Unit 1: Outcome 2 - Networks & Security

Key skills:

    1. identify types of networks and state reasons for their use
    2. evaluate the capabilities of different networks and communications technology
    3. explain the limitations and strengths of networks to support the communication and storage of data and information using mobile devices
    4. explain ways in which network professionals develop and maintain networks
    5. select and recommend networks suitable for specific uses
    6. explain how actions, devices and events can threaten the security of data and information communicated and stored within networks.

ways in which people, procedures, equipment and data combine to form networked information systems

When you get a question about an information system, you should always consider the four components in your answer: people; data; equipment (which includes hardware and software); and procedures. Without any one of them, data processing is either pointless or impossible.

Networking

Network hardware

Designing networks

Data security

Network protocols (Ethernet)

Task: Define and explain the following. Find images of each to assist with your explanations.

  • Network interface card (NIC)
  • Network topology
  • Routers, switches & hubs
  • Severs
  • P2P
  • WAN & LAN

capabilities of Wide Area Networks (WANs) and Local Area Networks (LANs)

Remember that LANs are geographically limited in size, typically within a hundred metres or so in breadth. (e.g. a college LAN)

A WAN can stretch across a city, state, country or the globe, and is typically made up of connected LANs (e.g. all the branches of the ANZ bank across Australia and New Zealand).

The internet is what you get when WANs interconnect.

Avantages and disadvantages for individuals and organisations of using networks in a global environment

A network in the global environment means the internet. The real questions here are why and how organisations and individuals gather and supply data. What are the reasons behind this and what systems are in place to keep data secure.

Refer to the "web-sites" PP at the bottom of the page an complete independent research to answer the following questions:

Task:

1. Why organisations acquire data via websites?

2. why individuals and organisations supply data via websites

3. Techniques for acquiring data on websites

4.Techniques for protecting the rights of individuals and organisations supplying data

Functions and characteristics of key hardware and software components of networks required for communicating and storing data and information

Task: Watch the video and make relevant study notes

Characteristics of wired and wireless network protocols

Task: Watch the video and make relevant study notes

Strengths and limitations of wireless and wired communications technology, measured in terms of data transfer rate, cost and reliability

Task: Compare wired and wireless network configurations and comment on transfer rates, cost and reliability.

Is one system better that the other.

Types, capabilities and limitations of mobile devices connected to networks

Task: Copy and complete the following table:

List as many mobile devise that can be coronet to a network that you can think of.

What the can do, what are their limitations and what might the future hold.

Device

Tablet

PDA

Gaming console

Mobile phone

Image

Capabilities/uses

Email

Calendars

Portable & Light

Many have QWERTY keyboards built in

Limitations

Future direction

Seem to be getting bigger and exponential

increase in computing power

Roles and responsibilities of professional people who develop and support networks, including procedures to control the operation of networks

Security threats to data and information communicated and stored within networks.

Network security is, and will be, one of the most crucial challenges facing the global society.

Security issues can be broadly defined into the flowing categories. You should have a clear understanding of internet security issues not only for this unit but to protect yourself.

PP "threats" attached.

DELIBERATE ACTIONS

•Viruses / worms

•Trojans

•Rootkits

•Malware = Adware, spyware

•Theft of computers and data

•Espionage

•Hackers

•Disgruntled employees

•Denial of Service attacks

•Phishing

•Internet scams

ACCIDENTAL ACTIONS

•Incompetent employees

•"Misplaced" data

•Natural disasters

TECHNICAL FAILURE

•Hardware failure (e.g. hard disk crash, file server failure)

•Operating system failure

•Software failure

TASK: Define EACH of the above threats.

Choose 3 risks from the "Deliberate Actions" list, 1 from "Accidental Actions" and 1 from "Technical Failure" and expand further. Include examples, images, case studies, technical details and actions that could be taken to prevent this kind of threat.