Vous êtes sur la page 1sur 24

Security

A sequence of operations that

Protocols
ensure protection of data. Used
with a communications
protocol, it provides secure
delivery of data between two
parties.
Secure Sockets Layer (SSL)
A low-level encryption scheme used to
secure transmissions in higher level HTTP
format
Private Communications Technology (PCT)
A security protocol that provides secure
transactions over the Web.
Secure Electronic Transmission (SET)
An encryption scheme developed by a
consortium of technology firms and
banks to secure credit card transactions.
Privacy Enhanced Mail (PEM)
Standard for secure e-mail on the
Internet.
Network News
Transfer
Protocol (NNTP)
It is used to connect to Usenet
groups on the Internet.
Usenet Newsreader Software
supports the NNTP protocol
HTTP and HTTP-NG

• HyperText Transfer Protocol (HTTP)


controls Web browsers that access the
Web
• HyperText Transfer Protocol-Next
Generation (HTTP-NG) is an enhanced
version of the HTTP that maintains the
simplicity of it while adding important
features such as security and
authentication.
Hypertext
Markup
Language(HT
ML)
It is the document format used to
produce Web Pages
It defines the page layout, fonts and
graphic elements as well as hypertext
links to other documents on the Web.
Intranet Technologies
Network Topologies
- A physical arrangement of the components of the network

Local Area Networks (LAN)


- Often confined to a single room in a building, or they may link several buildings within a
close geographic area. The computers connected to a LAN are called nodes

Wide Area Networks (WAN)


- When networks exceed the geographic limitations of the LAN
- May be used to link geographically dispersed segments of a single organization or
connect multiple organizations in a trading partner arrangement.
Network Interface Cards (NIC)
- This device provides the electronic circuitry needed for internode communications
- It works with the network control program to send and receive messages, programs
and files across the network
Servers LANs of the same type

- Special-purpose computers
that manage LAN nodes
- Networks are linked via combination of
LANs of
hardware and software devices called different
types
bridges and gateways.
Star Topology

• Describes a network of
computers with a large
central computer (HOST) at
the hub that has direct
connections to a periphery
of smaller computers.
• Often used for a WAN
• Databases may be
distributed or centralized.
Hierarchical
Topology

• One in which a host computer is connected to several levels of


subordinate, smaller computers in a master-slave relationship.
• Applicable to firm with many organizational levels that must be
controlled from a central location.
Ring Topology

• Eliminates the central site


• Peer-to-peer arrangement in
which all nodes are of equal
status thus, responsibility for
managing communications is
distributed among the nodes
• Every node on the ring has a
unique electronic address
which is attached to
messages.
• Popular topology for LANs
Bus Topology

• The most popular LAN topology


• Nodes are all connected to a common cable- the bus
• Each node on the bus has a unique address, and only one
node may transmit at a time.
Client-Server
Topology

• Distributes the processing between


User A’s (client) computer and the
central file server.
• This approach reduces traffic and
allows more efficient use of shared
data.
• Distributing the record-searching
logic of the client’s application to
the server permits other clients to
access different records in the
same file simultaneously.
• It can be applied to any topology.
Purpose
1. Establish a
communications session
between the sender and
the receiver
2. Manage the flow of data
across the network
3. Detect and resolve data
collisions between
competing nodes
4. Detect errors in data that

Network Control line failure or signal


degeneration cause
Two or more signals transmitted
simultaneously will result in a data
collision, which destroys both
messages.

Data
Collision Three basic methods for managing sessions
and controlling data collisions:
-Polling
-Token Passing
-Carrier Sensing
Polling
• Most popular technique for establishing a communication
session in WANs
• One site, the master, polls the other slave sites to
determine if they have data to transmit. If a slave
responds in the affirmative, the master file locks the
network while the data are transmitted.
• 2 Primary Advantages
It is noncontentious; data collisions are prevented.
An organization can set priorities for data communications
across the network.
Involves transmitting a special signal-
the token- around the network from
node to node in a specific sequence.

Token Only the node possessing the token

Passing is allowed to transmit data.

A major advantage is its


deterministic access method, which
avoids data collisions.
Carrier Sensing

Formally labeled as Carrier-


A random access technique that sensed multiple access with
detects collisions when they collision detection (CSMA/CD)
occur and is used with the bus
topology.

The node wishing to transmit


listens to the bus to determine
Ethernet is the best known LAN
if it is in use. If its senses no
software that uses the
transmission in progress (no
CSMA/CD standard.
carrier), the node transmits its
message to the receiving node.
Malicious and
Destructive Programs
Virus
• A program that attaches itself to a
legitimate program to penetrate the
operating system and destroy application
programs, data files, and the operating
system itself.
• Virus programs usually attach themselves to
the following types of files:
1. .exe or .com
2. .ovl (overlay)
3. The boot sector of a disk
4. A device driver program
Worm

• A software program that virtually burrows


into the computer’s memory and
replicates itself into areas of idle memory.
• It systematically occupies idle memory
until the memory I exhausted and the
system fails.
Logic Bomb
• A destructive program that some
predetermined event triggers.
• Often a date will be a logic bomb’s
trigger
Back Door
(Trap Door)
• A software program that allows
unauthorized access to a system
without going through the normal
log-on procedure.
• The purpose of the backdoor may be
to provide easy access to perform
program maintenance, or it may be to
perpetrate a fraud or insert a virus
into the system.
Trojan
Horse
• A program whose purpose is
to capture IDs and passwords
from unsuspecting users.
• Designed to mimic the normal
log-on procedures of the
operating system.

Vous aimerez peut-être aussi