Professional Documents
Culture Documents
Network Issues and Communication
Network Issues and Communication
ICT Learning
06 August 2020
Network Issues
and
Communication
Network Security
When accessing the internet, users
have to be very careful of many
issues – not all of them obvious.
Network Advantages Disadvantages
Security
• To protect vulnerable • It would be extremely
users gaining access to difficult and expensive to
Should
undesirable websites. police the internet.
the internet
• To prevent illegal material • Infrastructure including
be policed? (software, videos) be staff and offices
openly posted and shared would have to be required.
by web users. • Would be difficult to
• To bring to justice those enforce different rules in
users who continually different countries.
misuse the internet for • Could go against freedom
their personal gain. of speech.
Authentication
Authentication techniques are used to ensure
only authorized users are able gain access to a
Network via User Names/Passwords,
Biometrics, Swipe Cards, TAN, Two Factor
authentication etc.
Disadvantages Avoiding password interception
Authentication • Passwords can be guessed • Set strong passwords which
especially if they are simple. include :
• Passwords may be seen by • Use at least 8 characters
others. • Includes letters and numbers
• Passwords can be stolen and • Avoid using names or words
Password used by other people. which could be easily guessed.
• Spyware could be used to logs • Use upper and lower case
key presses to get passwords. letters.
• Passwords can be hacked by • Ensure password is regularly
using password generating changed.
software. • Avoid using the same passwords
for all of your accounts.
• Install spyware software which will
block the installation of any key
logging software.
Alternatives Authentication
Device Overview/Advantages
Biometrics • Biometrics use unique data.
• Finger Prints • Only the person with the biometric features can access the network.
• Retina Scan • Can not copy/replicate biometric data
• Iris Scans
• Face Scans
• Vocal Recognition
Magnetic Swipe Cards • Swipe cards are used to gain access to the system by swiping the card into the
reader.
• Swipe cards are quite easy to use and update.
• Could also be used to gain entry into a room (hotel room).
Transaction • TAN is used by online banking services.
Authentication • User will insert their bank card into the TAN reader which will then provide a
number (TAN) code which will need to be entered to complete a transaction.
Two factor authentication • Two Factor Authentication involves the user typing in their password and
then typing in a code.
• The code is sent to the registered phone number of the account as a text.
• If an unauthorised attempt is made to log into an account then
the text message will alert the user.
Viruses
A computer virus is a piece of programming
code/software which can install and replicate it
self on to a computer system without the user’s
permission.
Effect of Virus
A computer virus can cause the
following problems.
• Causes the computer to crash –
become slower
• Sometimes files can be deleted –
leads to computer malfunction.
• Data files can be copied by the
hacker or the files could be
corrupted.
• Could stop production until the
virus has been quarantined.
Installing anti virus and spyware software and
Viruses the use of a firewall is not enough to keep your
computer safe. You also need to pay attention
to the following points.
Keep
• Do not download any files from untrusted
Computer sources including email attachments.
Safe from • Do not install illegal software onto your
Viruses computer.
• Do not click on links from unknown websites.
• Do not connect storage devices (e.g. USB)
from unknown sources.
• Ensure virus software is up to date and virus
definitions are regularly updated.
Data Protection Act
Data protection Act applies to paper based or
electronic forms of data stored on a
computer.
The data protection act is to protect rights of
the individual who the data is obtained from.
Principles of the Data Protection Act
Viruses
1. Data must be fairly and lawfully processed.
Advantages • No need to travel to have meetings which would cut down on travelling costs (including
flights and hotel) and travelling time.
• Video conference can be held at short notice.
• Facilitates long distance learning – students can access live
lectures without travelling.
Disadvantages • Technical problems with the internet or hardware could effect the quality of the video
conference.
• Set up costs to purchase hardware/software and to provide relevant training to staff.
• Lack of personal contact you would have if it was a faceto
face meeting.
• Different time zones could make it difficult to find to find a suitable time to have a
meeting.
• Not possible to sign documents.
Network Communication
Type of Communication Overview
Audio – Conferencing Audio conference can be done over the telephone network or using a computer making use
of VOIP.
1. The organizer of the phone conference is given a unique Pin which can be shared
participants.
2. For Participants to join they have to dial the conference phone number.
3. Then they would have to enter a PIN.