control of communications in a network. OSI Model The International Standards Organization (ISO) has developed a seven-layer Open Systems Interconnection (OSI) model to serve as a standard model for network architectures. TCP/IP The Internet’s protocols suite. Wide area network (WAN) Local Area Networks (LAN) Telecommunications networks covering a large geographic area. Virtual private networks A secure network that uses the Internet as its main backbone Connects computers and other information processing devices within a limited physical area, such as an office, network but relies on the fire walls and other security features of its Internet and intranet connections and those of participating organizations Client/server networks Network in which one powerful computer coordinates and supplies to all other nodes on the network. Server nodes coordinate and supply specialized services, and client nodes request the services. Peer-to-peer networks Network in which nodes can act as both servers and clients. For example, one microcomputer can obtain files located on another microcomputer and also can provide files to other microcomputers. Network Topology Describes the appearance or layout of a network and how data flows through the network. Star network Network of computers or peripherals devices linked to a central computer through which all communication pass. Ring network Network of computers in which each device is connected to two other devices, forming a ring. Bus network Network in which all communications travel along a common connecting cable called a bus. Also known as Ethernet. Firewall Protects computer networks from intrusion by screening all network traffic and serving as a safe transfer point for access to and from other network. Slide 5 Computer Network Uses communication equipment to connect two or more computers and their resources. An interconnected system of computers, terminals, and communications channels and devices. Includes local area networks (LAN) which are designed to share data and resources among several individual computer users in an office or building. Slide 6 Basic components for networking A communication network is any arrangement where a sender transmits a message to a receiver over a channel consisting of some type of medium Consists of communication system used to transmit the messages : a sending device a communication channel a receiving device. Slide 7 Telecommunication Processors PCs, NCs and other terminals Telecommunications channels Telecommunication Processors Computers Figure 7.1: The five basic components for telecommunications network Slide 8 Network Components Terminals such as networked personal computers, network computers, or information appliances. Telecommunications processors support data transmission and reception between terminals and computers. Telecommunications channels over which data are transmitted and received. Computers are interconnected by telecommunications networks so that they can carry out their information processing tasks. Telecommunications control software consists of programs that control telecommunications activities and manage the functions of telecommunications networks. Slide 9 Network Architecture The goal of network architectures is to promote an open, simple, flexible, and efficient telecommunications environment. Accomplished by the use of standard protocols, standard communications hardware and software interfaces, and the design of a standard multilevel interface between end users and computer systems. Slide 10 . Protocols A standard set of rules and procedures for the control of communications in a network. Part of the goal of communication network architecture is to create more standardization and compatibility among communication protocols. One example of a protocol is; A standard for the physical characteristics of the cables and connectors between terminals, computers, modems, and communication lines. Protocols that establish the communication control information needed for handshaking which is the process or exchanging predetermined signals and characters to establish a telecommunications session between terminals and computers. Protocols deal with control of data transmission reception in a network, switching techniques, internetwork connections, Slide 11 . The OSI Model Developed by the International Standards Organization (ISO) Has a seven-layer Open Systems Interconnection (OSI) model to serve as a standard model for network architectures. Dividing data communications functions into seven distinct layers promotes the development of modular network architectures, which assists the development, operation, and maintenance of complex telecommunications networks. Slide 12 TCP/IP Application for Process Layer Application Layer Provides communications services for end user applications Presentation Layer Provides appropriate data transmission formats and codes Session Layer Support the accomplishment of telecommunications sessions Host-to-Host Transport Layer Transport Layer Supports the organization and transfer of data between nodes in the network Internet Protocol (IP) Network Layer Provides appropriate routing by establishing connections among network links Network Interface Data Link Layer Supports error-free organization and transmission of data in the network Physical Layer Physical Layer Provides physical transmission of data on the telecommunications media in the network Figure 7.2: The seven layers of the OSI communications network architecture, and the five layers of the Internet’s TCP/IP protocol suite Slide 13 The Internet’s TCP/IP Internet’s protocols suite is called Transmission Control Protocol/Internet Protocol and is known as TCP/IP. A system of telecommunications protocols that has become so widely used that it is equivalent to a network architecture. TCP/IP consists of five layers of protocols that can be related to the seven layers of the OSI architecture. TCP/IP is used by the Internet and by all intranets and extranets. Slide 14 Type of Communications Networks Many different types of networks serve as the telecommunications infrastructure: wide area networks local area networks client/server networks network computing networks peer-to-peer networks. Slide 15 Wide Area Network (WAN) Telecommunications networks covering a large geographic area. Networks that cover a large city or metropolitan area (metropolitan area networks) can also be included in this category. WANs are used by many multinational companies to transmit and receive information among their employees, customers, suppliers, and other organizations across cities, regions, countries and the world. Slide 16 Wide Area Network Slide 17 Local Area Networks (LAN) Connects computers and other information processing devices within a limited physical area, such as an office, classroom, building, manufacturing plant, or other work site. LANs have become commonplace in many organizations for providing telecommunications network capabilities that link end users in offices, departments and other workgroups. Uses a variety of telecommunications media to interconnect microcomputer workstations and computer peripherals. . Each PC usually has a circuit board called a network interface card. Most LANs use a more powerful microcomputer having a large hard disk capacity, called a file server or network server, that contains a network operating system program that controls telecommunications and the use and sharing of network resources. Slide 18 Local Area Network Slide 19 Virtual Private Networks Organizations use Virtual Private Networks (VPNs) to establish secure intranets and extranets. A virtual private networks is a secure network that uses the Internet as its main backbone network but relies on the fire walls and other security features of its Internet and intranet connections and those of participating organizations. VPNs would enable a company to use the Internet to establish secure intranets between its distant branch offices and the manufacturing plants, and secure extranets between itself and its customers and suppliers. The basic idea is to provide an encrypted IP tunnel through the Internet that permits distributed sites to communicate securely. The encrypted tunnel provides a secure path for network applications and requires no changes to the application. Slide 20 Virtual Private Networks Slide 21 Client/Server Networks In a client/server networks, end-user PC or NC workstations are the clients. They are interconnected by local area networks and share application processing with network servers, which also manage the networks. Local area networks are also interconnected to other LANs and WANs of client workstations and servers. Slide 22 Client/Server Networks Slide 23 Functions of the Computer Systems in Client/Server Networks Servers Client system Types: PCs, Network computers, workstations, Macintoshes. Functions: Provide user interface, perform some / most processing on an application Types: Servers, workstations, or midrange systems. Functions: Shared computation, application control, distributed databases Host systems/ superservers Types: mainframes and midrange systems. Functions: Central databases control security, directory management, heavy-duty processing. Slide 24 Peer-to-Peer Networks A computing environment where end users computers connect, communicate, and collaborate directly with each other via Internet or other telecommunications network links. The emergence of peer-to-peer (P2P) networking technologies and applications is being hailed as a development that will revolutionize e-business and e-commerce and the Internet itself. Peer-to-peer network is a powerful telecommunications networking tool for many business applications Slide 25 Peer-to-peer networks Slide 26 Napster Peer-to-Peer Networks Architecture Napster is based on a client - server architecture. The role of the server is to hold a searchable index that contains entries that all the currently connected clients contain. The server is actually multiple very hi-spec machines load balancing the requests from clients. This makes scaling the service simply a matter of adding machines into the server pool and ensures redundancy in the fact that servers can fail and be replaced without significant disruption to the service they are providing. In the Napster architecture, P2P file-sharing software connects the user’s PC to a central server that contains a directory of all of the other users (peers) in the network. When users request a file, the software searchers the directory for any other users who have that file and are online at the moment. It then sends you a list of the users’ names that are active links to all users. Slide 27 Napster Peer-to-peer Network Architecture Slide 28 Gnutella Peer-to-Peer Networks Architecture GNUtella that allowed file swapping without the need of a central indexing server and therefore no central point of failure, and no central point to sue for copyright infringements. The Gnutella architecture is a pure peer-to-peer network since there is no central directory or server. First, the file-sharing software in Gnutella-style P2P network connects your PC with one of the online users in the network. Then an active link to your user name is transmitted from peer to peer to all the online users in the network that the first user (an all other online users) encountered in previous sessions. In this way, active links to more and more peers spread throughout the network the more it is used. Slide 29 Gnutella Peer-to-Peer Networks Architecture Slide 30 Network Topologies Topology describes the appearance or layout of a network and how data flows through the network. A network is a computer system that uses communication equipment to connect computers. They can be connected in different ways. The physical layout of a network is called a topology. There are three common topologies: star, ring, and bus networks. In a network topology, a component is called a node, which is usually a computer on a network. (The term node is also use to refer to any device connected to a network, including the server, computers, and peripheral device such as printers.) Slide 31 Star Network A star network has a hub computer that is responsible for managing the network. A star network features a central connection point called a hub that may be a hub, switch or router. All devices are connected to a central point called a hub. These hubs collect and distribute the flow of data within the network. Signals from the sending computer go to the hub and are then transmitted to all computers on the network. Large networks can feature several hubs. A star network is easy to troubleshoot because all information goes through the hub, making it easier to isolate problems. Slide 32 Advantages and Disadvantages of Star Network The main advantages of a star network are: All messages are routed through the central computer, which act as a traffic cop to prevent collisions. Any connection failure between a node and the hub will not affect the overall system. The main disadvantage of a star network is: if the hub computer fails the network fails. Requires more cabling Slide 33 Star Network Slide 34 Ring Network . A ring network links all nodes together in a circular chain. Data message travel in only one direction around the ring Any data that passes by is examined by the node to see if it is the addressee; it not, the data is passed on to the next node in the ring. In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either “clockwise” or “counterclockwise Ring topologies are found in some office buildings or school campuses. Slide 35 Advantages and Disadvantages of Ring Network The main advantage of a ring network is: Since data travels in only one direction, there is no danger of data collision. The main disadvantage of a ring network is: is one node fails, the entire network fails. A failure in any cable or device breaks the loop and can take down the entire network. Slide 36 Ring Network Slide 37 Bus Network A bus network has a single line to which all the network nodes are attached. Computers on the network transmit data in the hope that it will not collide with data transmitted by other nodes; if this happens, the sending node simply tries again. Nodes can be attached to or detached from the network without affecting the network. Furthermore, if one node fails, it does not affect the rest of the network. Bus networks use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium, that device attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. Slide 38 BUS Network Slide 39 Advantages and Disadvantages of Bus Network The main advantages of a bus network are: Easier to locate problem workstations depending on the backbone can provide very fast networks The main disadvantage of bus networks are: issues with security as data is broadcasted across the network Single point of failure - if hub or backbone goes down Slide 40 Keeping Your Home Computer Safe Protect hardware From theft From dust Back up File. Back up your files at regular basis. Make copies of their hard disk files on diskettes. Computer Threats Hackers Virus Slide 41 The Changing Face of Computer Crime Computer crime once fell into a few simple categories, such as theft of software or destruction of data. E.g. of computer crimes: Credit card fraud. Costumer numbers are floating all over public and private networks, in varying states of protection. Some are captured and used fraudulently. Data communication fraud. This category covers a board spectrum, including piggybacking on someone else’s network, the use of an office network for personal purposes, and computer-directed diversion of funds. Unauthorized access to computer files. This general snooping category covers everything from accessing confidential employee records to the theft of trade secret and product pricing structure. Unlawful copying of copyrighted software. Whether the casual sharing of copyrighted software among friends or assembly line copying by organized crime, unlawful copying incurs major losses for software vendors. Slide 42 Discovery and Prosecution Discovery of computer crime is often difficult. Many times the criminal simply goes undetected Crimes that are detected are-an estimated 85 percent of the timenever reported to the authorities. Reporting such crimes are not done because companies are worried about their reputations and credibility in the community. Since USA Congress passed the Computer Fraud and Abuse Act in 1986, there has been growing awareness of computer crime on the national level. Slide 43 Computer Safeguards: Firewalls A network firewall can be a communication processor, typically a router or a dedicated server, along with firewall software. A firewall serves as a gatekeeper system that protects a company’s intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks. It screens all network traffic for proper passwords or other security codes, and only allows authorized transmissions in and out of the network. Firewalls have become an essential component of organizations connecting to the Internet, because of its vulnerability and lack of security. Firewalls can deter, but not completely prevent, unauthorized access (hacking) into computer networks. Slide 44 Securing Networks The goal of security of security management is the accuracy, integrity, and the safety of all system processes and resources. Effective security management can minimize errors, fraud and losses in the internetworked computer-based systems that interconnect today’s e-business enterprise. Networks can be secured by the following: Firewall protects computer networks from intrusion by screening all network traffic and serving as a safe transfer point for access to and from other network. Encryption protects data by scrambling data or converting it, prior to transmission, to a secret code that masks the meaning of the data to unauthorized recipients. Disaster recovery plan for its computer system. A disaster recovery plan is a method of restoring computer processing operations and data files if operations are halted or files are damaged by major destructions. Slide 45 Computer Threats Computer Viruses Worm: a program that transfers itself from computer to computer over a network and plants itself as a separate file on the target computer’s disk. Virus: set of illicit instruction, passes itself on to other programs or document with which it comes in contact. Retrovirus has the ability to fight back and may even delete antivirus software. Slide 46 Prevention Precaution and use common sense approach: Use virus-scanning software to check any file or document before loading it onto your hard disk. Never install a program unless the diskettes come in a sealed package. Be especially wary of software that arrives unexpectedly from companies with whom you have not done business Activity A Crossword Puzzle Answers Questions Network Topology Describes the appearance or layout of a network and how data flows through the network. Star network Network of computers or peripherals devices linked to a central computer through which all communication pass. Ring network Network of computers in which each device is connected to two other devices, forming a ring. Bus network Also known as Ethernet. Terminals Any input/output device that uses telecommunication networks to transmit or receive data is a terminal, including telephones and the various computer terminals. Architectures Describes how networks are configured and how the resources are shared. OSI Model A seven-layer Open Systems Interconnection (OSI) model to serve as a standard model for network architectures. TCP/IP The Internet’s protocols suite. Wide area network (WAN) Telecommunications networks covering a large geographic area. Local Area Networks (LAN) Connects computers and other information processing Virtual private networks A secure network that uses the Internet as its main devices within a limited physical area, such as an office, backbone network but relies on the fire walls and other security features of its Internet and intranet connections and those of participating organizations Client/server networks Network in which one powerful computer coordinates and supplies to all other nodes on the network. Peer-to-peer networks Network in which nodes can act as both servers and clients. Group Activity Discuss the various steps to ensure the security of your computer system against potential threat. Answers: a) Install antivirus software. b) Install firewall. c) Take extra precaution when downloading files. d) Clean any computer parts affected by virus. Exercise Drag and fill in the blank spaces. TCP/IP Firewall Protocols Topology Network Architectures 1. Network Client Telecommunications processors WAN Communication channel __________ supports data transmission and reception between terminals and computers. 2. The transmission medium that carries the message is referred to as the __________. 3. Two or more computers connected so that they can communicate with each other and share information are called a __________. 4. A device, connected to a network, that shares resources with other computers is called a _________. 5. Standard protocols used for Internet is _________. 6. The arrangement of the computers in a network is called a _____. 7. The rules for exchanging data between computers are called __________. 8. __________ describes how networks are configured and how the resources are shared. 9. __________ protects an organization’s network from outside attack. 10. Telecommunications networks covering a large geographic area. Answer: 1- Telecommunications processors 2- Communication channel 3-Network 4- Client 5-TCP/IP 6-Topology 7-Protocols 8- Network Architectures 9-Firewall 10-WAN
© Copyright 2026 Paperzz