Unit 5: Communications, Networks, and Cyberthreats Show Digital convergence is the gradual merger of computing and communications into a new information environment, in which the same information is exchanged among many kinds of equipment, using the language of computers. From the Analog to the Digital Age Digital
Analog
But analog data can be converted into digital form. Even though digital data is not as exact as analog data, it is easier to manipulate.
Networks Network: system of interconnected computers, telephones, and/or other communications devices that can communicate with one another and share applications and data. Benefits of Networks
Types of networks: WANs, MANs, & Others
telecommunications company that hires itself out to the public to provide communications transmission services—for at least part of its connections. (A home area network is a LAN.) Network Architecture: How Networks Are Structured
Intranets, Extranets, & VPNs: Use the Internet as their base
All use firewalls for security, a system of hardware and/or software that protects the system from intruders. Network Components — all networks have several things in common: o wired = twisted-pair, coaxial cable, fiber-optic cable o wireless = infrared, microwave, radio, Wi-Fi, satellite
Network linking devices:
o Speeds of about 320 megabits per second
Wireless Communications Media Electromagnetic spectrum of radiation is the basis of all telecommunications signals, wired and wireless. Radiofrequency (RF) spectrum is the part of the electromagnetic spectrum that carries most communications signals. Bandwidth: range (band) of frequencies that a transmission medium can carry in a given period of time
WAP (wireless application protocol): Wireless handheld devices such as cellphones use the Wireless Application Protocol for connecting wireless users to the Web. Just as the protocol TCP/IP was designed to provide a wired connection to your Internet access provider, WAP is a standard designed to link nearly all mobile devices telecommunications carriers’ wireless networks and content providers. Five Types of Wireless Communications Media
▪ 5,000 – 10,000 miles up o LEO – low-earth orbit ▪ 200 – 1,000 miles up ▪ Has no signal delay Long-Distance Wireless: One-Way Communication
Long-Distance Wireless: Two-Way Communication
Short-Range Wireless: Two-Way Communication
Thieves may be a company’s employees or suppliers or professionals.
Cyberattacks & Malware
Cyberthreats:
o A botnet may be used to install ransomeware, which holds the data on a computer or the use of the computer hostage until a payment is made. Ransomware encrypts the target’s files, and the attacker tells the victim to make a payment of a specified amount to a special account to receive the decryption key.
Time, Logic, & Email Bombs A time bomb is malware programmed to “go off” at a particular time or date. A logic bomb is “detonated” when a specific event occurs—for example, all personnel records are erased when an electronic notation is made that a particular person was fired. Email bombs overwhelm a person’s email account by surreptitiously subscribing it to dozens or even hundreds of mailing lists.
Online Safety
Encryption
Concerns about Privacy& Identity Theft
Identity (ID) theft, or theft of identity (TOI), is a crime in which thieves hijack your name and identity and use your information and credit rating to get cash or buy things Check your computer performance /hardware 1. Click Start 2. Control Panel 3. System 4. System & Security 5. General 6. You will be able to see processor speed and RAM (but you won’t know how well they perform) How to Speed Up your computer using windows tool
How to Speed Up your computer using Good Practices
Upgrading your PC to increase speed
Unit 7: The Challenges of the Digital Age: Society & Information Technology Today Technology is now used to develop predictive search apps —applications that know what you want before you do. Some people, however, see the new technology as just the latest intrusion into our private lives, mining digital personal information about us whose uses we cannot always foresee. Security Issues: Errors, Accidents, & Natural Hazards
▪ Use of computers or telecommunications to accomplish an illegal act (computer is the tool) o Theft of hardware o Theft of software o Theft of intellectual property (piracy) o Theft of time and services o Theft of information (e., medical info, credit card info) o Internet-related fraud (e., Wi-Fi phishing, or evil twin attack) o Crimes of malice: crashing entire systems ▪ Attacks on power-control systems and attacks on the Internet Security Safeguards Security is a system of safeguards for protecting information technology against disasters, system failures, and unauthorized access that can result in damage or loss.
Deterrents to computer crime
Identification and access
Encryption
Protection of software and data
Are programs that copy themselves repeatedly into a computer's memory or disk drive and viruses are deviant programs that can destroy data?A worm is a type of malware that copies itself repeatedly into a computer's memory (RAM) using up all available RAM. It also can copy on to a disk drive so it can load into RAM again.
What is the difference between a virus and a worm quizlet?What is the main difference between a worm and a virus? A worm requires an execution mechanism to start, while a virus can start itself. A worm tries to gather information, while a virus tries to destroy data. A worm can replicate itself, while a virus requires a host for distribution.
What is true of the malware Trojan horse quizlet?A Trojan Horse is a program that says it will do one thing but infects your computer causing damage when you run it Trojan horses do not replicate themselves automatically. It hides inside other software, usually as an attachment or downloadable file.
|