You are on page 1of 34

Y11 ICT

NETWORK ISSUE AND


COMMUNICATION
Vy,Than
h Kieu

My An, Beatrix
HACKER! BE CAREFUL!
HACKER is a person who has unauthorized
access to our computer data

HACKER will either steal our sensitive


information or cause any damages to the
data
VIRUSSS
VIRUS is a piece of malicious
computer code that is meant to
propagate from one device to
another.

VIRUS is programmed to :
- damage program
-deleting files
- reformating the hard drive
SPYWARE!!
Malicious software that invades your computer,
collects personal information about you and
sends it to a third party without your approval.

spyware affect our computer through these


activities: L W H I L E
BE C A R E F U
monitoring your activities on the internet
USI N G C O M P U T E R !
tracking your login details and information
spying your information
PHISING/PHARMING!

PHISING PHARMING
malicious emails that are sent, ONLINE SCAMS that will
require you to CLICK ON THE instal a malicious program
LINK! on your computer

the link contains malicious code your computer's data will be


that will invade your computer if stolen or damaged
you click on it -> damaged the
data
Identify users that request AUTHENTICATION
access to a system, network, TECHNIQUES
devices

1. Password-based authentication

2. Multi-factor authentication

3. Certificated-based authentication

4. Biometric authentication

5. Token-based authentication
MOST COMMON FORM OF
AUTHENTICATION

USERNAME
user's identification (user ID) TOP TIP
PASSWORD
8 characters include
required form of letters, uppercase & lowercase letters
numbers and special characters numbers
special characters.
PROS
reliable

able to change and

and
reset

CONS
Unconvinience

Time-consuming

Prone to forget
Biometrics
an individual base on their unique
biological characteristics.

Different forms of Biometric Authentication

Facial Voice fingerprints


recognization recognization scanner
Convinient Cost
s a v e ti m e F o o li n g s c a n n e r
h ar d to co p y a n d tra nsfer error rate
s e c u r i t y
hig h le v el of
c o m p l e x i b ilit y

Unchangibility
Magnetic swipe
card reader
Magstripe

hardware devices
read the encoded information on the magnetic stripe in
the back of plastic card.

1 ID card

Access control application


2
Credit and debit transaction
3
PROS and CONS
Advantages Disadvantages

Extremely reliable Have to directly


relatively immune to contact
outside effects Prone to damage
Unreadable data Able to be stolen
-> Higher security level data.
One-time code
used as an additional layer
of security
a six-digit number Transaction
authentication
2 steps included number
first : a password or a personal
identification number (PIN)
second : TAN
PROS AND CONS
reduce the possibility of fraud
Pros
provide extra security.

time-consuming
Cons
unconvinient
TWO-FACTOR AUTHENTICATION
a security system that require 2 steps of
WHAT IS verifying authentication
IT used to strengthen the security

a password or personal identification number (PIN)


a code sent to the user's devices / authenticator 2 STEPS
app / a biometric authentication methods.
PROS AND CONS
Disadvantages Advantages
Time-consuming

Unconvinient
more successful in preventing
depend on which 2FA devices or
unauthorized access
application

stealing phone / email hacked won't

ensure security
Preventions for computer:

ewall 2. Encry
Fir ption
1.

4. Data prot r
ection serve
roxy
act 3. P
Firewall
What is Firewall?
Firewall is a network security that
monitor and filter incoming and
outgoing network traffic. And it can
whether block or allow the data pass
through base on the define set of
security rules
Pros and
Advantages
Cons
 disadvantages
1. Firewall for large organizations
1. require seperate set of staff for
2. Prev operating them.
ent h
B acke
3. Pr etter rs 2. . It is defenseless against other
otect Priva
ion ca cy types of malware.
n aga
inst T 3.

for u rojans
ser
Encryption
1.
l faxing
physica SECTION 4
2. network
communicactio
email communication n

3.
electronic
faxing 4.

Video & AUDIO


conferencing
5.
web conferencing
WHAT IS
PHYSICAL FAXING?
DEFINITION

The process where we can scan an image or a


document and transfer that scan to the receiving
device, where it is printed.
O S A N D C O N S
R
P OF PHYSICAL FAXING

ADVANTAGES DISADVANTAGES
Simple to use Can prevent callers from
Cheap method of getting through or calls
sending a message being made
Allow extract copies of No response or
handwritten information feedback from the
without preparation recipient
Poor quality of the
document which is
received
EMAIL COMMUNICATIONS
DEFINITION
The exchange of short informational messages
between at least two people over a computer
network
PROS AND CONS
OF EMAIL COMMUNICATIONS

advantages disadvantages
Email is a free tool. Email could potentially cause
Email is simple, quick and easy to use information overload
Email is accessible from anywhere - as Lacks a personal touchand can be
long as you have internet connection disruptive
Email messages can contain viruses
ELECTRONIC FAXING
DEFINITION
The use of internet and internet protocols to send a
fax, rather than using a standard telephone connection
and a fax machine
PROS AND CONS
of electronic faxing

ADVANTAGES DISADVANTAGES
Flexibility - can log in anywhere The process is slow and takes
to receive and send faxes a long time to complete
Simplicity - the interface to Administrator functions
send faxes is very easy to use Unable to see the bill
and understand
Reliability
VIDEO CONFERENCING
DEFINITION

An online technology that allows users in


different locations to hold face-to-face
meetings without having to move to a single
location together
ADVANTAGES DISADVANTAGES

PROS Reduces
travel costs
Lack of
personal
AND interactions

CONS More flexible Network


connectivity
issues
of video conferencing
Increased Securing
productivity meetings
AUDIO CONFERENCING
DEFINITION

An online technologythat enables multiple people on


multiple phones to connect on the same call

PROS AND CONS


OF AUDIO CONFERENCING

advantages disadvantages
Telephones are widely accessible The kind of telephone used affects the
Multiple parties can participate in a quality of the call
discussion Some find it a waste of time
Allows people to participate in Can cause inconvenience to some
conversation when they can't parties
physically make the meeting
WEB CONFERENCING
Web conferencing is any type of online
meeting that involves two or more
participants in different locations
advantages disadvantages
of web conferencing of web conferencing

Decreases the importance Initial setup can be


of location expensive
Create a better work/life May lead to social
balance isolation
Significantly reduces long Technical issues can
- term costs cause disruptions
thank you
for your

listening

You might also like