You are on page 1of 10

Network

communications
Angel
What is network communication?
Network communication refers to the exchange of data and information between devices or
systems through a network.

A network is a collection of interconnected devices (such as computers, servers, routers,


switches, etc.) that are linked together.

Network communication allows efficient data exchange, resource sharing

Real life applications of network communication include web browsing, video


conferencing, emails, social media, instant messaging, VoIP calls, smart home devices, etc.

Network communication - Angel 2


Types of Network communication

1.Wired Communication (Ethernet, Fiber optic)

Using physical cables for data transmission.

2. Wireless Communication (Wi-fi, Bluetooth, Cellular networks)

Transmitting data without physical connections.

3. Satellite Communication

Data transmission via communication satellites.

4. Point-to-Point Communication

Direct communication between two devices.

Network communication - Angel 3


Network security challenges
& precautions
Security threats

•Unauthorized Access (Gaining entry to a system, network or data without permission.

•Insider threats (Risks posed by individuals within an organization who have access to sensitive information and many misuse it.

•Hackers (Individuals or groups who use their technical skills to gain unauthorized access to computer systems, often for malicious purposes.

•Malware and Viruses (Malicious software that infects and compromises computer systems, including viruses that self-replicate and spread.)

•Spyware (Software that secretly gathers information about a user's online activities or personal data without their consent, often for advertising or espionage
purposes)

•Phishing (where attackers impersonate trusted entities to trick individuals into revealing sensitive information, such as passwords or credit card details.)

•Pharming (Manipulating the DNS (Domain Name System) to redirect users to fake websites, often used in conjunction with phishing to steal information or
distribute malware.)

Network communication - Angel 4


Network security challenges
& precautions

Examples of safety precautions:

Encryption – process of converting data into a code to prevent


unauthorized access during transmission. Encryption is essential for securing data during
transmission (e.g., HTTPS for web traffic) and for
Authentication - Verifying the identity of a user or device before data at rest (e.g., encrypting files on a computer
granting access to the network. or data on a server).

Firewalls - security devices that monitor and control incoming and NB: Decryption is the process of converting
outgoing network traffic based on predetermined security rules. encrypted/ encoded data back its original
readable format. (the reverse of encryption)

Network communication - Angel 5


Authentication
Password Authentication: Users provide a secret password to access an account or system. It's a common and
straightforward method, but it's vulnerable to password breaches and should be used with strong, unique passwords.

Biometric Authentication: It uses unique biological traits like fingerprints, retina scans, or facial recognition to
verify an individual's identity. It's highly secure and convenient.

Two-Factor Authentication (2FA): Requires two methods of authentication, typically something you know (e.g.,
password) and something you have (e.g., a mobile app generating one-time codes). It adds an extra layer of
security.

Smart Card Authentication: Users insert a smart card, often with a microchip, into a reader for access. It's
common in secure environments like corporate offices.
TAN ("Transaction Authentication Number.“) It's a one-time, time-sensitive code used in online banking and other
secure transactions to authenticate and verify the identity of the user conducting the transaction.

Network communication - Angel 6


How devices communicate in a
network

1 2 3 4 5
Creation Addressing Routing Switching Error detection
Data is divided into Addressed with Packets traverse Packets are Protocols include
packets at the sender destination addresses through various routers individually routed mechanisms to detect
device based on destination from source to and correct errors in
address destination packet transmission

Network Communication - Angel 7


Should Internet be policed?
(Arguments in favor)
Arguments in Favor of Internet Policing:

Cybersecurity and Crime Prevention: Policing the internet can help combat cybercrime,
including hacking, identity theft, fraud, and distribution of malware.
Protecting Vulnerable Populations: Internet policing can help protect vulnerable individuals,
such as children, cyberbullying, and exposure to harmful content.
Preventing Hate Speech and Extremism: Policing can be used to monitor and address hate
speech, extremism, and the spread of harmful ideologies, which can contribute to real-world
violence and radicalization.
Intellectual Property Rights: Internet policing can help protect intellectual property rights by
combating piracy and copyright infringement.
National Security: Governments may argue that internet policing is necessary to protect
national security, detect and prevent terrorism, and monitor potential threats.
PRESENTATION TITLE 8
Should Internet be policed?
(Arguments against)
Arguments against Internet Policing:

Freedom of Speech and Expression: Overzealous internet policing can stifle free speech and
expression, limiting the open exchange of ideas and opinions. It may lead to censorship and the
suppression of dissenting voices.
Privacy Concerns: Internet policing can infringe on individuals' privacy and lead to unwarranted
surveillance. The collection and monitoring of personal data can be invasive and potentially
abused.
Effectiveness and Overreach: Some argue that policing efforts can be ineffective, as criminals
can adapt to new tactics.

PRESENTATION TITLE 9
Data Protection Act
Data Protection Acts are legislative frameworks that establish rules and regulations
for the collection, processing, and protection of personal data.
Lawfulness, Fairness, and Transparency: Data processing should have a legal
They vary
basis, by countryfairly,
be conducted but generally align withshould
and individuals the international
be informeddata protection
about lawsdata
how their
such as General Data protection regulation (GDPR)
will be used.
Purpose Limitation: Data should be collected for specified, explicit, and legitimate
purposes, and not further processed in ways that are incompatible with those
purposes.
Data Minimization: Collect only the data necessary for the stated purpose, and
retain it for no longer than needed.
Accuracy: Ensure that personal data is accurate and up to date.
Storage Limitation: Personal data should not be kept for longer than necessary.
Integrity and Confidentiality: Personal data should be processed in a manner that
ensures its security, including protection against unauthorized access or disclosure.
Accountability: Data controllers are responsible for complying with data protection
principles and must be able to demonstrate compliance.

You might also like