Slide 1: Title
Title: Introduction to Computer Network and Security
Slide 2: Objectives
Introduction to Computer Networks
Types of Networks
Network Components
Network Topologies
Network Protocols
Introduction to Network Security
Common Network Security Threats
Network Security Best Practices
Slide 3: Introduction to Computer Networks
Definition of Computer Networks
Computer Networks are interconnected systems of computers and other devices that enable the
sharing of information, resources, and services. They facilitate communication and data exchange
between multiple users and devices, both locally and globally, allowing for efficient data transfer,
collaboration, and access to remote resources.
The importance of networks in modern computing
The importance of networks in modern computing lies in their pivotal role as the backbone of
information exchange and collaboration. They enable seamless communication, data sharing, and access
to remote resources, making it possible for organizations and individuals to efficiently connect,
collaborate, and access information in a fast-paced digital world. Networks underpin the functionality of
the internet, cloud computing, and various applications, significantly impacting productivity, innovation,
and global connectivity.
Historical development of computer networks
The historical development of computer networks traces the evolution of interconnected
systems, from early experiments like ARPANET to the complex, global infrastructure of the internet
today. It encompasses key milestones, innovations, and standards that have shaped the way information
is shared and accessed, laying the foundation for modern communication and the digital age.
Basic functions of computer networks
The basic functions of computer networks are to enable the sharing of resources and
information among connected devices. These networks facilitate data transfer, communication, and
collaboration, providing services such as file sharing, email communication, internet access, and remote
device access. They play a crucial role in connecting people, devices, and systems, ultimately enhancing
productivity and efficiency in various domains.
Slide 4: Types of Networks
Local Area Network (LAN)
A Local Area Network (LAN) is a network that connects computers and devices within a limited
geographical area, such as a home, office, or campus. LANs enable fast data transfer and resource
sharing among connected devices.
Wide Area Network (WAN)
A Wide Area Network (WAN) is a network that covers a broader geographic area, often
connecting LANs from different locations. WANs use various technologies, including leased lines, satellite
links, and the internet, to connect distant sites and facilitate long-distance data communication.
Metropolitan Area Network (MAN)
A Metropolitan Area Network (MAN) is an intermediate-sized network that spans a city or a
large campus. It provides connectivity between LANs in a specific metropolitan area, offering a balance
between the coverage of WANs and the speed of LANs.
Wireless Networks
Wireless Networks use radio waves to connect devices without physical cables. They are
common in homes and businesses, allowing for mobility and easy access to the internet. Examples
include Wi-Fi and cellular networks.
Internet and Intranet
The Internet is a global network that connects millions of public and private networks
worldwide. It provides access to a vast array of information and services. In contrast, an Intranet is a
private network within an organization, allowing its members to share resources and collaborate while
maintaining internal security and control.
Slide 5: Network Components
Computers/Devices
Computers and devices are the end-points in a network, such as desktop computers, laptops,
smartphones, printers, and servers. They generate, receive, and process data for communication and
resource sharing.
Routers
Routers are network devices that determine the best path for data packets to travel between
different networks. They connect multiple networks and make decisions about the most efficient routes
for data transmission.
Switches
Switches are network devices that operate at the data link layer (Layer 2) of the OSI model. They
forward data within a local network based on MAC addresses. They are commonly used to connect
devices within a LAN and improve network efficiency.
Hubs
Hubs are basic network devices that operate at the physical layer (Layer 1) of the OSI model.
They simply broadcast data received on one port to all other ports. Hubs are less common today, as they
are less efficient than switches.
Modem
Modems, short for 'modulator-demodulator,' convert digital data from a computer into analog
signals for transmission over analog communication lines and vice versa. They enable the connection
between digital devices and analog telephone or cable lines.
Cables and Connectors
Cables and connectors are physical mediums used to transmit data between network devices.
Common types include Ethernet cables (e.g., Cat5e, Cat6), coaxial cables, fiber-optic cables, and
connectors such as RJ45 for Ethernet connections.
Slide 6: Network Topologies
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Hybrid Topology
Slide 7: Network Protocols
What are network protocols?
Network protocols are a set of rules and conventions that govern how data is formatted,
transmitted, received, and processed in a computer network. They play a crucial role in enabling
communication and data exchange between devices and systems within a network.
Examples of common network protocols:
TCP/IP
HTTP/HTTPS
FTP
DNS
SMTP
Slide 8: Introduction to Network Security
What is network security?
Network security refers to the practice of protecting computer networks, infrastructure, and
data from unauthorized access, breaches, or damage. It involves implementing various measures and
safeguards to ensure the confidentiality, integrity, and availability of data and resources within a
network. Network security is essential to safeguard sensitive information and maintain the overall
functionality and trustworthiness of a network.
The importance of network security
The importance of network security cannot be overstated in the digital age. It plays a critical role for
several reasons:
1. Protection of Sensitive Information:
Network security safeguards sensitive data, including personal information, financial records, and
intellectual property, from unauthorized access and theft.
2. Preservation of Reputation:
A security breach can damage an organization's reputation, erode customer trust, and result in financial
losses. Robust network security helps maintain a positive image.
3. Business Continuity:
Network security ensures the availability of critical systems and resources, minimizing downtime due to
cyberattacks, hardware failures, or disasters.
4. Compliance:
Many industries and organizations must comply with legal and regulatory requirements related to data
security. Network security helps meet these obligations.
5. Prevention of Data Loss:
Network security measures can prevent data loss due to accidents or malicious actions, protecting
essential information.
6. Protection from Cyber Threats:
It safeguards against various cyber threats, such as malware, phishing, DDoS attacks, and insider threats.
7. Global Connectivity:
In an interconnected world, network security enables safe global connectivity while minimizing the risks
associated with remote access and communication.
The goals of network security (Confidentiality, Integrity, Availability)
1. Confidentiality:
Confidentiality ensures that sensitive data is accessible only to authorized individuals or systems. It
involves encryption and access controls to protect information from unauthorized access or disclosure.
For example, in healthcare, patient records should only be accessible to healthcare professionals with
the appropriate permissions.
2. Integrity:
Integrity ensures that data remains accurate and unaltered during transmission and storage. It involves
measures to prevent unauthorized modification or tampering with data. Hash functions and digital
signatures are used to verify data integrity. For instance, financial transaction records should not be
altered by unauthorized parties.
3. Availability:
Availability ensures that network resources and services are consistently accessible to authorized users.
This involves measures to prevent disruptions caused by hardware failures, cyberattacks, or natural
disasters. Redundancy, load balancing, and disaster recovery planning are used to maintain availability.
For example, e-commerce websites need to be available for customers 24/7.
Slide 9: Common Network Security Threats
Note: We will discuss this topic in more details.
Malware (Viruses, Worms, Trojans)
Phishing Attacks
DDoS Attacks (Distributed Denial of Service)
Insider Threats
Data Breaches
Social Engineering
Password Attacks
Slide 10: Network Security Best Practices
Password and Access Control
Encryption
Firewall and Intrusion Detection Systems (IDS/IPS)
Regular Software Updates
Employee Training and Awareness
Security Policies and Procedures
Backup and Disaster Recovery