Understanding Internet Technologies and Security
What is a computer network? In its simplest form, a network consists of two or more connected computers- as we found out earlier in the earlier chapters. Major hardware, software, and transmission components are used in a simple network. The network can and does get more complex when things like network interface cards (NIC), network operating systems NOS), hubs, routers, LAN's, MAN's and WAN's, client server network, and more are added to mix. All of these components help the computers communicate with on another by packet switching.
Ok, still with me? Because it's about to get a little more complicated...
Networks use different types of physical transmission media, including twisted wire, coaxial cable, fiber optics, and media for wireless transmission - infrared, radio, microwave.
So, we have small, medium, and large networks...now the way in which all of these systems communicate is quite complex. The Internet infrastructure breaks it down. As we know, every computer on the Internet is assigned a unique IP address, its 32-bit number represented by four strings of numbers ranging from 0 to 255. Because it would be incredibly difficult for Internet users to remember strings of 12 numbers, the Domain Name System (DNS) converts domain names to IP addresses. Its the English-like name that corresponds to the unique 32-bit numeric IP address for each computer connected to the Internet. Remember ISP's from the beginning of the term? ISP's are an important part of the network as are NSP's, peering, and TCP/IP. These all make up the computers IP address.All these computers "talking" to one another 24/7 raises some security issues. Vulnerable systems could lose data in a blink of an eye if precautionary measures are not taken. Have you ever had a computer crash? Or a computer virus? Malware, spyware? Worm? Trojan horse error? These are example of security breaches. The potential for unauthorized access, abuse, or fraud is not limited to a single location (like paper files in a drawer) but can occur at any access point in the network. Which translates to a lot of access points on a network, like; client, communication lines, corporate servers, corporate servers, etc. The large the network, like the Internet, the more vulnerable it is. It is extremely important to back-up your omputer and data and to have a disaster recovery plan!










