Learning Tasks
Notes on network hardware
Quiz on networks and TCP/IP
Home Network Diagram
Network Diagram Design Task
Security Risk Quiz
Almost all data is currently transmitted using electromagnetic signals of one sort or another.
Electrical Signals through wires (usually copper)
Advantages: relatively cheap, secure, and fast
Disadvantages: Hard to change after installation
Coaxial (old tech!)
Twisted Pair: Phone lines and CATx cables
Fibre-optic cables
Advantages: Good for long distance & high data flow.
Disadvantages: Expensive and hard to install.
Stretched and layered glass fibres transmitting multiple light signals (at different angles), bouncing via total internal reflection.
Used for internet backbone, NBN, LANs, etc...
Radio Signals
Advantages: Fewer wires makes it cheaper to set up and more flexible.
Disadvantages: Potentially less secure and not as fast
WiFi
Bluetooth
LiFi
Mobile Communications 3G, 4G, 5G
Ethernet (wired) and WiFi (wireless) both will experience collisions if two or more devices try to transmit at the same time. This means that the number of devices on a single ethernet network (or connected by a hub) or a single WAP can not be too big without experiencing too many collisions. You then need to introduce switches or more WAPs to separate out the domains. (TODO: Rewrite!)
A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building. By contrast, a wide area network (WAN) not only covers a larger geographic distance, but also generally involves leased telecommunication circuits. [wiki]
A Wireless Personal Area Network is used for connecting an individuals devices (phone, laptop, pda, watch, etc...) in a low powered network requiring minimal extra hardware. Often uses bluetooth and similar technologies.
An Intranet is a private set of services (websites, file servers, etc...) that are operated by an organisation and usually kept secure/private. It can run on either a LAN or across a WAN.
The Internet is the ultimate WAN.
A Virtual Private Network uses cryptographic techniques to make a private network connection between two LANs using public (internet) connections. Used by business to make secure WANs.
Modem
Routers & Switch & Hubs (Switches vs Routers vs .... - TeqLog)
WAPs: Wireless Access Points
Firewalls
NICs: Network Interface Cards
Connected devices: Servers, Workstations, Printers, etc...
Malware
spyware, viruses, worms, trojans, ransomware, botnets
Mitigate: Antimalware and user training
Software Security
Encryption, User Authentication, Version Control, Backup, etc...
Authentication and Access Control
Multifactor Authentication, Access Levels
Physical Security
Locked doors, ID Tags, Security Staff, Cameras, Logs, etc...
Disaster recovery plans
Pen Testing and Ethical Hacking
Network:
Packet sniffing, Man in the Middle, etc...
Web Apps
SQLi, XSS, (D)DOS, etc...
Symmetric and Asymmetric encryption
Digital Certificates (authenticating servers / files)
HTTP vs HTTPS (including SSL & TLS)
Intrusion Detection Systems and Intrusion Prevention Systems
Risk-benefits
Given all of the above risks - why do people still use networks?
Legislation (See details on year 12 page)
Federal: Copyright Act 1968, Privacy Act 1988 (Privacy Amendment Act 2012)
Victoria: Privacy and Data Protection Act 2014, Health Records Act 2001
Ethics - what it is "right" to do
If you run a web server then you could have access to large amounts of private data (personal details, images, emails, etc)
When you write software / build a network, think about cost/effort vs flexibility vs security. What are the ethical considerations?
Social Impact - displaces/changes jobs & can produce unhealthy work environments
etc
7 Security Risks and Hacking Stories for Web Developers (Fireship)
Networks and Hardware, Networks and LANs, Internet, Intranet, & VPNs (VCE IT Slides)
Crash Course Computer Science playlist (Section 5, Videos 28 to 33)
Khan Academy: Cryptography, AP CSP The Internet, AP CSP Online Data Security
Malicious Intentions The Virus Worm Trojan (Health is Technology Blog)
Old webpage (from when Stacey taught year 11 computing)