Networks and Communication

KS4 ICT: This worksheet accompanies the presentation Network Security.

Name………………………………………………..……………… Date……………......

A virus is a computer program which copies itself on a machine (without the user’s knowledge) and spreads to other machines.Most viruses will damage the computers they infect.Many viruses are spread via e-mail but some viruses can also be easily transferred between computers in networks, so security is essential.

Anti-virus software searches through the files on a computer and identifies any virus or malicious code.The software brings suspicious items to your attention and allows you to remove them.Anti-virus software needs to be regularly updated to be effective against new viruses.

Setting up firewalls on computer networks has been recommended to Jumbo Burger but it is not sure what they are. What is a ‘Firewall’?

Firewalls are appliance or pieces of software which guard the gateway between a LAN and a WAN to prevent malicious code being transmitted to the network.

Jumbo Burger wants to keep all personal files and data secure and it has been told to setup user accounts.Describe how a user account works.

Setting up user accounts can help ensure each individual’s personal files are kept secure.User accounts usually require logins and passwords to connect to the network.User accounts can be setup via the user accounts section in control panel.User accounts can also have different access levels set.

Wireless networks rely on radio waves so security needs to be tight. Unknown users with wireless network cards are able to log onto any wireless networks which are unsecure. This process is known as piggybacking.

Wired Equivalent Privacy

1.WEP – Wired Equivalent Privacy is a way of securing a wireless network by encrypting data sent via radio waves.

2.WPA – Wi-Fi Protected Access is a more secure Wi-Fi security protocol.

Bluetooth wireless technology allows all sorts of different devices to connect to each other and share data. Bluetooth devices communicate through short range networks known as piconets. These are set up automatically as devices move in and out of range.

Bluetooth devices transfer their data invisibly without wires and this means people can connect to your data without you knowing.It would also be possible to make calls from someone else’s phone without them knowing. Some phones are more vulnerable than others. This is known as bluejacking.When using Bluetooth to connect to your own devices, you can switch to non-discoverable mode when in public. It is wise to only accept data from trusted devices.

Computer worms are self-replicating programs which are specifically designed to target networks. It uses the network to send copies of itself to other devices on the network, and as it is not a virus, it does not need to attach itself to a program.

1

©2010 Boardworks Ltd