Professional Documents
Culture Documents
communications
Angel
What is network communication?
Network communication refers to the exchange of data and information between devices or
systems through a network.
3. Satellite Communication
4. Point-to-Point Communication
•Insider threats (Risks posed by individuals within an organization who have access to sensitive information and many misuse it.
•Hackers (Individuals or groups who use their technical skills to gain unauthorized access to computer systems, often for malicious purposes.
•Malware and Viruses (Malicious software that infects and compromises computer systems, including viruses that self-replicate and spread.)
•Spyware (Software that secretly gathers information about a user's online activities or personal data without their consent, often for advertising or espionage
purposes)
•Phishing (where attackers impersonate trusted entities to trick individuals into revealing sensitive information, such as passwords or credit card details.)
•Pharming (Manipulating the DNS (Domain Name System) to redirect users to fake websites, often used in conjunction with phishing to steal information or
distribute malware.)
Firewalls - security devices that monitor and control incoming and NB: Decryption is the process of converting
outgoing network traffic based on predetermined security rules. encrypted/ encoded data back its original
readable format. (the reverse of encryption)
Biometric Authentication: It uses unique biological traits like fingerprints, retina scans, or facial recognition to
verify an individual's identity. It's highly secure and convenient.
Two-Factor Authentication (2FA): Requires two methods of authentication, typically something you know (e.g.,
password) and something you have (e.g., a mobile app generating one-time codes). It adds an extra layer of
security.
Smart Card Authentication: Users insert a smart card, often with a microchip, into a reader for access. It's
common in secure environments like corporate offices.
TAN ("Transaction Authentication Number.“) It's a one-time, time-sensitive code used in online banking and other
secure transactions to authenticate and verify the identity of the user conducting the transaction.
1 2 3 4 5
Creation Addressing Routing Switching Error detection
Data is divided into Addressed with Packets traverse Packets are Protocols include
packets at the sender destination addresses through various routers individually routed mechanisms to detect
device based on destination from source to and correct errors in
address destination packet transmission
Cybersecurity and Crime Prevention: Policing the internet can help combat cybercrime,
including hacking, identity theft, fraud, and distribution of malware.
Protecting Vulnerable Populations: Internet policing can help protect vulnerable individuals,
such as children, cyberbullying, and exposure to harmful content.
Preventing Hate Speech and Extremism: Policing can be used to monitor and address hate
speech, extremism, and the spread of harmful ideologies, which can contribute to real-world
violence and radicalization.
Intellectual Property Rights: Internet policing can help protect intellectual property rights by
combating piracy and copyright infringement.
National Security: Governments may argue that internet policing is necessary to protect
national security, detect and prevent terrorism, and monitor potential threats.
PRESENTATION TITLE 8
Should Internet be policed?
(Arguments against)
Arguments against Internet Policing:
Freedom of Speech and Expression: Overzealous internet policing can stifle free speech and
expression, limiting the open exchange of ideas and opinions. It may lead to censorship and the
suppression of dissenting voices.
Privacy Concerns: Internet policing can infringe on individuals' privacy and lead to unwarranted
surveillance. The collection and monitoring of personal data can be invasive and potentially
abused.
Effectiveness and Overreach: Some argue that policing efforts can be ineffective, as criminals
can adapt to new tactics.
PRESENTATION TITLE 9
Data Protection Act
Data Protection Acts are legislative frameworks that establish rules and regulations
for the collection, processing, and protection of personal data.
Lawfulness, Fairness, and Transparency: Data processing should have a legal
They vary
basis, by countryfairly,
be conducted but generally align withshould
and individuals the international
be informeddata protection
about lawsdata
how their
such as General Data protection regulation (GDPR)
will be used.
Purpose Limitation: Data should be collected for specified, explicit, and legitimate
purposes, and not further processed in ways that are incompatible with those
purposes.
Data Minimization: Collect only the data necessary for the stated purpose, and
retain it for no longer than needed.
Accuracy: Ensure that personal data is accurate and up to date.
Storage Limitation: Personal data should not be kept for longer than necessary.
Integrity and Confidentiality: Personal data should be processed in a manner that
ensures its security, including protection against unauthorized access or disclosure.
Accountability: Data controllers are responsible for complying with data protection
principles and must be able to demonstrate compliance.