You are on page 1of 17

Checkpoint 2

ICT Learning
06 August 2020
Network Issues
and
Communication
Network Security
When accessing the internet, users
have to be very careful of many
issues – not all of them obvious.
Network Advantages Disadvantages
Security
• To protect vulnerable • It would be extremely
users gaining access to difficult and expensive to
Should
undesirable websites. police the internet.
the internet
• To prevent illegal material • Infrastructure including
be policed? (software, videos) be staff and offices
openly posted and shared would have to be required.
by web users. • Would be difficult to
• To bring to justice those enforce different rules in
users who continually different countries.
misuse the internet for • Could go against freedom
their personal gain. of speech.
Authentication
Authentication techniques are used to ensure
only authorized users are able gain access to a
Network via User Names/Passwords,
Biometrics, Swipe Cards, TAN, Two Factor
authentication etc.
Disadvantages Avoiding password interception
Authentication • Passwords can be guessed • Set strong passwords which
especially if they are simple. include :
• Passwords may be seen by • Use at least 8 characters
others. • Includes letters and numbers
• Passwords can be stolen and • Avoid using names or words
Password used by other people. which could be easily guessed.
• Spyware could be used to logs • Use upper and lower case
key presses to get passwords. letters.
• Passwords can be hacked by • Ensure password is regularly
using password generating changed.
software. • Avoid using the same passwords
for all of your accounts.
• Install spyware software which will
block the installation of any key
logging software.
Alternatives Authentication
Device Overview/Advantages
Biometrics • Biometrics use unique data.
• Finger Prints • Only the person with the biometric features can access the network.
• Retina Scan • Can not copy/replicate biometric data
• Iris Scans
• Face Scans
• Vocal Recognition
Magnetic Swipe Cards • Swipe cards are used to gain access to the system by swiping the card into the
reader.
• Swipe cards are quite easy to use and update.
• Could also be used to gain entry into a room (hotel room).
Transaction • TAN is used by online banking services.
Authentication • User will insert their bank card into the TAN reader which will then provide a
number (TAN) code which will need to be entered to complete a transaction.
Two factor authentication • Two Factor Authentication involves the user typing in their password and
then typing in a code.
• The code is sent to the registered phone number of the account as a text.
• If an unauthorised attempt is made to log into an account then
the text message will alert the user.
Viruses
A computer virus is a piece of programming
code/software which can install and replicate it
self on to a computer system without the user’s
permission.
Effect of Virus
A computer virus can cause the
following problems.
• Causes the computer to crash –
become slower
• Sometimes files can be deleted –
leads to computer malfunction.
• Data files can be copied by the
hacker or the files could be
corrupted.
• Could stop production until the
virus has been quarantined.
Installing anti virus and spyware software and
Viruses the use of a firewall is not enough to keep your
computer safe. You also need to pay attention
to the following points.
Keep
• Do not download any files from untrusted
Computer sources including email attachments.
Safe from • Do not install illegal software onto your
Viruses computer.
• Do not click on links from unknown websites.
• Do not connect storage devices (e.g. USB)
from unknown sources.
• Ensure virus software is up to date and virus
definitions are regularly updated.
Data Protection Act
Data protection Act applies to paper based or
electronic forms of data stored on a
computer.
The data protection act is to protect rights of
the individual who the data is obtained from.
Principles of the Data Protection Act
Viruses
1. Data must be fairly and lawfully processed.

Keep 2. Data can only be processed for the stated purpose.


Computer 3. Data must be adequate, relevant and not excessive.
Safe from 4. Data must be accurate.
Viruses 5. Data must not be kept longer than necessary.
6. Data must be processed in accordance with the data
subject rights.
7. Data must be kept secure.
8. Data must not be transferred to another country
unless they have adequate protection.
Network Communication
A communication Network is a
collection of methods that users
employ to pass on valuable
information
Network Communication
Type of
Overview/Advantages Disadvantage
Communication
Physical Faxing • Requires a fax machine and a telephone line. • Anyone can access faxed
• Number of the recipient dialled before the documents.
document is copied and sent. • The fax may be out of paper or ink
• Physical documents are printed and can be (toner).
signed. • No notification of fax received.
Email • Can send multiple attachments. • Email attachments may include viruses.
Communication • Can send to multiple recipients in one • May receive spam (unwanted mail).
message. • May receive phishing (scam)
• Emails can be received instantly and accessed on emails to obtain personal data.
many platforms including tablets and phones.
Electronic Faxing • Electronic Fax is sent via a internet connection.
• No need to buy a fax machine, ink or paper.
• Electronic Fax documents are sent to an email which will ensure the correct person
will receive the fax – less chance of document being intercepted.
• Electronic Fax's can also be sent directly to a fax machine.
• Send fax's from any location with an internet connection.
• No additional cost to send fax over internet network.
Network Communication
Type of Communication Overview
Video • Video conferencing uses both video and sound using an internet connection.
Conferencing • It can be used to have business meeting when people are in different locations.

Advantages • No need to travel to have meetings which would cut down on travelling costs (including
flights and hotel) and travelling time.
• Video conference can be held at short notice.
• Facilitates long distance learning – students can access live
lectures without travelling.
Disadvantages • Technical problems with the internet or hardware could effect the quality of the video
conference.
• Set up costs to purchase hardware/software and to provide relevant training to staff.
• Lack of personal contact you would have if it was a faceto
face meeting.
• Different time zones could make it difficult to find to find a suitable time to have a
meeting.
• Not possible to sign documents.
Network Communication
Type of Communication Overview
Audio – Conferencing Audio conference can be done over the telephone network or using a computer making use
of VOIP.
1. The organizer of the phone conference is given a unique Pin which can be shared
participants.
2. For Participants to join they have to dial the conference phone number.
3. Then they would have to enter a PIN.

Web – Conferencing • Web conference can be done using internet connection.


• It is very similar to video conference as participants can hear audio and see a live video
stream.
• Participants can join the web conference by clicking on the supplied link from the
organizer.
• Participants can join and leave the web conference at any time.
• Instant messaging (IM) feature is available to communicate with other participant
• Participants can be given permission to speak and can share content such as images,
video or presentations.
I am the vine; you are the
branches. If you remain
in me and I in you, you
will bear much fruit;
apart from me you can
do nothing.
John 15:5 NIV

You might also like