Professional Documents
Culture Documents
Topics
⇨ Networks and the effects of using them
⇨ Network issues and communication
⇨ Effects of using ICT
⇨ Practicals - Functions
Hubs
Hubs are hardware devices that can have some other devices
connected to them. They are used to connect devices together to form a
local area network (LAN), often in the same building. A hub will take a
data packet received at one of its ports and broadcast it to every device
connected to it.
Consequently, switches are more secure than hubs (because only the
intended device is sent the data) and do not waste bandwidth (because
network traffic is reduced).
NOTE:
⇨ Both a hub and a switch are used to connect devices in a LAN
⇨ Both hubs and switches use data packets
⇨ Hubs send data packets to every device on the network; whereas
switches send data packets to a specific device only
⇨ Security is lower with hubs than with switches
⇨ A switch uses a look-up table to determine the destination device
⇨ Switches use MAC addresses to locate the destination device.
Bridges
Bridges are devices that connect one LAN to another LAN and uses the
same protocol (communication rules). They are often used to connect
together different parts of a LAN so that they can function as a single
LAN.
Routers
Routers are used to route data packets from one network to another
network, based on IP addresses. It can do this because each router has
its own IP address. Routers are used to connect a LAN to the internet.
When a data packet is received at one of its ports, the router inspects
the IP address and determines whether the data packet is meant for its
own network or for another, external network. If the data packet is meant
for its own network, it is routed to the local switch or hub. Otherwise, the
data packet is transmitted to a different router (and therefore to an
external network).
Router Bridge
Data is sent out using data packets Data is sent out using data packets
Connected networks will use different Connects networks together that use
protocols the same protocols
A routing table is used to direct data Bridges do not make use of routing
packets to the correct device tables
A router has more than two ports A bridge has only two ports
Cloud computing Storage
Cloud computing is a method of data storage where data is stored on
remote servers. The same data is stored on more than one server in
case of maintenance or repair, allowing clients to access data at any
time.
DISADVANTAGES -
—- If the customer/client has a slow or unstable internet connection,
they could
have many problems accessing or downloading their data/files.
ADVANTAGES
⇨ They allow the sharing of resources such as hardware and software.
⇨ They permit easy communication between users of the LAN.
DISADVANTAGES
⇨ There is an easier spread of viruses throughout the whole network
⇨ Slower access to external networks
⇨ Increased security risk when compared to stand-alone computers
Passwords
Passwords are used in many instances when accessing the internet. E.g
⇨ When accessing your email account » when carrying out online
banking.
⇨ Accessing social networking sites.
There are many more instances when you might need to type in a
password and, in many cases, a user ID. It is important that passwords
are protected. Some ways of doing this are described below:
» Run anti-spyware software to make sure that your passwords are not
being relayed back to whoever put the spyware on your computer
» Passwords should not be easy to crack (e.g. your favourite colour, name
of a pet or favourite rock group); passwords are grouped as either
strong (hard to crack or guess) or weak (relatively easy to crack or
guess).
➔ Zero login
➔ Biometrics
➔ Magnetic Stripes
➔ Smart Cards
➔ Physical Tokens
➔ Electronic Tokens
Zero Login and Biometrics
Zero login essentially relies on devices being smart and secure enough
to instantly recognise a user by several features based on:
—- Biometrics
—- Behavioural patterns.
Behavioural patterns include: how you walk, your typing speed, your
normal location, how you swipe the screen, and so on. These
behavioural patterns, coupled with biometric data, should be enough to
uniquely identify a user, and allow them into a system without actually
supplying any passwords or other security information. The advantages
of zero login are fairly clear: enhanced security (it is difficult to copy
biometrics and behavioural patterns) and an easier and much quicker
way to log into a system. But certain disadvantages need consideration:
ADVANAGES -
➤They are easy to use.
➤ It is not an expensive technology.
➤ Magnetic cards can be remotely deactivated (if lost or stolen).
➤ The cards can be multi-purpose
DISADVANTAGES
➤ Less secure
➤ Magnetic readers often fail to read the cards on the first attempt.
Smart Cards
By inserting a tag (chip and antenna) into a security card, it can act as a
smart contactless card (that is, it can be read from a distance and does
not have to be swiped through a card reader).
The chip on the smart card can store data such as name, security
number, sex, date of birth and a PIN. Smart cards can therefore be used
as a security device.
Physical Tokens
A physical (or hardware) token is a form of authentication in the form of
a physical, solid object. The user’s interaction with a login system is
used to prove that the user has possession of the token.
Electronic tokens
Electronic (software) tokens are software installed on a user’s
device, such as a smartphone. Suppose a user wishes to log on to a
website using their tablet computer. This website requires electronic
tokens to be used to authenticate the user. The user has already
installed the electronic token app on their smartphone.
Anti-malware Software
Anti-virus software should be loaded onto a computer and then run to
allow all software and devices to be scanned for viruses. Whenever data
or a software is downloaded or being transferred to another device, it is
essential that a virus check is carried out on that other device too.
➤ They carry out heuristic checking – this is the checking of software for
types of behaviour that could indicate a possible virus; this is useful if
software is infected by a virus not yet on the database.
Electronic conferencing
➪ Video conferencing
➪ Audio conferencing
➪ Web conferencing
Video conferencing
Video conferencing is a communication method that uses both video
and sound. It is a substitute for face-to-face conferences between a
number of people, who may be in a different part of the country or live
overseas.
The basic hardwares are
➤ Webcams
➤ Large monitors/television screens
➤ Microphone
➤ Speaker
Audio conferencing
Audio conferencing refers to meetings held between people using
sound equipment.
➼ When the phone conference is about to start, the organiser dials the
conference phone number and, once they are connected, keys in their
personal PIN.
Web conferencing
Web conferencing uses the internet to permit conferencing to take
place.
Delegates can leave or join the conference as they wish. The organiser
can decide on who can speak at any time using the control panel on
their computer. If a delegate wishes to speak, they raise a flag next to
their name. Delegates can post comments using instant messaging for
all delegates to see at any time.
➽ Lifestyle
➽ Leisure time
➽ Physical fitness
➽ Data security
➽ Social interaction
There is no longer a need to stay They tend to make people rather lazy
home while food is cooking or because there is a dependence on the
clothes are being washed devices.
ADVANTAGES DISADVANTAGES
If you can communicate remotely with devices in your home, then so can
a hacker. Any household device which can be remotely controlled could
allow a hacker to gain personal data about you. These devices are often
set with a default (or no) password, making it easy for cybercriminals to
obtain personal details.
For example, by hacking into a central heating controller (or the app
used to communicate with the controller) it is possible to find out
holiday dates, which then makes a home an easy target for break-ins.
Social interactions
There are both positive and negative impacts of
microprocessor-controlled devices on social interactions to consider.
While some devices leave people with more time to do things outside
their homes, other devices encourage people to stay at home. Devices,
such as smartphones, smart televisions or tablets allow people to
communicate from home using VoIP (a type of video conferencing),
emails or chat rooms.
ADVANTAGES DISADVANTAGES
Transport systems are more If the computer system fails then the
efficient – more cars, trains and whole transport system could be
aeroplanes can use the transport brought to a standstill.
network, allowing for more regular
services.
Stolen cars and criminals can be ANPR systems mean that innocent
spotted using ANPR. people’s movements can easily be
tracked. Who has access to that data?
Computerised control systems
minimise human error, which
reduces the rate of accidents.
It will take a large leap of faith for humans to ride in an autonomous car
or an aeroplane with no pilot. We are already used to autonomous
trains, as these are used in many cities throughout the world. These
systems have been generally accepted, but that is probably because
trains do not overtake other trains and have a very specific track to
follow.
Cameras catch visual data from the surroundings, while radar and
ultrasonics allow the vehicle to build up a 3D image of its surroundings
(very important when visibility is poor, such as in heavy rain, fog or at
night).
Constant monitoring must take place until the light changes to green.
When this happens, the microprocessor will again instruct actuators to
put the car into first gear, release the brakes and operate the throttle
(accelerator). This is a very complex set of operations because the
microprocessor must constantly check all sensors and cameras to
ensure moving off is safe (for example, has the car in front of it broken
down or has a pedestrian started to cross the road, and so on). To go
any further is outside the scope of this book.
There are many reasons why this would be of benefit to a hacker, but it
is outside of the scope of this textbook. However, the hacker probably is
not really interested in gaining control of the vehicle; they may be more
interested in knowing where the car is, where it is going and finding
personal information about the owner of the vehicle. Remember, these
vehicles could be a car, a train or even an aeroplane – so the potential
security and safety risks are vast.
ADVANTAGES DISADVANTAGES
Increased lane capacity (research The need to make sure the system
shows autonomous vehicles will is well- maintained at all times;
increase lane capacity by 100% cameras need to be kept clean so
and increase average speeds by that they do not give false results;
20%, due to better braking and sensors could fail to function in
acceleration responses together heavy snowfall or blizzard
with optimised distance between conditions (radar or ultrasonic
vehicles) signals could be deflected by
heavy snow particles)
Autonomous trains
Autonomous trains have been around for years in a number of large
cities. As with other autonomous vehicles, driverless trains make
considerable use of sensors, cameras, actuators and on-board
computers/microprocessors.
The control system in the train also makes use of global positioning
satellite technology, which allows accurate changes in speed and
direction to be calculated. Again, actuators pay a huge role here in
controlling the train’s speed, braking and the opening and closing of
the train doors. The safety improvements made by these autonomous
systems are fairly obvious.
ADVANTAGES DISADVATAGES
Reduced running costs (fewer System does not work well with
staff are required) very busy services (at the moment)
ADVANTAGES DISADVANTAGES
Improved safety (most crashes of Hacking into the system (it could
aeroplanes have been attributed to be possible to access flight control
pilot-induced errors) via the aeroplane’s entertainment
system)
Back and Caused by sitting in front Use fully adjustable chairs to give the
neck strain of a computer screen for correct posture
long periods of time
Use foot rests to reduce posture
problems
Practical Functions
data_analysis_functions_in_a_nutshell (1)