4.2 Network Issues and Communication
4.2 Network Issues and Communication
4.2
Chapter 4: Networks and the effects of using them
• Network communication
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Security Issues
Exam Question
Hacking is the unauthorised access to computer systems with the intention of
causing harm. Hackers could edit, delete and steal data. Hackers could also
introduce viruses to a computer network to cause disruption. On the other hand
hackers could be employed to expose weaknesses of the system.
Describe the measures that should be taken to help protect data from being hacked.
The use of usernames and strong passwords to stop remote and local logins. Also
using different passwords for different accounts would reduce the chance of
hacking. Biometric systems could be used to ensure the official user is present.
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Authentication techniques are used to ensure only authorised users are able gain access to a
Network via User Names/Passwords, Biometrics, Swipe Cards, TAN, Two Factor authentication
etc.
When users log onto to their online accounts they may also be asked for additional
information to verify their accounts.
Security Question:
• Users may be asked to answer security questions related to their
account.
• Typical questions includes mothers maiden name.
Personal Image:
• QNB (Qatar National Bank) require users to identify an image when
they log in on the website for online banking. .
• Users will have to confirm if the image shown is one they selected as
their account image.
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Exam Question
A weak password is easy to guess and includes few characters and consists of all
letters or all digits. A weak password typically relates to the user for example their
favourite colour. A strong password is difficult to guess and contains many
characters. Also a strong password uses mixture of upper case letters, digits and
symbols.
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Device Overview/Advantages
Biometrics • Biometrics use unique data.
• Finger Prints • Only the person with the biometric features can access the
• Retina Scan network.
• Iris Scans
• Can not copy/replicate biometric data
• Face Scans
• Vocal Recognition
Magnetic Swipe • Swipe cards are used to gain access to the system by swiping the
Cards card into the reader.
• Swipe cards are quite easy to use and update.
• Could also be used to gain entry into a room (hotel room).
Two factor • Two Factor Authentication involves the user typing in their
authentication password and then typing in a code.
• The code is sent to the registered phone number of the account
as a text.
• If an unauthorised attempt is made to log into an account then
the text message will alert the user.
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
A computer virus is a piece of programming code/software which can install and replicate it self
on to a computer system without the user’s permission. A computer virus can cause the
following problems.
1. Causes the computer to crash – become slower
2. Sometimes files can be deleted – leads to computer malfunction.
3. Data files can be copied by the hacker or the files could be corrupted.
4. Could stop production until the virus has been quarantined.
Spyware gathers data from computers without the user knowing. Spyware could
monitor key presses to gain personal information or passwords. This information
would be sent back to the hacker.
Installing anti virus and spyware software and the use of a firewall is not
enough to keep your computer safe. You also need to pay attention to the
following points.
• Do not download any files from untrusted sources including email attachments.
• Do not install illegal software onto your computer.
• Do not click on links from unknown websites.
• Do not connect storage devices (e.g. USB) from unknown sources.
• Ensure virus software is up to date and virus definitions are regularly updated.
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
John is working on a school History project and saves his work. He is told by one of
his teachers that the school network has been infected by a computer virus.
(a) Explain what is meant by a computer virus and give examples of how a
computer virus can affect a computer.
Exam Question
A virus is a piece of software/program code that infects a computer by attaching itself
to files. A computer virus has the ability to replicate itself. The virus can cause the
computer to crash or shut down. It can delete and corrupt files on the computer.
Computer operations, files or software can become unstable or unresponsive.
John copies his History project from the school network onto his home computer using a pen
drive. There are many ways his home computer can become infected by a computer virus.
Describe three ways in which John could protect his home computer from being infected.
Scan the pen-drive as it is inserted into his computer. Use anti-virus software to scan
the computer hard drive on regular occasions. Also John needs to ensure he does
not use media from an unknown source or downloads attachments from unknown
email addresses. The anti-virus software should be regularly updated to protect
against the latest threats.
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Exam Question
The firewall is needed for network security. It controls the incoming and outgoing
network traffic.
A firewall establishes a barrier between a trusted, secure internal network and the
Internet. In addition it logs incoming and outgoing traffic and stops malicious traffic.
Furthermore it prevents computers connecting to unwanted sites . Also the firewall
prevents untrusted/unrecognised computers accessing data on the system.
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Encryption
Disadvantages
• Data can still be deleted from system
• Criminals can use encryption to keep incriminating material secure
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Exam Question
When using online banking data will be encrypted. When the user logs on to a
secure website they will enter personal details into the webpage. The information
will then be encrypted (scrambled) so if the information was to be intercepted it
would be meaningless for them. Once the bank receives the information they will
be able to decrypt the information using a key and convert it into a form which
can be understood.
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Proxy Server
Data protection Act applies to paper based or electronic forms of data stored on a computer.
The data protection act is to protect rights of the individual who the data is obtained from.
Web based business such as Amazon or Ebay store sensitive data about customers including
payment details. They would have to abide by the data protection act to keep the data secure.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Most data protection acts include the principle that data should be stored
securely. List four other principles of a typical data protection act.
Exam Question
WWW.YAHMAD.CO.UK
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Network communication
Type of Overview/Advantages Disadvantage
Communication
Physical Faxing • Requires a fax machine and a telephone line. • Anyone can access faxed
• Number of the recipient dialled before the documents.
document is copied and sent. • The fax may be out of paper or
• Physical documents are printed and can be ink (toner).
signed. • No notification of fax received.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Network communication
Disadvantages • Data is more likely to be intercepted • Cant be used when documents need to be
once it is printed from the fax signed.
machine. • Viruses can be download from
• There could be delays in receiving attachments.
the fax due to a busy telephone line • Unwanted emails could be received
or lack of paper or ink. (Phishing/Spam).
• Fax can only be received during
office hours.
• Not everyone has a fax
machine.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Exam Question
Email can be received on many different platforms (PC, Laptop, Smart phone)
instantly. In contrast a fax will only be received once it has been printed. If the fax
machine is offline or there is a problem with the printing (lack of ink or paper) then
the fax will not be received. Also a fax can only be received if the recipient has a fax
machine and during office hours . In addition the fax can be intercepted by anyone
close to the fax machine. On the other hand email is password protected which
would ensure the security of the email. The main advantage of an email is that a
message can be sent to many recipients and attachments can be added.
Nevertheless unwanted emails could be and viruses could be downloaded
from attachmentsreceived
. The main advantage of a fax is that you receive a physical copy of
the document and signed copies can be legally accepted.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Exam Question
Physical faxing and electronic faxing both involve you being assigned a fax (phone)
number and the user of a phone line. Both can involve use of a hard copy original.
Physical faxing requires purchase of a fax machine. Electronic faxing requires the use
or purchase of a computer. Physical faxes can be picked up by anyone however
electronic faxing goes straight to your email address. With a Physical fax the phone
line could be busy or engaged. In addition Physical faxes must have paper and the
fax machine could can get paper jams. Electronic fax is quicker to arrive than
physical since it goes direct to your email.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Network communication
• Screen/Monitor
Advantages • No need to travel to have meetings which would cut down
on travelling costs (including flights and hotel) and
travelling time.
• Video conference can be held at short notice.
• Facilitates long distance learning – students can access live
lectures without travelling. • Speaker
WWW.YAHMAD.CO.UK
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Exam Question
Video conferencing can be held at short notice without the need to travel. As a
result travelling time and expenses would be saved. However set up costs to buy
equipment could initially be expensive. Also staff would require training on to use
the technology. In addition during the video conference there could be technical
problems which could affect the quality of the sound and video . Video conferencing
could also facilitate long distance learning nevertheless the different time zones
could be an issue when arranging a meeting. Moreover the lack of personal contact
could it make it more difficult to understand the tone and context of the
conversation. Furthermore it would not be possible to sign documents.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Exam Question
Power cuts could lead to parts of the video-conference shutting down. Also a Lip
sync problems/time lag could means that the picture is not running at the same
speed as the sound. Som e participants may e video-conferencingoutside of work
hour due to time zones. bIn addition it would be expensive to purchase the
shardware and software required. Furthermore the quality of the video conference
would be dependent on a reliable internet access . Staff would also have to be
trained and this could be additional expense for the company. Moreover documents
will not be able to be signed and physical objects cannot be examined .
WWW.YAHMAD.CO.UK
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Network communication
WWW.YAHMAD.CO.UK
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Network communication
2. Phone number and Pin is provided for 2. Web link and Pin is provided for the
the Organiser and the Participants Organiser and the Participants
5. Participants call the number and their 5. Participants can join by accessing the
PIN. web link and entering their PIN.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
Exam Question
Web Conferencing allows for real time collaboration and communication . Multiple
users are connected to the internet and see the same screen at all times in their
web browsers. The web conference allows users to instant message each other
details of the car. VOIP could allow users to discuss the car range. Full motion video
can be used to show the car being test driven.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory
4.2
Chapter 4: Networks and the effects of using them
WWW.YAHMAD.CO.UK