Sunteți pe pagina 1din 16

Chapter 19 ICT5

A network exists when 2 or more computers are connected to each other by cable, telephone lines or wireless communication.

Recap from ICT2 Chapter Ch20:


Advantages Share peripherals (cheaper) Share datafiles (all have access to the latest info) Electronic communication between computers such as e-mail and EDI Software held centrally so only installed once Security and backup controlled centrally by network manager Disadvantages If client/server network then if fileserver fails then all computers will fail Network open to more external threats if attached to a WAN eg Internet Network may be slow if much network traffic it depends on speed of connection Viruses spread quickly

Recap Types of Network:


Client/Server Backup easy to perform as just backup fileserver hard disc Used on large star or bus network topologies Most data files and software stored on the fileserver only Users set up centrally with appropriate access rights and disc space on fileserver Powerful central computer needed called a fileserver Peer to Peer Backup has to be done from each workstation YUK Used with small ring network topologies Software stored on each workstation Users can access data files & peripherals on other workstations if have appropriate access rights No fileserver, all workstations are equal

Recap Network Topologies:


Star Central fileserver connects to all the other workstations via a hub. Each workstation has its own cable to the hub (Large networks use this method) Bus All workstations are connected via one central cable and all data is transmitted both ways across it (Used for a small LAN) Ring All workstations and peripherals are linked together in a circular configuration and all data is transmitted one way across it. (Used for a small LAN) see back pages

Network Security needs to consider:


Staff - Security on a network is only as good as its weakest link normally its staff!! Must have a corporate policy on security supported by Senior Management and appropriate disciplinary procedures to back it up. Viruses and illegal software spread easily especially if backing storage drives and USB ports are active and employees have Internet and e-mail access Unauthorised access to data files from hackers Hardware failure need backup (see Ch15)

Preserving Network Security


1. Physical security locks on doors and equipment restricts access to authorised personnel only. 2. Security of backing storage locking mechanisms on floppy discs and tapes to prevent overwriting data. 3. Restrict peripheral use - only allowed to print to certain printers, access certain backing storage drives eg CD drive, local hard disc etc 4. Restrict access to data files and folders No access; read only; read/write access; full access. 5. UserIDs and passwords necessary for 3 and 4.

Staff and Passwords


1. Only acceptable words should be used Dont use anything obvious not a meaningful word. The operating system can monitor this must be over a certain length, must contain a mixture of upper & lowercase letters & numbers. KEEP IT SECRET. Change frequently the OS can make you change it after a set period OS can lock person out after 3 attempts at password Have password protected screen saver so can leave workstation logged on if essential.

Illegal access through a WAN


1. Use a firewall a system placed between an internal and external network that monitors all network traffic coming in and out of the internal network. Only authorised traffic is allowed through. It also filters e-mail and Internet requests from certain sites. 2. Use data encryption codes data so it can only be recovered by someone who has the encryption key 3. Use a call back system so your network makes contact with another computer system instead of their system contacting your system (Prevents hackers masquerading as legitimate systems) 4. Maintain up-to-date anti-virus software

Duties of a Network Manager


1. Installing software centrally or on individual workstations. Ensure correct licensing 2. Allocating and maintaining user accounts of userIDs, access rights and resource usage 3. Make regular backups (See Ch15) 4. Running and updating anti-virus software 5. Auditing the network by tracking the way employees use it.

Network Audit Software


1. It is a key software tool for hunting down fraud and computer misuse within an organisation. It helps to ensure an organisation conforms to its security policy. 2. All logins and attempted logins are recorded so illegal attempts at a particular workstation are recorded. This also applies to access to datafiles 3. Audit software monitors the number of users on a piece of software at one time and so prevents more users than the licence agreement allows. 4. It produces an audit log. This is used find computer misuse by staff and can also be used as network accounting software to charge departments for computer time and resources

An audit log records the following:


1. 2. 3. 4. 5. 6. Who is using the system What workstation they are using Data and time of access What programs they are using What files have been opened, modified and deleted How many reads and writes have been excuted. How many times the server as been accessed 7. Failed log on attempts 8. Websites accessed and time spent there. 9. Summary reports can be produced of the above for a single user or groups of users such as a department
Read Question:

Network accounting Software


Is used to monitor network usage by individual departments. For each user the network manager can: Allocate a maximum amount of hard disc space Allocate a maximum amount of printer credits Restrict login to a time of day and workstation Reports: Summary reports are produced per department charging for printer use, processor time, backing storage, network traffic. Usage trends that can be used to plan future service provision eg bigger fileserver hard disc needed

Network User Interface


Security enforced centrally, must have ID&password Different desktops and software mandatory for different types of user to stop customisation and creates a consistent corporate image. Also any member of the department can use the workstation. The user has more available backing storage drives Shared printers so need to choose the right one

Question Page 207 Q1


(a) Describe two changes that may be evident to an end-user when they change over from using a standalone computer to a networked environment. 4m (b) A multinational company has recently created an Intranet, connecting all of its computer systems. All its sites are now connected using high-speed dedicated links. (i) Describe one facility that could now be made available to the company which would improve productivity. (2 marks) (ii) Describe two possible problems that may arise as a result of using this computer network (4m) (iii) Describe two possible measures that the company can take to combat problems caused by the use of this type of network. (4 marks)

Answer Page 207 Q1 a)login screen(1) user now has one more stage to complete before they are able to use their system(1): More disk drives on screen(1) user now has access to drives that are logical rather than physical(1): Less control over the interface(1) e.g. inability to customise (1) etc B i) Video-conferencing (1) managers will be able to see each other without the need for travel costs/long arrangement times (1) OR Ability to share hardware resources (1) means that less hardware needs to be purchased (1) etc ii) Risk of unauthorised access (1) meaning potentially sensitive/confidential information may be accessible (1) Risk of viruses (1) all workstations need to have up to date anti-virus software (1) etc iii)Provide user login and password (1) to make it more difficult to enter the system if not authorised (1): Set up required procedures (1) so that users know the tasks that need to be carried out to maintain system security/integrity(1): Use up to date anti-virus software (1) + example (1) Use a firewall (1) e.g. to provide a filter on traffic coming in/ going out (1) etc

What students have problems with:


Dont understand the network is a service function in a business so needs to: Charge departments for service Audit for misuse and future provision Have standard user interface Also dont seem to understand the jargon

S-ar putea să vă placă și