You are on page 1of 5

A/L ICT Janaka Srilal(BCS-UCSC)

Bandwidth

This refers to the speed of data transmission in a data transmission medium. When transmitting data
in analogous waves this is considered as frequency (the number of wavelengths per unit time) and
then measured in hertz (Hz). When transmitting data in digital waves, this is the number of bits (bps)
transmitted per unit time. Mbps and Gbps are used as large the unit sizes.

Internet

This is a network of computer networks that is built with several networks around the word as a wide
area network (WAN) those are connected with large number of host computers. It works on the TCP /
IP specification.

TCP/IP structure

This is a communication language that is used when connecting to the Internet or any other network.
This is working with several other protocols.

Intranet

Computer networks, which are used by members of an organization or company to communicate data
and information with others and not connected to the external computers.

Packet Transmission

When a data packet is created on a host computer when it comes to the network layer in OSI format,
it is sent as a set of bits over the physical layer's transmission media, devices and the router on the
path route it to the destination IP address of the data packet.

https://www.youtube.com/watch?v=nomyRJehhnM

ප ගණක ජාල හා ද ත ස ෙ දනය Page 1


A/L ICT Janaka Srilal(BCS-UCSC)

Cookies

A cookie is a set of data that sends from the web site to be stored on the user's computer when they
visit a web site. It is used to remember activities performed by the user, such as information on
accessed web pages, user names and passwords

Internet Engineering Task Force

It is an open standards compliance agency based on TCP / IP protocol and they develop and promote
Internet-based standards. The managers and members are volunteers.

World Wide Web

The World Wide Web is the main service provided on the Internet using server computers around the
world. There are a number of websites that provide services to users, each with a unique address
(Uniform Resource Locator).

Hyper Text Transfer Protocol (HTTP)

This protocol is based on data transmission over the World Wide Web (WWW). It works on client-
server architectures as a request-response mechanism.

Newsgroups

A discussion on a topic that needs to be redirected to a central web site, with the aim of redistributing
it to a worldwide forum called Usenet. The first few notes are organized into the main subject and
subheadings of the subject. The first few notes are organized into the main subject and subheadings of
the subject.

ප ගණක ජාල හා ද ත ස ෙ දනය Page 2


A/L ICT Janaka Srilal(BCS-UCSC)

Web Portal

This is often a specially designed site that gathers all kinds of information from one place and give
them from single location. This is just another web site in the World Wide Web, but it acts as a
network gateway.

Ex: Official Web Portal of Government of Sri Lanka - www.gov.lk

Accidents and attacks on computer networks

Threats

 Spoofing
Any person or program is forged and illegally profited as another person or program. (This can
occur when there is no mechanism to identify the sender or receiver correctly).
 Tampering

Intentionally modifying information or making important information trivial. To minimize this,

 Identifying the knowledge, equipment and techniques of the tampering person.


 Identify all possible methods of tampering
 Limit accessibility
 Interrupts to make the tampering more difficult and time consuming
 Work out strategies to detect if there has been any tampering
 Notifying relevant persons that the tampering is occurred
 Repudiation
Allows other malicious or counterfeit actions beyond the control of users who are properly
connected to the computer. Log files can include fake user activity information.
 Information Disclosure
When storing information on remote client computers, system specific information (such as the
software distribution, version numbers, and patch levels, or the information may contain the
location of backup files and temporary files) may be out sourced.
 Denial of Services
This can result in a person or organization not getting the usual services. Theft or destruction of
data does not occur here, but is an economic loss to the organization or individual.
 Elevation of Privileges
An outside attacker may use programs by using privileges that he does not have.
 Phishing
Stealing user data by pretending to be trustworthy.
 Port Scan
Tells the network host to open windows. This is done by software. Network administrators do this
while follow security policies, and attackers exploit system vulnerabilities to exploit them.

ප ගණක ජාල හා ද ත ස ෙ දනය Page 3


A/L ICT Janaka Srilal(BCS-UCSC)

Attacks

 Hackers and Crackers


Persons or special software designed to hack a computer and cause harmful effects. Hackers
detect and exploit computer system flaws and exploit them. But does not cause serious damage to
the computer system. But crackers can also damage the computer system.
 Espionage
Obtaining confidential information by operating a program without the consent of the owner.
 Eaves dropping
Getting in the middle of a conversation and sneaking in secret.
 Man in the Middle Attack
It receives the data exchanged between the client computer and the server computer from the
middle. In this case the attacker pretends to be a proxy server with other computers and makes
new connections. There are also changes to the data being exchanged.
 IP Session Hijacking
A session of a host computer on the Internet is forcibly seized and communicate with another host
computer. In this case, the attacker steals the cookies on the first host.

Malfunctioning programs (Malware)

 Viruses
 Worms
 Hoxes
 Trojans
 Spam
 Spyware

For more information

http://www.malwaretruth.com/the-list-of-malware-types/

Actions to be taken to protect the networks and their information

 Encryption

ප ගණක ජාල හා ද ත ස ෙ දනය Page 4


A/L ICT Janaka Srilal(BCS-UCSC)

 Antivirus Softwares
 Firewalls and Proxy Servers

 Software Repairs(Patches) and Updates


 Authentication, Passwords/Password Phrases
 Control for Users
 Disabling Unused Interfaces
 Set traps against attackers and block them once identified (Honey Pots and Sugarcanes)

For more information


http://www.auditmypc.com/honeypot.asp

 Public Key and Digital Signatures


A digital signature is a mathematical way of exposing the authenticity of digital messages or
documents.

ප ගණක ජාල හා ද ත ස ෙ දනය Page 5

You might also like