Professional Documents
Culture Documents
1
INTRODUCTION TO CYBER SECURITY
LESSON 1Lesson 1
AND ETHICAL HACKING
When a group of computers is integrated (or connected) together for sharing some
information or resources, the scenario is defined as Computer Network. In short,
connecting to different devices through a common structure for the purpose of
communicating and sharing resources is what Networking is all about.
The most common example of a network is the Internet. It's the network that connects
computers and systems from different geographical domains. On the other hand, there's
also something known as Intranet. This is again another example of a network, the only
difference being it connects devices within a specific geographical range or boundary.
The concept of networking is strongly based on sharing resources. In fact, it’s only through
interchanging information and sharing of resources that allows a network to grow and
popularize among the social circle.
Node
If you are working as a network operator, analyst, or anything else related to the stream,
you will often hear a common word ‘Node’. Well, Node is basically a term used to refer a
device that's connected to a network. It can be a computer, smartphone, printer, FAX
machine, etc. A device being addressed as a Node must have the power and capability to
send and receive data being generated through other nodes via a network (be it internet
or intranet). The connectivity links for the devices (or nodes) in a network are commonly
referred to as Communication Channels.
Computer network need not necessarily have to comprise of a system with single Control
Unit being connected to multiple other systems. If such a scenario happens, it can be best
referred to as Distributed System. You cannot address it as a Computer Network.
Distributed System: When different computers are connected through a network but
they tend to appear as a Single Coherent System before the users, it’s referred to as
Distributed System. In a Computer Network, this coherent part is somewhat absent. If
you watch closely, World Wide Web or the Internet can be best referred to as a Distributed
System.
2
INTRODUCTION TO CYBER SECURITY
LESSON 1Lesson 1
AND ETHICAL HACKING
A computer network must focus on certain factors to ensure superior performance. These
are:
● * Performance
● * Reliability
● * Security
Performance
● * Transit time (referred to the total time taken for a message to travel from a
device to another)
● * Response time (referred to the time taken to provide a response to the inquiry)
Performance of a network can also be measured while focusing on the following conditions:
How frequent the network failure occurs? Reliability is predicted by measuring the
frequency of the failures that happen to a network. Higher the number of failure less will
be the network’s reliability.
Security
How secure is the network? How secure are the data and information being accessed
through the network? As per the security parameters, a good network will always offer the
best of protection of data and information from any kind of unauthorized user accessibility.
3
INTRODUCTION TO CYBER SECURITY
LESSON 1Lesson 1
AND ETHICAL HACKING
Summary -
● Distributed systems are similar to computer networks but they follow a coherent
approach to create a more concise and compact appeal before the users in regards to
sharing information and maintaining connectivity.
● The quality of a computer network is judged by its overall performance, reliability, and
security.
_______________________________________________________________
MCQ
1. When collection of various computers seems a single coherent system to its client,
then it is called
a) computer network
b) distributed system
c) both (a) and (b)
d) none of the mentioned
4. Bluetooth is an example of
a) personal area network
b) local area network
c) virtual private network
d) none of the mentioned
4
INTRODUCTION TO CYBER SECURITY
LESSON 1Lesson 1
AND ETHICAL HACKING
8. Which one of the following extends a private network across public networks?a) local
area network
b) virtual private network
c) enterprise private network
d) storage area network
_______________________________________________________________________
MCQ Answers-
1.B, 2.A, 3.D, 4.A, 5.C, 6.B, 7.A, 8.B, 9.A, 10.D