Documente Academic
Documente Profesional
Documente Cultură
The worldwide web (WWW) is part of the internet the user can access by way of a web browser such as
Internet Explorer or Google Chrome among others.
As the name suggests, this kind of network has high access restrictions because it is installed behind a
firewall that gives strong protection against hackers, crackers, viruses and spyware.
Features of an intranet
Because of the above mentioned security factors it is safer since there is less chance of external
threats
It is possible to prevent employees from viewing unwanted websites
Organisations can ensure that the information available is specific to their needs
Sensitive information can be send out securely within the organisation
Network security
Computers on a network especially WAN (like the internet) are prone to high security threats such as:
Hacking
Cracking
Virus attacks
Malware
Data theft
Data losses
To avoid the above problems in addition to many, there is a need for good network security, through some
authentication methods.
Please not that encryption does not prevent data from being deleted by hackers or crackers. Also data
backups do not prevent data from being tampered with by hackers and crackers, it (data backup) only
ensures that you have an extra copy in the event of data loss due to fire hazards, natural disasters or
hacking and cracking.
Fax
A short form for facsimile. Hard copy documents are scanned electronically and converted into bit-map
image (digital signal) and then transmitted as electronic signals through the telephone line. At the far end,
they are re-converted by the fax and printed on paper.
Modern fax machines are connected to computers such that there is no need for printing a document first in
order to send it by fax, the computer converts it into a fax format/signal then send it straight to the fax
machine.
Video Conferencing
Real-time communication between 2 people (groups) from separate geographical places (e.g. different
countries). The method makes use of LAN if internal or WAN (e.g. internet) if international.
Delegates at one end speak into the microphone whilst looking at a webcam. The other end can see
and hear them using large monitors and speakers.
Advantages of VOIP
It is free when talking is done computer to computer
Local rates apply when talking is done with mobile/fixed telephone
Disadvantages of VOIP
To work in real-time this system requires a broadband ISP
Sound quality is not so good (echoes and weird sounds)
Security is not so good just like other internet based technologies
Common security issues are:
Identity theft
Viruses and malware (malicious software)
Spamming (sending junk mail)
Phishing attacks – sending of email to a user claiming to be a legitimate company with
the aim of scamming the user to surrender personal information that can be used in
identity theft
Pharming – the act of installing a malicious code or viruses onto a user’s computer in
order to redirect/link them to a an illegitimate website which looks similar to the one they
know. As a result, the user’s details are collected and even more malware can be
installed unaware, only to discover latter that the computer is no longer in usual state. This
can be rectified by ant-spyware and ant-malware software.
2. Two types of network topology have been combined to form a larger network.
3. Complete each sentence below using one item from the list.
4. Tick three items of software which a PC connected to the internet might use.
6. A small office has four standalone computers. The office manager wants to connect the
computers together to form a LAN.
(6d) The company’s workers are concerned that their payroll data may not be secure as a
result of the computers being networked. Explain why the workers are concerned.
[6]
(6e) Give three actions that the office manager could take to ensure data security.
END OF CHAPTER