You are on page 1of 2

Summary of “Networking and Communication”

Through chapter four, I added information and knowledge about networking and communication
into my mind.
First of all. I would like to mention a brief history of the internet. First, on 29th of October,1969,
the first transmission between two computers was successfully done and after that the first word
“login” sent over 350 miles, and then the US created ARPA (Advanced Research Projects
Administration) which is known as the internet. Now it has become DARPA (Defense Advanced
Research Projects Administration).
There are the following vocabularies which have their own rules for the internet operation and
we should know about them on the internet. Packet, switch, rooter, IP address, domain name,
DNS /domain name server of system/ , packet-switching, protocol, and TCP/ IP (transmission
control protocol/ Internet Protocol) protocols.
Secondly, I would like to talk about the Dot-Com bubble. The Dot-Com bubble, it is used in
digital marketing or online marketing. And it has evolved over time and is now used by all levels
of business, including the IPO, online commerce.
Wireless networking technology is a network that connects devices that can connect to the
Internet from anywhere, anytime.
Mobile networks only work in the mobile phones and there are 5 different parts that
1G,2G,3G,4G, and 5G have their own speeds 14,4 Kpbs; 300 Kpbs; 42 Mbps; 100+ Mbps; and
1 Gbps separately.
Voice Over IP converts analog signals to digital signals and does so based on the Internet.
And there is an organizational network that consists of a few components that are the internet,
extranet, intranet and LAN. An organizational network’s public area is the internet, suppliers,
customers, partners are like extranets, and company employees are like intranet or LAN.
Summary of “Information systems security”
The heart of IT is information security. There is an information security triad that is the CIA. The
CIA stands for confidentiality which has a rule to protect information, integrity which can’t copy
the information, and availability which can be accessed by someone in a specific period of time.
Another thing in information security is authentication which checks if a customer or someone is
a real person or not. There are three factors that are something they know/their ID and
password/, something they have/a key or a card/, something they are/biometrics/. And there is
another type of authentication which is called multi-factor authentication. It checks using the two
or more factors and it is difficult to attack.
Then there is an access control that defines the roles like who is the reader or who is the
director. It has two types of access control which are ACL stands for Access Control List and
RBAC stands for Role-Based Access Control.
Also to protect our information from attackers, we need to have a strong password which can’t
be attacked by someone. For example, Zaya@2001.
Next learning objective is encryption, which is a process of protecting document files and it
works by symmetric key and it is moving safely. When it is in the way, it looks like unreadable
text and is called ciphertext. In public key encryption, it has two keys that are a public key for
sender and a private key for receiver. And the next learning objective is firewalls that protect all
company servers and information. Another concept of this chapter is VPN, stands for Virtual
Private Networks and that allows an outside user of the company to take detours around the
firewall.
The last thing is physical security that is the protection of the actual hardware and networking
components that save and transmit information resources. It consists of locked doors, physical
intrusion detection, secured equipment, environmental monitoring, and employee training.

You might also like