Computer Networks and Internet Securities
Computer Networks and Internet Securities
INTERNET SECURITIES
Name: Jeet Sanjay Tank
Class: 12 Science
School: Savvy International School
CERTIFICATE
_________________ _________________
In the star topology, failure of a single Long cable length ecause each node is
connection typically involves disconnecting directly connected to the center, the star
one node from an otherwise fully functional topology necessitates a large quantity of
network. cable
The central node is connected directly to The addition of a new node to a star network
every other node in the network means that involves a connection all the way to the
faults are easily detected and isolated. It is a central node hence difficult to expand.
simple matter to disconnect failing nodes from
the system.
THE BUS TOPOLOGY
1. Short cable length and simple wiring 1. Control of the network is not centralized in
layout:- Because there is a single common any particular node this means that
data path connecting all nodes, the linear detection of a fault may have to be
topology allows a very short cable length to performed from many points in the network.
be used
1. Short cable length:-The amount of cabling 1. If one node fails to pass data through itself,
involved in a ring topology is comparable to the entire network has failed and no traffic
that of a bus and is small relative to that of can flow until the defective node has been
a star. removed from the ring.
2. Since there is only one cable connecting 2. Network reconfiguration is difficult:- It is not
each node to its immediate neighbors, it is possible to shut down a small section of the
not necessary to allocate space in the ring while keeping the majority of it working
building for wiring closets. normally.
THE TREE TOPOLOGY
In the smooth functioning of a computer network, other than computers and wiring, many devices
or specialized hardware play important roles:-
1. Modem
A modem is a computer peripheral that allows to connect and communicate with other computer
via telephone lines.
2. Hub
A hub is a networking device having multiple ports that are used for connecting multiple
computers or segments of a LAN together.
3. Switch
A switch is a device that is used to segment networks into different subnetworks called subnets
or LAN segments.
4. Repeater
A repeater is a network device that amplifies and restores signals for long-distances transmits.
5. Bridge
A bridge is a device that lets you link two networks together
6.Router
A device that lets you link two networks together and can handle different protocols and is
responsible for forwarding data from one network to a different network.
7.Gateway
A gateway is a network device that connects dissimilar networks. Its establishes an connection
between a local network and external network
5. Bridge
A bridge is a device that lets you link two networks together
6.Router
A device that lets you link two networks together and can handle different protocols and is
responsible for forwarding data from one network to a different network.
7.Gateway
A gateway is a network device that connects dissimilar networks. Its establishes an connection
between a local network and external network
5. Bridge
A bridge is a device that lets you link two networks together
6.Router
A device that lets you link two networks together and can handle different protocols and is
responsible for forwarding data from one network to a different network.
7.Gateway
A gateway is a network device that connects dissimilar networks. Its establishes an connection
between a local network and external network
POTENTIAL THREATS AND ATTACKS
1.Malicious Software:
Malicious software, often called Malware, may disrupt the operations of the computer, gain
access to the privacy information and may gather sensitive data.
Such software may cause intentional harm to your system the network may have many such
malwares which include: Computer Viruses, Worms, Ransomware, Scareware, Spyware,
Trojan Horse, KeyLogger etc.
2.Denial of Service attack:
The DoS attack makes a computer’s resource unavailable to the user
As a result, the computer system may not function efficiently and may get temporarily or
indifinitely suspended.
POTENTIAL THREATS AND ATTACKS
3.Phishing:
This attack targets online users to extract sensitive information, like username, Password, or
credit card information.
Phishing accounts for major loss of data throughout the world.
4.Spoofing:
Email Spoofing is to gain access to recipient's personal information involves sending emails to
the targeted recipients to make them believe that this email originate from trusted owner.
Chat spoofing is quite similar to email spoofing. The target perceives that he or she is chatting
with someone known, but in fact it is cyber attack.
Best practices to protect ourselves from cyber attacks:
1. Use strong passwords.