* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Presentazione di PowerPoint
Survey
Document related concepts
Transcript
Computer networks Network administrators are here to help you! Open a ticket on http://support.unibz.it 11 Aug 2014 Computer networks 1 Computer networks What is a network Computers External connection Terminals Printers Stand-alone hard disks VoIP telephones Server-client architecture 11 Aug 2014 Computer networks 2 Transfer speed Network areas Local Area Network (LAN, Intranet) Wide Area Network (WAN, Internet) Virtual Private Network (VPN) Speed in “bits per second” (bps) Ethernet 10 Mbps Fast Ethernet 100 Mbps Gigabit Ethernet 1 Gbps Wireless 30-300 Mbps 11 Aug 2014 Computer networks 3 Communication programs Web browser Mail reader Chrome (55% of the market) Mozilla Firefox (25% of the market) Internet Explorer (10% of the market) Safari Outlook, Mozilla Thunderbird, Windows Live Mail Webmail and Microsoft Outlook Web App http://webmail.unibz.it Voice over IP 11 Aug 2014 Costs WhatsApp Computer networks 4 Posta Elettronica Certificata – PEC Standard email No No No No No No guarantee of sender’s e-mail address identity guarantee of sender’s identity guarantee that content has not been altered sent proof dispatched proof read proof PEC to PEC: like a raccomandata con ricevuta di ritorno 11 Aug 2014 Sent proof Dispatched proof (in practice also) sender’s address identity and unaltered content Computer networks 5 Posta Elettronica Certificata – PEC PEC to standard email: like a raccomandata semplice Sent proof Standard email to PEC: like a normal letter Sent and dispatched proves are legal proves Every citizen may have a free PEC address to communicate with public administration 11 Aug 2014 Computer networks 6 Search engines Crawler technique (8 billions web pages!) Google scoring system Search tricks: 11 Aug 2014 Use many keywords Quotations Advanced search Search for images Computer networks 7 Slow connections Names Equipment Effective speed Notes PSTN analogical dial-up telephone line and modem 56 Kbps Telephone is busy during connection 128 Kbps Telephone is busy during full speed connection 100 Kbps Telephone is busy during connection ISDN GPRS 2G EDGE 2.5 G 11 Aug 2014 ISDN telephone line and modem GSM mobile phone modern GSM phone 300 Kbps Computer networks 8 Broadband connections Name Equipment Effective speed Notes ADSL telephone line and modem 500 Kbps in upload 8-20 Mbps download Congestion Internet special contract cable UMTS 3G 3G mobile phone HSDPA LTE LTE mobile phone 4G Wireless wireless card Wi-Fi WiMax 11 Aug 2014 antenna in line of sight and modem some Gbps 5 Mbps in upload 40 Mbps in download Speed depends strongly on environment up to 100 Mbps Depends on coverage and contract Speed depends on wireless generation 30-300 Mbps 40 Mbps Computer networks Speed depends strongly on distance 9 Broadband connections ADSL Congestion “minimum band guaranteed” contract Digital divide 5,400,000 Italians not covered by broadband WiMax 10 Kilometers range “line of sight” problem 11 Aug 2014 Computer networks 10 Law 196/2003 on privacy Data are divided into: personal data sensitive data race and ethnicity, religious / philosophical / political opinions, belonging to religious / philosophical / political / workers organization sensitive data about health and sex justice data (handled as sensitive data) genetic data (need extremely particular procedures) 11 Aug 2014 Computer networks 11 Law 196/2003 on privacy To personal users who do not communicate data security requirements still apply Requirements 11 Aug 2014 authentication with login + password or alternatives permission training or instructions backup every week all data security programs updated every 12 months (6 if sensitive) sensitive data must be encrypted or unidentifiable Computer networks 12 Encryption Scrambling technique to make text unreadable Public key for encrypting Private key for decrypting 128 bits to be sure 11 Aug 2014 Computer networks 13 Encryption for information exchange 11 Aug 2014 message 1 encrypt G#4hg! decrypt message 1 message 2 encrypt f@çd*s decrypt message 2 message 3 encrypt È^£(iw, decrypt message 3 message 1 encrypt G#4hg! decrypt Trb:-ò°§ message 2 encrypt f@çd*s decrypt Dr4^\|ò9 message 3 encrypt decrypt %$&/òL È^£(iw, Computer networks 14 Encryption for data storage secret data secret data 11 Aug 2014 encrypt encrypt D(£ò§* +]dH decrypt secret data D(£ò§* +]dH decrypt %£)(“84 jhgds?ì Computer networks 15 Digital signature Law 82/2005 Private key for encrypting Public key for decrypting Keys given by certification authorities Combination with PEC Keys expiration Temporal mark 11 Aug 2014 Computer networks 16 Digital signature document document encrypt G#4$h &à?-2y decrypt document document 2?=zx:-ki false document encrypt Y&”:ò[ fgj?’^d decrypt 2?=zx:-ki 2?=zx:-ki 11 Aug 2014 Computer networks 17 Comparison with handwritten signature Who can sign Digital signature Handwritten signature Needs keys from certification authority and proper tools Everybody instantly Who can verify Everybody (with proper tools) Handwriting analysts Verification reliability Sure for some years Subjective in dubious cases, no time limit Temporal duration Some years (can be renewed) Until other reliable signatures are available Mass signatures Some seconds for all documents (with proper tools) Some seconds per document Objective if temporal mark Based on other subjective elements (paper’s and ink’s age) Date reliability 11 Aug 2014 Computer networks 18 Electronic vs digital signature Electronic signature Qualified electronic signature automatic signature through username and password and a certification authority guarantees it Digital signature and uses encryption 11 Aug 2014 Computer networks 19 Passwords 11 Aug 2014 Computer networks 20 Passwords What can be done with your password? 11 Aug 2014 Steal personal data Steal other people’s data Steal money Delete and modify data Steal identity Start illegal activities Computer networks 21 Passwords Most people have the following passwords: password dragon monkey 123456 pussy 696969 12345678 baseball abc123 1234 football 12345 qwerty letmein A standard computer can try 4 billion passwords per second 11 Aug 2014 Computer networks 22 Passwords Law 196/2003 Better also: Avoid personal data in the password Change password every 6 months (3 if sensitive data) Minimum 8 characters Mix letters, strange characters and numbers Do not use words Use different passwords for different purposes Beware of passwords stored in programs Test your password robustness on https://howsecureismypassword.net What to do in case of employee’s absence 11 Aug 2014 Computer networks 23 Alternatives to password Law 196/2003 allows biometric identification methods fingerprints hand palm retina scanning voice identification 11 Aug 2014 Computer networks 24 Extra security Adding physical methods to standard password smartcard token key OTP with display OTP USB phone SMS phone call 11 Aug 2014 Computer networks 25 Viruses What does a virus do? Infect Survive Duplicate Damage Virus infection symptoms 11 Aug 2014 computer is slow to start unwanted and annoying pop-ups many system errors Computer networks 26 Viruses User’s responsible behaviors downloaded files and email attachments CD, DVD, USB pendrives strange websites updated programs updated antivirus beware when installing free programs! Anti-viruses 11 Aug 2014 Checking the whole hard disk Checking suspect files Always running Computer networks 27 Types of viruses Trojan horse Key logger displays advertisement Spyware opens a port on your computer (to let external users in) Adware records your keyboard activity (to get passwords) Back door looks like a good program spies your activity (to get passwords or for spam targeting) Ransomware 11 Aug 2014 demands money to avoid damage or justice problems Computer networks 28 Spam “unsolicited” “unwanted” “bulk” email Advertisement: gambling, pornographic websites, medicines, risky investments, software… Chain letters Frauds Phishing Sender is always counterfeited Do not click on links! Do not answer!!! Where do they get my email address? Antispam and blacklists 11 Aug 2014 Computer networks 29 Phishing 11 Aug 2014 Computer networks 30 Phishing 11 Aug 2014 Computer networks 31 Phishing example 2,000,000 emails sent 5% arrive to existing users: 100,000 5% of users read the email: 5,000 2% of readers believe in the email: 100 $1,200 from each user Gain: $120,000 In 2005 Mr. David Levi gained $360,000 from 160 people using Phishing on eBay website 11 Aug 2014 Computer networks 32 Safe navigating Navigation security Phishing Viruses Intercept your data 11 Aug 2014 Download Save Antivirus Open Avoid visiting and downloading from untrustworthy websites Keep Explorer and Windows up-to-date Secure connection SSL: httpS Computer networks 33 Attacks from outside Denial of Service Firewall zombie computers which internal program which external address what amount of traffic which kind of data Windows Seven Firewall 11 Aug 2014 Computer networks 34 Backup Why backup? 9% 3% Hardware failure 6% Human error 40% Software corruption Viruses 13% Theft Hardware destruction 29% Source: The Cost of Lost Data. The importance of investing in that “ounce of prevention” by David M. Smith 11 Aug 2014 Computer networks 35 Backup Law 196/2003 What to backup? backup every week Your data files emails, contacts, calendar Program configuration files Difficult-to-find stuff Where to backup? 11 Aug 2014 another hard disk online backup systems: Dropbox, GoogleDrive, Box, Amazon RAID techniques Computer networks 36 RAID – Redundant Array of Independent Disks JBOD – Just a Bunch Of Disks RAID 0 2 disks but space as for 1, safe vs crash, 24h service Most common solution RAID 10 2 disks, fast RAID 1 2 disks 4 disks but space as for 2, fast, safe vs crash , 24h service None of these techniques is safe versus viruses or human errors! 11 Aug 2014 Computer networks 37 JBOD 11 Aug 2014 Computer networks 38 RAID 1 11 Aug 2014 Computer networks 39 RAID 0 11 Aug 2014 Computer networks 40 RAID 10 11 Aug 2014 Computer networks 41