Please enable JavaScript.
Coggle requires JavaScript to display documents.
LECTURE 8: Network and Telecommunication - Coggle Diagram
LECTURE 8: Network and Telecommunication
Legacy Computer Systems
Mainframe computers kept in a secure computer room
Connected computers
form networks
variety of networks – wireless, Internet, employee remote network access
Network Component
Computers and terminals
Telecommunications channels
Routers and switching devices
Protocols
Software
A local area network (LAN) - a group of connected computers within a short distance of one another
A wide area network (WAN) connects computers some geographic distance away from one another
An intranet - internal network, eg; within a company
Extranet - external networks that connect an intranet with outside partners, such as suppliers
Internet - international network of public and private computers
Virtual private network (VPN) - uses the public Internet as its network system to privately connect remote systems
Risk Threats
Social Engineering
A form of manipulation and trickery
Physical Infrastructure Threats
Natural element - fire, air, and water pose threats to infrastructures
Natural disaster - floods, earthquakes, tornadoes, sunspots
Programmed threats such as viruses and worms
Denial of Service attacks (DOS)
DOS attack occurs when a system is tied up in such a way that it is unable to perform its functions
Holes in application and security software
Programmed threats and DOS are enabled by "holes”
Network Security Administration
Develop network security policies for:
management and users
describe the responsibilities of each party associated with the network
describe privileges regarding network resources
Authentication
The process of ensuring that users are who they say they are
Encryption
Scrambling, or coding data so that anyone who views it will not be able to make sense of it without a decoder and decryption key
Firewall
Combine software and hardware to control access to an network components
Intrusion Detection Systems
May be included in a firewall package or a stand-alone system