Professional Documents
Culture Documents
NETWORKS - II
DIMPLE THRESIA BENNY
Table of contents
01 02
Internetworking
Wireless/Mobile Terms and Concepts
Computing
Technologies
03 04
Network Security Viruses
Options
01
Wireless/mobile computing
technologies
SMS CHAT
•SHORT MESSAGE SERVICE
•NO IMAGE OR GRAPHICS •MOST FANTASTIC THING ON
•FIXED NO OF ALPHA- INTERNET
NUMERICS •SENDER
•SMSC TO HLR (STATUS) •SENDERS SCREEN
•RECIEVER’S SCREEN
•RECIEVER
Client-Side Scripting
- Code runs in the user's web browser
- Used for interactive web pages and
user interface enhancements.
Server-Side Scripting
- Code runs on the web server
- Used for processing data, interacting
with databases, and generating dynamic
web content.
03
Networking Security Concepts
Network Protection Methods
1. Authentication:
- Verifies the identity of users or devices to ensure authorized access.
2. Authorization:
- Specifies what users or systems are allowed to do after authentication.
3. Biometric Systems:
- Uses unique biological traits (e.g., fingerprints, retina scans) for identity
verification.
4. Firewall:
- Acts as a barrier between a trusted network and external, potentially harmful
sources to filter traffic.
Related Terms
- Cookies :Small text files stored by websites on your device for user tracking and
personalization.
- Hackers and Crackers: Hackers are skilled experts in computer systems, while
crackers are malicious hackers who break into systems for malicious purposes.
- Cyber law: Legal regulations governing internet activities and cyber security practices.
- India's IT Act, 2000: Enacted to provide legal recognition for electronic transactions,
data protection, and digital signatures, enhancing India's digital economy.
Cyber Crimes
-Classification of Cybercrimes:
committed online)
- Spam: Unsolicited and irrelevant emails or messages that clutter inboxes, waste
time, and may contain phishing attempts or malware.
- Malware: General term for malicious software, including viruses, Trojan, worms,
and spyware, which can result in data breaches, financial losses, and compromised
privacy.
NETWORKING SECURITY THREATS
- Use a Firewall:
Enable a firewall to filter incoming and outgoing network traffic and block malicious connections.
- Educate Users:
Train individuals to recognize phishing attempts and practice safe online behavior
Antivirus Software
THANK YOU !