Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Computer security wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Distributed firewall wikipedia , lookup
Network tap wikipedia , lookup
Computer network wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Airborne Networking wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Wireless security wikipedia , lookup
Apple Store MISY 3312: Introduction to Telecommunications Fall 2011-2012 Section 201 Members: Heba AL-Owayeed ID: 200900569 Lujayn Tahlawi ID: 200900797 Fatima A. Mohammed ID: 200801340 Farah AL-Shreef ID: 200900901 Team project Outline: • Introduction • Network Transmission Media • Apple store and it's networks ( based on physical scope • Net Work Classification • Basic Hardware Components: • Network security • History of Mac OS • Mac Security Issues: • Conclusion • Recommendation • References Introduction: • Apple corporation : ▫ Consumer electronics, computer software, and personal computers. ▫ Software. ▫ Established in 1st of April 1976 in California, USA ▫ By Steve Jobs, Steve Wozniak and Ronald Wayne. ▫ Nowadays it is the largest publicly traded company in the world by market capitalization. ▫ Has around 375 retail stores around the world plus on-line stores. Con. • Applications. • Jailbreak. The initial screen of JailbreakMe.com • Cydia. Network transmission media • What is transmission media? Transmission media is the pathway or medium that connects the computers and other electronic devices of an organization together where the information is transmitted from one place to another • The transmission media types: 1. guided (wired) 2. unguided (wireless) Con. •Guided Wired twisted pair coaxial cable optical fiber •Unguided Wireless Terrestria l Satellites Wireless LANs Con. AppleTalk: The transmission medium: Twisted pair transmission medium Usage: Telephone system Why? Run several kilometers without any kind of amplification Considered the simplest and the most suitable for different uses Con. Apple Inc. : The transmission medium: A wireless (LAN ) wireless local area network Usage: Send and share data rapidly Why? Flexibility of radio coverage The strength of wireless networks No need for planning unlike wired networks Apple store and it's networks ( based on physical scope) : 1- LAN • Download application • Keep your devices connected to one account 2- virtual private network ( VPN ) • links between nodes that are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. 3- Internet network • Commonly used to access the app store in the first place and to download the applications. Backbone network • There also to allow the devices to exchange information between networks . Overlay network • Virtual computer network that is built on top of another network •Classification definition •Client/Server Architecture •The database application and the database are separated into a client/server architecture -Network topology definition -Topologies may be physical or logical • The study of network topology recognizes eight basic topologies: •Point-to-point •Ring or circular •Bus •Tree •Star •Hybrid •Mesh •Daisy chain meshed networks •-Its consist of •-Bridges •Network interface cards •-Bridges come in three •Repeaters basic types: •Hubs •1- Local bridges •Bridges •2- Remote bridges •Switches •3- Wireless bridges •Routers Network security • History of Mac OS Mac Security Issues 1. Scams and fraud: ▫ Online scams, retail and auction fraud, and identity-theft. 2. User error: ▫ Using poor passwords, downloading risky files. 3. Mobile threats ▫ Theft 4. Online hazards: ▫ Viruses and risky files. Recommendation: • Important tips: 1. Hide files and folders from the prying eyes of other people using your Mac 2. Protect files and folders by using strong passwords. 3. Send e-mail messages and attachments encrypted with a password 4. Switch on Your Firewall 5. Antivirus/Antispyware Software Jailbreak Issue: • Another thing that they can do is to deal and try to attract Jailbreak producers to be in their side by paying fees or giving commissions. References: • Application and Networking Architecture. (n.d.). Oracle Documentation. from http://en.wikipedia.org/wiki/Computer_ • Application and Networking Architecture. (n.d.). Oracle Documentation.from http://en.wikipedia.org/wiki/Classification • Application and Networking Architecture. (n.d.). Oracle Documentation.from http://docs.oracle.com/cd/E11882_01/server.112 • Classification - Wikipedia, the free encyclopedia. (n.d.). Wikipedia, the free encyclopedia. from http://en.wikipedia.org/wiki/Network_topology • Creating I tunes account. (n.d.). Retrieved from http://support.apple.com/kb/ht2534 • Costello, S. (n.d.). What is jailbreaking. Retrieved from http://ipod.about.com/od/iphonesoftwareterms/g/jailbreak-definition.htm • Conroy, D. (2010, October 18). Patent US8041848 - Media processing method and device Google Patents. Google. Retrieved May 5, 2012, from http://www.google.com/patents/US8041848 • Figure 1, Jailbreak. (n.d.). Retrieved from http://www.jailbreak.com/ • Mogull, R. (2010, January 5). Mac security: reality check. Retrieved from http://www.macworld.com/article/1145438/macsecurityreality.html • Protect your mac. (n.d.). Retrieved from http://www.getsafeonline.org/nqcontent.cfm?a_id=1165 • Schramm, M. (2007, June 26). History of the apple store. Retrieved from http://www.tuaw.com/2007/06/26/history-of-the-apple-store/ • Tips to protect your mac . (n.d.). Retrieved from http://www.apimac.com/mac/mac-dataprotection/ • *Note: • The slides were used as references