Welcome to Network Issues and Communication!
Hello future ICT experts! In the previous chapter, we learned how networks (like LANs and WANs) connect us. But when information travels across these networks, especially the internet, we face important challenges.
This chapter, Section 4.2 of the syllabus, is all about keeping data secure and understanding different ways we can communicate electronically. This is vital knowledge, as it deals directly with your safety and privacy online! Let’s dive in.
1. Security Issues During Data Transfer
When you send an email, bank transfer, or chat message, that data moves across many systems. Keeping it safe requires two key concepts: Privacy and Confidentiality.
What is Privacy and Confidentiality?
- Privacy: This relates to the individual's right to control what information about them is collected and used. (e.g., You decide who gets to know your address.)
- Confidentiality: This means ensuring that data is only accessible to those who are authorised to see it. It is about protecting the data itself. (e.g., Encrypting your bank password so hackers can't read it.)
The Issue: During data transfer, if security measures are weak, external parties (like hackers) can intercept the data, violating both your privacy and confidentiality. This is often called a data breach or interception.
Quick Review: Data Security Focus
The core security issue is protecting the privacy (the right) and confidentiality (the practice) of data while it moves across networks. We use authentication and anti-malware to achieve this.
2. Protecting Access: Passwords and Other Authentication
The first line of defence against unauthorised access is always authentication—proving you are who you say you are.
2.1 Passwords: Your Digital Key
Passwords are the most common authentication method, but they are only useful if they are strong and protected.
Strong Passwords vs. Weak Passwords
A strong password is difficult for a computer program (or a hacker) to guess. A weak password is easy to break, often through trial-and-error attacks called brute force or dictionary attacks.
- Weak Passwords: Short (under 8 characters), uses common words (like 'password' or '123456'), includes personal information (like a pet's name).
- Strong Passwords: Long (12+ characters is best!), mixes upper-case and lower-case letters, includes numbers, and uses special characters (e.g., !@#$%^).
Analogy: Think of a weak password as a flimsy wooden door, easily kicked in. A strong password is a massive steel vault door with multiple complex locks.
Avoiding Password Interception
Even strong passwords need protection:
- Use up-to-date anti-spyware: Spyware is malicious software that watches your activity, often trying to record keystrokes (a technique called key logging) to steal your password as you type it. Good anti-spyware prevents this.
- Regularly changing passwords: If a password is compromised without your knowledge, changing it regularly limits the time a hacker can use it.
2.2 Other Authentication Methods
To increase security, systems often use methods beyond simple passwords:
Biometric Methods
These use unique physical characteristics to verify identity.
- Examples: Fingerprint recognition, iris/retina scanning, face recognition, or voice recognition.
- Advantage: Very difficult to replicate or steal.
Physical and Electronic Tokens
- Physical Tokens: Small hardware devices that generate a unique, time-sensitive code used alongside a password (often used in two-factor authentication).
- Electronic Tokens: A code sent to a trusted device, like an SMS code sent to your phone.
Smart Cards and Magnetic Stripes
- Smart Cards: Cards containing an embedded microchip that stores data securely and performs authentication tasks (like a Chip and PIN bank card).
- Magnetic Stripes: The older technology used on the back of bank/ID cards, storing limited data which is read by swiping.
Zero Login
A concept where users authenticate using external information or continuous behaviour tracking, without needing to manually input a password every time. For example, using face recognition or location data to confirm identity automatically.
Key Takeaway on Authentication
Use long, complex passwords and anti-spyware. Authentication methods like biometrics, tokens, and smart cards provide layers of security beyond traditional passwords.
3. Anti-Malware Software
Malware (Malicious Software) is designed to cause harm to your computer or steal data. Anti-malware software is crucial for network security.
3.1 Types and Purpose
- Anti-virus Software: Specifically designed to detect, prevent, and remove computer viruses.
- Anti-malware Software: A broader term that includes anti-virus, anti-spyware, and software designed to tackle other threats like ransomware and worms.
3.2 How Anti-Malware Software Operates
Anti-malware relies on regular updates:
Operation against Viruses:
- It uses a database of known virus signatures (definitions) to scan files.
- If a virus is detected, the software attempts to remove it (delete the infected file) or quarantine it.
Quarantining: This means isolating the infected file in a secure, encrypted area of the computer where it cannot execute or cause harm. Think of it like placing a highly infectious patient in isolation until they can be safely removed or treated.
Keeping it Up-to-Date: Viruses constantly evolve. Anti-malware software must be constantly updated to ensure its definition database contains the signatures of the newest threats.
3.3 Preventative Scanning Practices
When transferring data, we must be proactive:
- Scanning Storage Media: Always scan external storage media (like USB drives or external hard drives) used to transfer data before accessing any files. This prevents transferring infected files onto your clean system.
- Scanning Downloads: Scan data or software immediately when downloading it from the internet. This ensures that any downloaded installation files are not Trojan horses or infected bundles.
Key Takeaway: Anti-Malware
Anti-malware software must be updated regularly to recognise new threats. Always scan external media and downloads to prevent infection and protect network integrity.
4. Electronic Conferencing
Electronic conferencing allows multiple users in different locations to communicate simultaneously using ICT systems. This is a crucial communication tool, especially in business and education.
4.1 Types of Conferencing
Video-Conferencing
This uses both audio and video to allow participants to see and hear each other in real-time.
- Use: Job interviews, international business meetings, or remote doctor consultations where visual cues are important.
- Characteristic: High bandwidth requirement due to transmitting live video streams.
Audio-Conferencing
This involves only audio communication (voice calls) between multiple parties.
- Use: Large group presentations, simple conference calls where no visual data needs to be shared, or when internet connections are poor (lower bandwidth needs).
Web-Conferencing
This is similar to video conferencing but often takes place within a web browser and focuses on shared digital content (like slides or screen sharing) alongside audio and video.
- Use: Online webinars, live software training sessions, and remote learning lectures.
4.2 Requirements for Electronic Conferencing Setup
To run a successful electronic conference, you need three main components:
1. Hardware Requirements
- Monitor/Display: To view participants or shared screens.
- Microphone: To input your voice (often built into a headset).
- Speakers/Headphones: To hear other participants.
- Webcam (for Video/Web conferencing): To input live video footage.
2. Software Requirements
- Conferencing Application: Dedicated software (e.g., Zoom, Teams) or a platform that runs within a browser.
- Operating System: Must be compatible with the conferencing software.
3. Network Connection Requirements
- High Bandwidth: Essential for smooth video and screen sharing. Low bandwidth results in choppy video and delayed audio.
- Reliable Internet Service: A stable connection to prevent frequent disconnections.
4.3 Advantages and Disadvantages of Electronic Conferencing
Electronic conferencing has profoundly changed how we work, offering several pros and cons:
Advantages (Pros)
- Reduced travel time and cost: People don't need to fly or drive long distances for a meeting.
- Increased speed of communication: Decisions can be made instantly across global teams.
- Flexibility: Participants can join from almost anywhere (home, office, café).
- Easy sharing of digital resources: Screens, documents, and links can be shared instantly.
Disadvantages (Cons)
- Requires high bandwidth: Poor internet connection ruins the experience.
- High initial setup cost: Quality cameras, microphones, and dedicated software licenses can be expensive.
- Time zone issues: Scheduling meetings across continents can be difficult.
- Lack of personal interaction: It can be harder to gauge non-verbal cues and build rapport compared to face-to-face meetings.
Key Takeaway: Conferencing
Conferencing types range from simple audio to complex video/web setups. They save time and money but require reliable, high-speed network connections and specific hardware (mic, camera) and software.