Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Revision Lesson

Networks 3

RRR Check

WELCOME

3 types of sorting algorithm

2 types of memory

1 explanation of 'disk thrashing'

Objectives

To understand the threats posed to networks

To revise the 4 layer model

TEACHER

The four layer model

Used to help us understand the relationship between different protocols

LIST

OF RULES

By understanding what each layer does, we can have a good idea as to what an unknown protocol is used for!

KEY

TIMES

Above and below

Protocols in different layers can only interact with protocols in layers above and below their own layer

Makes writing new protocols easier!

ATTENDANCE

NITA

Task

Now answer the questions on LAYERS

The internet

A physical network of millions of connected LANs

The WWW is simply a service delivered VIA the internet - websites!

URLs

Each website has it's own unique address - a URL

This is used to locate an individual site

DNS

When we access a site we really are just asking a server to send us information

DNS means we can use a more human friendly URL rather than remembering the IP of the server

DNS

Lookup a URL on dastabase

If it's in there - send the corresponding IP

If it's not, send it to another DNS

If it's on the next server, update the previous ones!

Task

Now complete the table

The cloud

Virtualised resources delivered via the internet

Storage is common, but so is software!

+ and -

+ Pay for what you need - nothing else

+ Easy to buy more resources

- Who owns the data

-Need internet connection

Task

Task

Fill in information on the cloud!

Virtual networks

Creating more than 1 network from only 1 physical network

VLAN

We take our physical LAN and assign different network addresses - This makes it appear as though different users are working in different physical locations!

Deny access to certain services on the same LAN

Common on guest WiFi systems

VPN

Establishing a secure, encrypted communication with a private network

Common way to 'dial in' to work from home

Task

Complete questions on virtual networks

Attacks

SQL injection involves adding SQL code to login screens to try to force access to a database

Brute force attacks try to compromise the authentication system by systematically trying different username and passwords

Attacks

Data interception involves using hardware and software to intercept messages being sent, copy them, and send them on to their destination

DDOS attacks use 'botnets' to spam servers with so many requests that legitimate users are unable to use the service

Malware - Malicious software

Viruses spread on infected hosts - have to be executed to start infecting- multiply!

Worms - have the capability to infect machines without a host!

Trojan - Appear to be useful pieces of software but infected with malware!

Social Engineering

The idea that people are the weak point in systems

Phishing is a social engineering attack that scams people via email - normally by clicking on a link!

Learn more about creating dynamic, engaging presentations with Prezi