Uploaded by Nyah Coles

Lecture Slides Week 5.2 Review (1)

advertisement
ENGR 10005 Introduction to Cybersecurity
Midterm Review
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Introduction to Computer Technology
- An Overview of the Computer Technology
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
What Is a Computer and What Does It Do?
• A computer is a programmable, electronic device that accepts data, performs
operations on that data, and stores the data
• Its instructions, called programs, determine the tasks the computer will perform
• Basic operations (the IPOS cycle)
Input: Entering data into the computer
Processing: Performing operations on
the data
Output: Presenting the results
Storage: Saving data, programs, or
output for future use
Communications: Sending or receiving
data
• FIGURE : The information processing cycle.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Data versus Information
• Data is raw, unorganized facts
• Can be in the form of text, graphics, audio, or video
• Information is data that has been processed into a meaningful form
• Information processing is the conversion of data into information
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computers Then and Now: First and Second
Generation Computers
• First-generation computers (1946-1957)
• Enormous and powered by vacuum tubes
• Used a great deal of electricity and generated a lot of heat
• ENIAC and UNIVAC
• Second-generation computers (1958-1963)
• Used transistors
• Computers were smaller, more powerful, cheaper, more
energy-efficient, and more reliable
• Punch cards and magnetic tape were used for input
• Punch cards and paper were used for output
• Magnetic tape was used for storage
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computers Then and Now: Third and Fourth
Generation Computers
• Third-generation computers (approximately 1964–1970)
• Used integrated circuits (ICs), which consist of transistors and
electronic circuits on a single tiny silicon chip
• Keyboards were used for input; monitors for output
• Hard drives were used for storage
• Fourth-generation computers (approximately 1971–present)
• Use microprocessors, which contain the core processing of an entire
computer on a single chip
• Keyboards and mice are used for input; monitors and printers for
output; hard drives, flash memory media, and optical discs for storage
• Networks and the Internet were developed
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computers Then and Now: Fifth Generation
Computers
• Fifth-generation (now and the future)
• Most commonly defined as being based on artificial intelligence (AI)
• Some aspects like voice and touch input are used today
• Future computers may be different, such as:
• Optical computers
• Tiny computers that utilize nanotechnology
• General-purpose computers built into everyday devices
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Networks and the Internet
• A computer network is a collection of
hardware and other devices that are
connected together
• Users can share hardware, software, and data
• Users can communicate with each other
• Most computers and mobile devices today
connect to a computer network
• Examples include small and large business
networks, school networks, home networks,
public wireless networks, and mobile telephone
networks
• FIGURE: Example of a Computer Network.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
What Are the Internet and the World Wide Web?
• The Internet is the largest/most well-known computer network in the world
• Individuals connect using an Internet service provider (ISP)
• ISPs connect to regional networks, which connect to backbone networks, which connect
to form the Internet
• The World Wide Web (Web) is one resource (a vast collection of Web pages)
available through the Internet
• Web pages typically contain hyperlinks
• Web sites contain Web pages stored on Web servers
• Web pages are viewed using a Web browser (Edge, Internet Explorer (IE), Chrome, Safari,
Firefox, Opera, etc.)
• Web pages offer a wide variety of information and uses
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Accessing a Network or the Internet
• Need a network adapter to connect
• Many networks require a username and password
• Internet connections can be:
• Direct (always-on) connections
• Dial-up connections
• Internet addresses access resources on the Internet
• The most common types of Internet addresses:
• IP addresses and domain names (to identify computers)
• Uniform Resource Locator (URL) (to identifies Web pages)
• E-mail addresses (username) (to identifies person)
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Introduction to Computer Technology
- The System Unit, Processing, and Memory
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Inside a Desktop System Unit
• FIGURE: Inside a desktop system unit.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Processing Speed
• Processing speed can be measured by the CPU’s clock speed
• Rated in megahertz (MHz) or gigahertz (GHz)
• Higher CPU clock speed = more instructions processed per second
• E.g. Core i7 3.2GHz is faster than Core i7 2.66GHz
• Alternate measure of processing speed is the number of instructions a CPU can
process per second
• Megaflops (millions), gigaflops (billions), teraflops (trillions)
• Benchmark tests can be used to evaluate overall processing speed
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Word Size and Cache Memory
• A computer word is the amount of data that a CPU can manipulate at one time
• In the past, CPUs used 32-bit words (referred to as 32-bit processors); today, most CP
Us are 64-bit processors
• Cache memory is a special group of very fast circuitry usually built into the CPU
(internal cache memory)
• More cache memory typically means faster processing
• Cache memory level numbers indicate the order in which the various levels of cache
are accessed by the CPU
• Level 1 is fastest, then Level 2, then Level 3
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Bus Width, Bus Speed, and Bandwidth
• A bus is an electronic path over which data can travel
• Found inside the CPU and on the motherboard
• Bus width is the number of wires in the bus over which data can travel
• A wider bus allows more data to be transferred at one time
• Bus width and bus speed together determine the bus’s bandwidth (the amount of
data that can be transferred via the bus in a given time period)
• The amount of data actual transferred under real-life conditions is called
throughput
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Memory
• Memory refers to chip-based storage, or locations that a computer uses to store
data on a temporary basis
• Volatile memory (content is erased when the device is shut off)
• Non-volatile memory (content is retained when the device is shut off)
• Random access memory (RAM) is the computer’s main memory or system
memory
• Stores essential parts of operating system, programs, and data the computer is
currently using
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Inside a CPU Core
• FIGURE:
Inside a
CPU
core.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Machine Cycle
• FIGURE: A machine cycle. A machine
cycle is typically accomplished in four
steps.
• A machine cycle occurs whenever the
CPU processes a single piece of
microcode
• It consists of four operations:
• Fetch
• Decode
• Execute
• Store
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Introduction to Computer Technology
- Storage
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Storage System Characteristics
• A storage system consists of a storage medium and a storage device
• The storage medium is the hardware where data is stored
• DVD disc, flash memory card, etc.
• The storage device is the hardware into which the storage medium is inserted
• DVD drive, flash memory card reader, etc.
• Can be internal, external, or remote
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Random versus Sequential Access
• Random versus sequential access
• Random access (direct access) allows data to be retrieved from any location on the
storage medium
• Virtually all storage devices use random access
• Sequential access means that retrieval of data can occur only in the order in which it was
physically stored on the storage medium; for example, a magnetic tape drive
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Magnetic Hard Drives (1 of 2)
• A magnetic hard drive or hard
disk drive (HDD) contains
particles on the metal disks
inside the drive that are
magnetized to represent the
data’s 0s and 1s
• FIGURE: Storing data on magnetic disks.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Magnetic Hard Drives (2 of 2)
• One or more metal hard
disks are permanently
sealed inside the drive
along with an access
mechanism and
read/write heads
• FIGURE: Magnetic hard drives.
• Source: Hitachi Global Storage Technologies; Seagate Technology LLC
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Hard Disk Organization
FIGURE: Magnetic hard
disks are organized into
tracks, sectors, clusters,
and cylinders.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Solid-State Drives (SSDs)
• A solid-state drive (SSD)
uses flash memory
technology to store data
• FIGURE: Solid-state drives (SSDs). Contain
only flash memory.
• Uses less power and has no
moving parts
• Much faster than magnetic
hard drives, but more
expensive
• The norm for netbooks,
mobile devices, and other
portable devices
• Source: Transcend Information USA
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Solid-State Hybrid Drives (SSHDs)
• A solid-state hybrid drive (SSHD) or
hybrid drive uses a combination of
magnetic disks and flash memory
chips
• FIGURE: Solid-state hybrid drives (SSHDs). Contain
both magnetic hard disks and flash memory.
• The data that is most directly
associated with performance is stored
in the flash memory
• Nearly as fast as solid-state drives (SS
Ds)
• Slightly more expensive than
magnetic hard disk drives (HDDs)
• Source: Seagate Technology LLC
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Optical Discs
• Optical discs are thin circular plastic
discs
• Are read from and written to using laser
beams
• Are commonly used for software
delivery
• Divided into sectors like magnetic discs
but use a single spiral track (groove)
• Have a relatively large capacity and are
durable
• Used for backup purposes and for
storing and transporting music, photos,
video, etc.
FIGURE: How recorded optical discs work.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Read-Only Optical Discs: CD-ROM, DVD-ROM, and
BD-ROM Discs
• CD-ROM, DVD-ROM, and BD-ROM discs are read-only
• Pits are permanent
• CD-ROM and DVD-ROM discs come prerecorded with software, music, movies, etc.
• BD-ROM discs come prerecorded with movies
• Ultra HD Blu-ray discs can be used for 4K movies
• Additional proprietary read-only discs
• Gaming systems like Wii, Xbox, PlayStation, etc.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Recordable Optical Discs: CD-R, DVD-R, DVD+R,
and BD-R Discs
• CD-R, DVD-R, DVD+R, and BD-R discs can be written to, but cannot be erased and
reused
• Pits are created in the disc when the disc is recorded
• Most discs have a recording layer containing organic light-sensitive dye between disc’s
plastic and reflective layers
• BD-R discs use inorganic material instead
• DVD-R DL and DVD+R DL are dual-layer discs
• BD-R DL discs are dual-layer discs; BD-R XL use 3 or 4 layers
• Used for backing up files, sending large files to others, and storing multimedia files
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Rewritable Optical Discs: CD-RW, DVD-RW, DVD+RW,
and BD-RE Discs
• CD-RW, DVD-RW, DVD+RW, and BD-RE discs can be written to, erased, and
overwritten just like magnetic hard disks
• Uses phase change technology
• Heating and cooling process is used to change the reflectivity of the disc
• The capacities are the same as their read-only and recordable counterparts
• Appropriate for transferring large files from one computer to another or otherwise
temporarily storing data (disc can be reused)
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Flash Memory Storage Systems- Embedded
Flash Memory
• Source: Samsung Electronics Co., Ltd
• Source: SanDisk Corporation
• This tablet contains 64 GB of
embedded flash memory.
• An embedded flash memory chip.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Other Types of Storage Systems
• Remote storage refers to using a storage device that is not connected directly to the
user’s computer
• Network storage: Using a storage device via a local network
• Cloud storage (online storage) is accessed via the Internet
• A smart card is a credit card-sized piece of plastic that contains some computer
circuitry (processor, memory, and storage)
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
RAID
• RAID (redundant arrays of independent discs) is a method of storing data on two or
more hard drives that work together to record redundant copies
• Used to protect critical data on large storage systems
• Helps to increase fault tolerance
• Different levels of RAID:
• RAID 0 = disk striping (spread files over two or more hard drives)
• RAID 1 = disk mirroring (duplicate copy)
• Other levels use a combination or striping and mirror
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Two Primary RAID Techniques
• FIGURE: RAID. Two primary RAID techniques are striping and mirroring.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Introduction to Computer Technology
- Operating Systems
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Operating System
• A computer’s operating system is
a collection of programs that
manage and coordinate the
activities taking place within a
computer
• FIGURE: The intermediary role of the
operating system.
• Acts as an intermediary between
the user and the computer and
between the application programs
and system hardware
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Processing Techniques for Increased Efficiency
• Multitasking refers to the ability of an operating system to have more than one program
(task) open at one time
• CPU rotates between tasks
• Multithreading enables the computer to rotate between multiple threads so that
processing is completed faster and more efficiently
• CPU rotates between threads
• Multiprocessing: Each CPU or core typically works on a different job
• Used with computers and devices that have multi-core CPUs and/or multiple CPUs
• Parallel processing: The CPUs or cores typically work together to complete one job more
quickly
• Used most often with supercomputers
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Sequential versus Simultaneous Processing
• FIGURE: Sequential versus simultaneous processing.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Memory Management
• Memory management optimizes the use of main memory (RAM)
• Helps speed up processing
• Virtual memory is a memory-management technique that uses hard drive space as
additional RAM
• Virtual memory is slower than just using RAM
E.g. 2GB RAM + 2GB virtual memory runs slower than 4GB RAM
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Graphical versus Command Line Interface
• A graphical user interface (GU
I) has icons, buttons, and
other objects that the user
selects to issue commands
• Used by most operating
systems
• FIGURE:
Graphical
user versus
command
line
interfaces.
• A command line interface
requires the user to input
text-based commands using
the keyboard
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Operating Systems for Personal Computers and
Servers
•
•
•
•
•
DOS (Disk Operating System)
Windows
OS X
UNIX
Linux
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Disk Operating System (DOS)
• DOS (Disk Operating System)
• Dominant operating system in the 1980s
and early 1990s
• DOS traditionally used a command-line
interface
• PC-DOS
• Created originally for IBM microcomputers
• MS-DOS
• Created for use with IBM-compatible
computers
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
OS X
• OS X is the proprietary operating system for computers made by Apple
Corporation
• Based on the UNIX operating system
UNIX
• UNIX is an operating system developed in the late 1960s for midrange servers
• More expensive, requires high level of technical knowledge; harder to install, maintain,
and upgrade
• “UNIX” initially referred to the original UNIX operating system, now refers to a group of
similar operating systems based on UNIX
• Many UNIX flavors are not compatible with each other
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Linux
• Linux resembles UNIX but was developed independently by Linus Torvalds in 1991
• Open-source software; has been collaboratively modified by volunteer programmers all
over the world
• Originally used a command line interface, most recent versions use a GUI
• Strong support from mainstream companies, such as IBM, NVIDIA, HP, Dell, and Novell
• Reasons to switch to Linux
• Cost
• More control over the computer
• Faster
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Linux Desktop
• FIGURE: Linux. This
version is Ubuntu, one of
the most widely-used
Linux operating systems.
•
Source: Canonical Ltd.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chrome OS
• Chrome OS is the first cloud operating system
• Is essentially the Chrome Web browser redesigned to run a computer
• Replaces traditional desktop operating systems
• Designed for devices that are used entirely online
• Currently only available preinstalled on Chrome devices
• Chromebooks
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Operating Systems for Mobile Devices
• Mobile versions of personal operating systems (such as Windows or Linux)
• Android and Apple iOS
• BlackBerry OS and BlackBerry PlayBook OS
• Designed for BlackBerry devices
• Additional Linux-based mobile operating systems besides Android and iOS
• Ubuntu
• webOS
• Firefox OS
• Tizen
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Introduction to Computer Technology
- Information Systems and System Development
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
What Is an Information System?
• A system is a collection of elements and
procedures that interact to accomplish a
goal
• An information System (IS) is a system used
to generate the information needed to
support the users in an organization
• A digital ecosystem is the collection of
people, products, services, and business
processes related to a digital element
• Apple digital ecosystem = Apple hardware,
software, and online services
FIGURE: Components of an information system.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Types of Information Systems
• While some information systems are unique, most fall into these six basic categories
• FIGURE: Types of Information Systems.
TYPE OF SYSTEM
DESCRIPTION
Office and user productivity systems
Facilitate communications and enhance productivity in office tasks
Transaction processing systems
Process and record business transactions
Decision making support systems
Provide needed information to decision makers
Integrated enterprise systems
Integrate activities throughout an entire enterprise
Design and manufacturing systems
Help with the design and/or manufacturing of products
Artificial intelligence systems
Perform actions based on characteristics of human intelligence
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Outsourcing
• Outsourcing involves hiring outside vendors to perform specific business tasks
• Offshoring
• Outsourcing to another country
• Nearshoring
• Outsourcing to nearby countries
• Homesourcing (homeshoring)
• Outsourcing to home-based workers
• Crowdsourcing
• Outsourcing a task to a large, undefined group of people via the Web
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Outsourcing: Advantages and Disadvantages
• Advantages
• Lower costs and staffing flexibility
• Socially responsible outsourcing
• Disadvantages
• Communication problems and cultural differences
• Quality control and security
• Captive offshoring
• U.S. companies own facilities in other countries and hire employees in that country
• Gives company more control over employees and procedures than with conventional
outsourcing
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The System Development Life Cycle (SDLC)
• The system development life cycle (SDLC) refers to the development of a system
from the time it is first studied until the time it is updated or replaced
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
SDLC (system)
PDLC (program)
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
System Conversion
• Direct conversion
• Old system is deactivated and new system is
immediately implemented
• Parallel conversion
• Both systems are operated simultaneously until it
is determined that the new system works properly
• Phased conversion
• System is implemented by module
• Pilot conversion
• New system used at just one location within the
organization
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
SDLC summary
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Introduction to Computer Technology
- Program Development and Languages
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Approaches to Program Design and
Development
• Procedural programming separates a program into small modules that are called
by the main program or another module when needed
• Allows each procedure to be performed as many times as needed; multiple copies of
code not needed
• Prior to procedural programming, programs were one large set of instructions (used
GOTO statements)
• Structured programming goes even further, breaking the program into small
modules and prohibiting GOTO
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Examples of Structured Programming
Modules
• FIGURE: Structured programming. A structured program is divided into individual modules; each
module represents a very specific processing task.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Object-Oriented Programming (OOP)
• Object-oriented programming (OOP) consist of a
collection of objects that contain data and methods
to be used with that data
• Class: A group of objects that share some common
properties
• Attributes: Data that describes the object
• Methods: Perform actions on an object
• Can be used with different types of objects
• Instance: An individual object in a class
• Inherits the attributes and methods of the class
• The values of attributes may vary from instance to
instance
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Aspect-Oriented Programming and Adaptive/Agile
Software Development
• Aspect-oriented programming (AOP) separates functions so program components
can be developed and modified individually from one another
• The components can be easily reused
• Adaptive software development adapts programs as they are being written
• Typically iterative and/or incremental development
• Agile software development (ASD) can create software quickly
• Focuses on building small functional program pieces as the project progresses
• Emphasizes teams of people working closely together (programmers, managers, business
experts, customers, and so forth)
• Some mobile developers are using continuous mobile innovation
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Program Development Life Cycle (PDLC)
• Program development (application
software development) is the process
of creating application programs
• Program development life cycle (PDLC)
includes the five phases of program
development
• Typically takes place during the system
acquisition phase of the SDLC
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Program Design Tools
• FIGURE: A flowchart example.
• FIGURE: Wireframes.
• FIGURE: Pseudocode.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Languages Used For Application Development
• A programming language is a set of rules, words, symbols, and codes used to
write computer programs
• Markup languages are most often used to create Web pages and Web
applications
• Use markup tags to identify elements and their properties
• Scripting languages are interpreted instead of compiled, so they are executed one
command at a time and at the time they are run
• Most often used to add dynamic content
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Low-Level Programming Languages
• Low-level languages (earliest programming languages)
• Machine language
• Written at a very low level, just using 1s and 0s
• First generation of programming languages
• They are the only programs without being translated.
• Assembly language
• Uses names and other symbols to replace some of the 1s and 0s in machine language
• Second generation of programming languages
• Programs take longer to write and maintain
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
High-Level Programming Languages
• High-level languages: Closer to natural languages
• Machine-independent
• Most are 3GLs and can be:
• Procedural languages (Fortran, BASIC, COBOL, C, etc.)
• Object-oriented languages (C++, C#, Python, Java, etc.)
• Can be visual programming environments (VPEs), which allow programmers to create
the interface graphically
• Can be visual programming languages which create programs entirely using graphical
elements
• Scratch
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Fourth-Generation Languages (4GLs)
• Fourth-generation languages (4GLs) (very-high-level languages)
• Even closer to natural languages and easier to work with than high-level languages
• Declarative rather than procedural
• You tell the computer what to do and it figures out how to do it
• Can result in less efficient code when compiled
• Commonly used to access databases
• Structured query language (SQL)
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Introduction to Computer Technology
- Databases and Database Management
•
•
•
•
•
What a database is; individuals; and the software
Database concepts and vocabulary
Database classifications and models
How relational databases created and used
How databases are used on the Web
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Components of a Database
• A database typically consists of interrelated tables that contain:
• Fields (columns)
• Single category of data to be stored in a database (name, telephone number, etc.)
• Records (rows)
• Collection of related fields in a database (all the fields for one customer, for example)
• Relational database is most widely used today.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Primary Key
• A primary key is a field that uniquely identifies the records in a table
• Used in a relational database to relate that table to other tables
• FIGURE: Primary key fields. A
primary key field must contain
unique data so it can be used to
identify each record in the
table.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Individuals Involved with a Database Management
System
• Database designers design the database
• also called data architects, database engineers, and database analysts
• Database developers create the database and get it ready for data entry
• sett up database structure and create UI.
• Database programmers write the programs needed to access the database or tie
the database to other programs
• Database administrators are responsible for managing the databases within an
organization
• maintenance, backups, and security
• Users are individuals who enter data, update data, and retrieve information from
the database
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Advantages and Disadvantages of the DBMS
Approach
• Advantages
• Low level of redundancy
• Faster response time
• Lower storage requirements
• Easier to secure
• Increased data accuracy
• Disadvantages
• Increased vulnerability
• Security and backup procedures extremely important
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Entity Relationships
• One to one (1:1) entity relationships
• One entity is related to only one other entity of a particular type
• Not a common type of relationship
• One to many (O:M) entity relationship
• Most common type of relationship
• One entity can be related to more than one other entity
• Many to many (M:M) entity relationships
• One entity can be related to more than one other entity, and those entities can be
related to multiple entities of the same type as the original entity
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Data Integrity
• Data integrity refers to the accuracy of data
• Quality of data entered determines the quality of generated information
• Data validation refers to the process of ensuring that data entered into the database is valid
• Ensures entered data matches the specified data type, format, and allowable value for each field
• Can include record validation rules (checking the value of a field with the value of another field to
ensure validity)
• If data is invalid, an error message is usually displayed
• Can be enforced on a per transaction basis so that the entire transaction will fail if one part is
invalid
• Database locking prevents two individuals from changing the same data at the same time
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Data Security
• Data security protects data against destruction and misuse (both intentional and
accidental)
• Protects against unauthorized access to and unauthorized use of a database and data
loss
• Firewalls, access controls, access privileges, etc.
• Database activity monitoring programs can be used to detect possible intrusions and
risks
• Database encryption should be used
• Strict backup and disaster-recovery procedures can protect against data loss due to
database failure, accidental deletions, disasters, etc.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Data Privacy
• Data privacy addresses protecting the privacy of personal data stored in databases
• Many states require businesses to notify customers when their personal data has been
compromised
• Data breaches can be costly
• One estimate is $200 per breached record
• To protect the privacy of data, businesses should:
• Make sure all data they are collecting and storing is necessary
• Make sure they use adequate security measures
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Client-Server Database Systems
• A client-server database system has both clients (front end) and at least one
database server (back end)
• FIGURE: Client-server
database systems.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
N-Tier Database Systems
• N-tier database systems have at least
one middle component between the
client and the server
• FIGURE: A 2-tier versus an n-tier database
model.
• Additional tiers typically contain
middleware to connect to a database
• Allows program code to be separate
from the database
• Code can be divided into any number
of logical components
• Tiers can be used with different
platforms
• 2-TIER MODEL Has
just two parts: a
client and a server.
• N-TIER MODEL Includes
middleware, which contains
additional programs used to
connect the client and server tiers.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Centralized versus Distributed Database Systems
• Centralized database system
• Database is located on a single
computer, such as a server or
mainframe
• Distributed database system
• Data is physically divided among
several computers connected by a
network, but appears as a single
database to users
• Allows data to be stored at the site
where it is needed most
frequently or that makes data
retrieval most efficient
• Cloud databases
• FIGURE: Centralized versus distributed databases.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Disk-Based versus In-Memory Database Systems
• Disk-based systems
• Data is stored on hard drives
• In-memory databases (IMDBs) (main memory databases (MMDBs))
• All data is stored in main memory
• Use is growing as memory costs fall
• Dramatically faster than disk-based databases
• Good backup procedures are essential because RAM is volatile
• Used both in high-end systems where performance is crucial and in small-footprint,
embedded applications
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Database Models
• Hierarchical databases
• Organizes data in a tree structure
• Typically a one-to-many relationship between data entities
• Network databases
• Allow both one-to-many and many-to-many relationships between data elements
• Most common today: Relational databases, object-oriented database, and
multidimensional database
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Relational Database Model
• With a relational database management system (RDBMS), data is organized in
tables related by common fields
• most widely used database model today
• Designing a relational database
1. Identify the purpose of the database and the activities it will be used for
2. Determine the necessary fields and tables
3. Assign each field to a table
4. Reorganize as needed to minimize redundancy (normalization)
5. Finalize the structure (primary keys, field properties, etc.)
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Retrieving Information from a Relational Database:
Queries
• Most DBMSs come bundled with a set of tools to perform a variety of necessary
tasks, such as creating forms and reports and interfacing with query languages and
programming languages for complex applications.
• A query is a request to see information from a database that matches specific
criteria
• In Access, can create a query object that specifies what fields and records should be
displayed
• Or can write a query using structured query language (SQL)
• Each time a query is run, the data currently meeting the specified conditions is displayed
• Must be designed to extract information as efficiently as possible
• Poorly written queries can impact the overall performance of the system
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Reports
• Reports are a formatted way of looking at a database table or the results of a query
• Can pull data from more than one table (if related)
• Many programs have wizards or other tools to make it easy to create a report
• In Access, reports are often created using the Report Wizard and then modified as
needed using the report’s Design view
• Reports in Microsoft Access are saved as objects in the database file
• When a report is opened, the current data is displayed in the specified format
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Object-Oriented Database Model
• Object-oriented database management system (OODBMS) is a database system in
which multiple types of data are stored as objects along with their related code
• Can contain virtually any type of data (video clip, text with music, etc.) along with the
methods to be used with that data
• Objects can be retrieved using queries (object query language or OQL)
• Objects can be reused in other applications to create new applications quickly
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Hybrid Database Models
• Hybrid databases are a combination of
two or more database types or models
• E.g. object + relational database
technology = object-relational DBMS
• Hybrid XML/relational databases can
store and retrieve both XML data and
relational data
• DB2
• FIGURE: Hybrid XML/
relational databases.
Deborah Morley/Charles S. Parker, Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Example of a Cloud Database in Action
FIGURE: A cloud
database in action.
•Deborah
Source:
L.L. Bean
Morley/Charles
S. Inc.;
Parker,Pryzmat/Shutterstock.com;
Understanding Computers: Today andNatalia
Tomorrow, Comprehensive, 16th Edition. © 2017 Cengage. All Rights
Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Siverina/Shutterstock.com
ENGR 20005
Introduction to
Cybersecurity
Chapter 1 Introduction to Computer Security
Identifying Types of Threats







Malware: MALicious softWARE
Security Breaches
DoS: Denial of Service attacks
Web Attacks
Session Hijacking
Insider Threats
DNS Poisoning
© 2019 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
89
Malware

Software with a malicious purpose
 Virus
 Trojan horse
 Spyware
 Logic Bomb
© 2019 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
90
Malware (cont.)
Virus



One of the two most common types
Usually spreads through e-mail
Uses system resources, causing slowdown or stoppage
© 2019 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
91
Malware (cont.)
Trojan Horse


Named after
the wooden horse
of ancient history
The other most
common kind of
malware
© 2019 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
92
Malware (cont.)
Spyware

The most rapidly growing types of malware


Cookies
Key logger
Logic Bomb

Lays dormant until some logical condition is met, often a specific
date.
© 2019 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
93
Compromising System Security
Intrusions

Attacks that break through
system resources



Hackers
Crackers
Social engineering
example_Youtube Video

War-driving
© 2019 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
94
Denial of Service Attacks


The attacker does not intrude into the system but just
blocks access by authorized users.
Very common attack
Web Attacks


The attacker attempts to breach a web application.
Common attacks of this type are SQL injection and
Cross Site Scripting.
© 2019 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
95
Session Hijacking


This is a complex attack that involves actually
taking over an authenticated session.
Not common
DNS Poisoning

This involves altering DNS records on a DNS server to
redirect client traffic to malicious websites, usually for
identity theft.
© 2019 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
96
Basic Security Terminology
People:

Hackers





White hats - find some flaw in a system and report the flaw to the
vendor of that system
Black hats - cause some harm
Gray hats - breaks the law on occasion
Script kiddies - Inexperienced
Ethical hackers/ Sneakers/ Penetration Testers - Consultants
who are hired to do vulnerability assessments on company systems.
© 2019 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
97
Basic Security Terminology (cont.)
Devices

Firewall


Proxy server


Filters network traffic
Disguises IP address of internal host
Intrusion Detection System

Monitors traffic, looking for attempted attacks
© 2019 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
98
Basic Security Terminology (cont.)
Activities
Authentication
Process of determining if the credentials given by a user or another system (such as
a username and password) are authorized to access the network resource in
question
 Auditing
Process of reviewing logs, records, and procedures to ensure established standards
are being met

© 2019 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
99
Network Security Paradigms

How will you protect your network?






CIA Triangle (confidentiality, integrity, and availability)
Least Privileges
Perimeter security approach
Layered security approach
Proactive versus reactive
Hybrid security method
© 2019 by Pearson Education, Inc.
Chapter 1 Introduction to Computer Security
100
ENGR 20005
Introduction to Cybersecurity
Chapter 2 Networks and the Internet
Network Basics




A network is two or more connected computers
Connected via a Network Interface Card (NIC)
Uses a RJ 45 connector
Allows the host to connect to the network
RJ 45 connector
© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
102
Network Basics (cont.)
The hub is the simplest connection device


Creates a simple network
Sends traffic out all ports (no routing or switching)
The switch is a smart hub


Sends packets only to the intended host
Direct based on the MAC (Media Access Control) address
© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
103
Network Basics (cont.)
A repeater is a device used to boost signal
 Two types of repeaters: amplifiers and signals
The router is more sophisticated
 Limits traffic to the intended network
 Directs traffic based on the IP address
 It is the location for security devices (Access Control lists,
firewalls, etc.)
 Programable
© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
104
Network Basics (cont.)
Wi-Fi
IEEE 802.11 provides guidelines for wireless
networking.
 Wi-Fi Security
WEP (Wired Equivalent Privacy )
WPA (Wi-Fi Protected Access)
WPA2
WPA3

© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
105
Network Basics (cont.)
Port


A connection point
Not physical ports on a computer
SSH:22, DNS: 53, HTTP:80, HTTPS:443

Used by protocols to communicate
© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
106
Internet



To connect to the Internet, you log on to your Internet Service
Provider (ISP).
The ISP connects to another ISP or a backbone provider.
One backbone provider connects to another at a Network
Access Point (NAP).
© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
107
Internet (cont.)
IP (Internet Protocol) Addresses




Necessary to navigate the Internet
It is a unique identifier, like a home address in
mail system
Usually in binary form
Consists of four octets separated by decimals
e.g. 192.168.123.132 (dotted-decimal format)
11000000.10101000.01111011.10000100 (binary address)
192.168.123.0 - network address. 0.0.0.132 - host address
© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
108
Internet (cont.)
The first octet defines the class to which the IP belongs.
Class
IP Range
for the
first byte
Use
A
0-126
Extremely large networks. No Class A network IP
addresses are left. All have been used.
B
128-191
Large corporate and government networks. All Class B IP
addresses have been used.
C
192-223
The most common group of IP addresses. Your ISP
probably has a Class C address.
D
224-247
These are reserved for multicasting (transmitting different
data on the same channel).
E
248-255
Reserved for experimental use.
© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
109
Internet (cont.)
Subnetting
Chop up a network IP address into smaller portions.
192.168.1.x (255 possible addresses)
 A subnet is a portion of a network that shares the
same subnet address.
 Subnet masks describe what subnet the address
belongs to.

Classless Inter Domain Routing (CIDR)
A way to describe the subnet with the IP address.
e.g. 192.168.1.10/24
 Variable-length subnet masking (VLSM)

© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
110
Internet (cont.)
IP V4



32-bit address
4.2 billion IP addresses
Will be replaced by IP V6
IP V6

128-bit address
© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
111
Internet (cont.)
Error Messages





100 series messages are informational.
200s are not seen because they indicate success.
300s are redirects.
400s are client errors.
500s are server errors.
© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
112
Basic Network Utilities

IPConfig can give you information about your system.
© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
113
Basic Network Utilities (cont.)

Ping tells if a system is
connected to the
network.

It also tells how long it
takes for an “echo
request” packet to arrive
at the destination host.
© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
114
Basic Network Utilities (cont.)

Tracert




“Ping deluxe.”
Uses the same syntax as
ping.
Shows every “hop”
between host and
destination address.
Useful tool for technicians
and hackers alike.
© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
115
Basic Network Utilities (cont.)

Netstat


© 2019 Pearson, Inc.
Network status
Shows active connections
Chapter 2 Networks and the Internet
116
Basic Network Utilities (cont.)

NsLookup


Connect to DNS Server
Execute DNS related commands
© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
117
Open Systems Interconnect model (OSI) Model
HTTP, DNS, ...
SSL, SSH, JPEG, ...
API's Sockets, ...
TCP, UDP, ...
IP, IPSec, router, ...
Ethernet, Switch,
Bridge, ...
Fiber, Hubs, Wireless,
Repeaters, ...
Source: linuxhint.com
© 2019 Pearson, Inc.
Chapter 2 Networks and the Internet
118
Project #4
1.
2.
3.
Using web resources, look up the DNS protocol.
Lookup these facts: who invented DNS protocol ? what is its
purpose? How is it used?
Write a brief paper describing what protocol does. Mention a bit
about who invented it, when and how it works.
119
Download