An7B Project Computing
An7B Project Computing
Slide1
I have learned:
Network operating system (NOS)
Social engineering
Cracking password
Virus
Anti-virus software
Spyware
Firewall
Command line
Ransome ware
Graphical user interface (GUI)
Slide 2-4
WAN, LAN, PAN mean:
WAN: a type of network that communicates over a large geographical area,
such as window, macOS, IOS or country
LAN: a type of network that communicates over a small geographical area,
such as a single building
PAN: a type of network that communicates over an area of no more than
10metres usually connecting smart devices within the immediate area of a
user
PAN, WAN, LAN devices:
PAN:
tablets, printers, keyboards, barcode scanners, game consoles, laptops and
other personal devices.
Slide 5
Uses of copper cable:
used in electrical wiring for both domestic and industrial use. Electronic
circuitry, telecommunications, home ...
characteristics: Bare copper wire has excellent conductive properties, high
strength, good ductility, malleability, and creep resistance, making bare
copper conductors ideal for applications in electrical transmission, jumpers,
grounding electrical systems, electrical hookups, and electrical appliances
fibre-optic
uses of fibre-optic: medical, computer network, cable television….
Characteristics of fibre-optic: flexibility, Distance, bandwidth….
Slide6
WAN, LAN, PAN explanation:
WAN: a type of network that communicates over a large geographical area,
such as window, across, a city or country
LAN: a type of network that communicates over a small geographical area,
such as a single building
PAN: a type of network that communicates over an area of no more than
10metres usually connecting smart devices within the immediate area of a
user
WWAN, WLAN, WPAN:
WWAN: are types of wide area networks that are often used for
telecommunication by mobile devices using 3G, 4G and 5G. Devices connect
to a ‘mast’ or ‘tower’, which can be done over a distance up to 15kilometres
WPAN: is a type of PAN that can be connected using wireless technology only.
This is most often Bluetooth, as a PAN generally does not need to connect to a
device further than 10metres away
WLAN: are often used in homes and in small businesses WLAN using Wi-Fi, as
the transmission distance of Wi-Fi is around 9 metres (or more without
obstruction such as wall)
This article will explore important firewall threats and explain the major risks
faced by security teams. We will run through a typical risk assessment process
to mitigate firewall vulnerabilities. And we will finish with a short list of best
practices to secure your perimeter and meet regulatory goals.
1. Insider attacks
Some of the most dangerous firewall threats emerge from within
organizations. Users with excessive privileges can breach perimeter defenses
without any firewall intervention. When they gain access to internal network
resources, they can steal data or damage digital infrastructure.
Insider threats make it important to apply network segmentation within the
firewall perimeter. Companies can use cloud firewalls to create zones of trust
and apply the principle of least privilege. This restricts users to small portions
of the network and limits east-west movement.
2. DDoS attacks
Preventing DDoS attacks is one of the most important roles of a company
firewall. DDoS attacks involve massive injections of access requests or data
packets from malicious intruders. Without proper filters, large volumes of
traffic can take down network resources. This leads to downtime and may
cause data loss.
DPI operates at layer 7 of the OSI model and inspects the contents of data
packets. Packet filtering can only scan the outer layer of network packets. This
blocks some malicious agents but can be compromised by IP address spoofing
attacks. NGFWs with DPI are much less vulnerable to spoofing attacks and will
deliver far better network protection.
7. Misconfiguration
Many firewall threats stem from simple misconfigurations. For instance,
network technicians may retain default passwords when installing hardware
firewalls. Without regularly-changed strong passwords, devices will be
relatively easy to hack. And when attackers breach firewall passwords, they
can easily enter network resources.
Firewalls may also conflict with existing hardware or software. For example,
next-generation firewalls often work with intrusion detection systems. IDS
tools can generate excessive traffic loads.
This can impair network performance, leading to traffic bottlenecks. And it can
also compromise the effectiveness of firewall barriers, creating points of
vulnerability.
Antivirus:
Malware
Ransomware
Worms
Phishing…...
Antispyware software
Spyware
Worms
Adware
Viruses
Phishing
Keyloggers…...
-add a paragraph that explains the function operating system:
An operating system (OS) is a program that acts as an interface between the
system hardware and the user. Moreover, it handles all the interactions
between the software and the hardware. All the working of a computer system
depends on the OS at the base level. Further, it performs all the functions like
handling memory, processes, the interaction between hardware and software,
etc. Now, let us look at the functions of operating system.
Objectives of OS
The primary goals of an operating system are as follows:
When more than one process runs on the system the OS decides how and
when a process will use the CPU. Hence, the name is also CPU Scheduling. The
OS:
Proper utilization of CPU. Since the proper utilization of the CPU is necessary.
Therefore, the OS makes sure that the CPU should be as busy as possible.
Since every device should get a chance to use the processor. Hence, the OS
makes sure that the devices get fair processor time.
Increasing the efficiency of the system.
3. Device Management
An operating system regulates device connection using drivers. The processes
may require devices for their use. This management is done by the OS. The
OS: