90 likes | 218 Vues
This guide provides a foundational overview of key protocols such as FTP (File Transfer Protocol) and Telnet, focusing on how they facilitate file movement and remote computer sessions. It delves into the significance of Secure Shell for enhanced security and a graphical interface for user convenience. The document addresses security threats like viruses, Trojans, spyware, and hacking, offering remedies and best practices to mitigate risks. Additionally, it highlights computing ethics, emphasizing the responsibilities of users in protecting privacy and intellectual property.
E N D
FTP & Telnet • FTP-File Transfer Protocol • Standard way of moving files over a network. • Varied clients including Secure FTP, Web Browsers, and WS-FTP. • Telnet • Opens a session on a remote computer to perform tasks. • Varied clients including Secure Shell.
SECURE SHELL • Graphical interface for TELNET and FTP. • Uses more secure communication than other utilities. • Allows some functions to be done in Windows style.
EMAIL • Electronic mail. • Varied clients including PINE (in telnet) and Web Browsers.
CLIENT-SERVER • Allows remote user to interact as if local. • Used when bandwidth is low or when resources must be centralized (like software). • Examples include Citrix, Telnet.
Security: Viruses/Trojans • A virus is a piece of software that attaches itself to a legitimate program and gets executed with the program, installing itself in memory and reproducing. • A Trojan is a program meant to distract the user while damage is done to the computer. • Threats: • Data corruption. • System shutdown. • Remedies: • Stick with commercial software purchased on CDs. • Install antivirus software and update the definitions regularly. • Only open e-mail attachments if you already know their content. • Back up your data regularly.
Security: Spyware • Software that performs tasks on your computer, typically without your consent. • Threats: • Unwanted pop-up ads. • Collects personal information. • Computer slows, crashes. • Remedies: • Install anti-spyware software. • Only download from sites you trust. • Research suspect programs with engines, friends.
Security: Hackers • People who look for a computer with a security hole for the purpose of exploiting the hole. This type of person is looking for a thrill, has something to prove or is simply acting with malice. • Threats: • Pick up your personal information. • Use your accounts. • Corrupt your computer with viruses, etc. • Remedies: • Set up a firewall. • Encrypt private data. • Update patches regularly.
Computing Ethics: Norms • Ethical norms extend to computer usage. • Some are minor issues, such as not using reply-all to mass emails, no flaming. • More important issues: consideration of Privacy and respect of Intellectual Property.