Presentation12level 2 2017
Presentation12level 2 2017
Level II
Keyboard
A combination of a typewriter keyboard and numeric
keypad, a keyboard enables you to enter data into a
computer. Computer keyboards are similar to
electric typewriter keyboards but include additional
keys.
External hardware peripherals
Mouse
A mouse is a device that controls the movement of
the cursor on a screen. A mouse is a small object you
can roll along a flat surface, to help you navigate your
computer. Mice also have a variety of buttons, which
can have different purposes depending on what
program is running. There is usually a left mouse
button (which is used to select an object and perform
an action), right mouse button (which typically
displays a shortcut menu of options) and a scroll
wheel (to help a user scroll through documents).
External hardware peripherals
• Printers
• A printer is a device that allows you to obtain hard
copies of the data you have created on your computer
system. Printers are classified by:
• 1 Their quality
• 2 The speed of printing — pages per minute
• 3 The print/image resolution — measured in dots
per inch (dpi).
• In the case of speed, the faster the better, and in the
case of dpi, the higher the better. There are different
types of printers due to the different methods of
transferring ink to paper. Two common types for the
Hardware Requirement
Inkjet printer — sprays ink onto a sheet of paper, and can
produce high-quality text and photo images.
Scanner
A scanner is a device that captures text or illustrations on paper and
converts the information into a form the computer can use. One of
the most common kinds of scanners is called a flatbed scanner. It has
a glass surface on which you lay paper, magazines, or other
documents that you want to scan. Sometimes scanners can be
manufactured so that they are combined with a printer thus can also
be used as a photocopier and fax machine.
External hardware peripherals
USB flash drive
A small, portable device that plugs into a computer’s USB port and
operates as a portable hard drive. USB flash drives are considered to
be an ideal method to transport data, as they are small enough to be
carried in a pocket and can plug into any computer with a USB drive.
Other names for flash drives are thumb drives, pen drives or USB
drives.
Web cam
Web cams are small cameras that plug into your computer which allow
the user to share a moving image of themselves with others on other
computers through the Internet.
Digital camera
Digital cameras
Digital cameras store images digitally onto a storage device,
either a memory card or a floppy disk, rather than recording
them on film. Once a picture has been taken, it can be
downloaded to a computer system, and then manipulated or
printed
1. Determine any requirements as specified by the hardware
manufacturer
•Warranties and support
1. Warranties
• A warranty is an agreed upon term which covers a computer or
computer component. Generally, most computers have a 1- or 3-
year warranty. This warranty may or may not cover the service,
repair and replacement of computer parts.
Determine any requirements as specified by
the hardware manufacturer
2. Service and support
• It is important to know what kind of support services are
offered by the prospective supplier. There are many questions
to consider such as:
• If a device requires repairs does it have to be sent back to the
supplier (called ‘Return to base’) or will they provide on-site
visits?
• What is the average response time if service is required?
3. System specifications
• It is important to find out the specifications of the computer
system you are planning to connect the peripheral device to.
Many newer types of peripheral devices require a specific
amount of memory, CPU speed, hard disk space, and may only
be compatible with certain operating systems
The advantage of this is that in-line security appliances are
able to stop data packets that have been flagged as potential
threats, whereas out-of-line appliances simply monitor traffic and
send alerts when they detect something malicious.
Network security software, which includes antivirus
applications, can be installed on devices and nodes across the
network to provide added detection and threat remediation.
Cloud services refer to offloading the infrastructure to a cloud
provider.
The set-up is generally similar to how network traffic passes
through in-line hardware appliances, but incoming network traffic is
redirected to the cloud service instead.
The cloud service does the work of scanning and blocking potential
threats for you before the traffic is allowed onto your network.
Different types of network security devices
and tools
Access control. This refers to controlling which users have access to
the network or especially sensitive sections of the network. Using
security policies, you can restrict network access to only recognized
users and devices or grant limited access to noncompliant devices
or guest users.
• Antivirus and anti-malware software. Malware, malicious
software,” is a common form of cyber-attack that comes in many
different shapes and sizes.
Some variations work quickly to delete files or corrupt data,
while others can lie dormant for long periods of time and quietly
allow hackers a back door into your systems.
The best antivirus software will monitor network traffic in
real time for malware, scan activity log files for signs of
suspicious behavior or long-term patterns, and offer threat
Application security
Each device and software product used within your
networking environment offers a potential way in for
hackers. For this reason, it is important that all
programs be kept up-to-date and patched to prevent
cyber attackers from take advantage of weaknesses
to access sensitive data.
Application security refers to the combination of
hardware, software, and best practices you use to
monitor issues and close gaps in your security
coverage
Application security
Behavioral analytics.
Data loss prevention
Distributed denial of service prevention.
Distributed denial of service (DDoS) attacks is
becoming increasingly common.
Email security
Email is an especially important factor to
consider when implementing networking security
tools.
Firewalls. Firewalls are another common element
of a network security model.
Application security
Mobile device security. The vast majority of us
have mobile devices that carry some form of
personal or sensitive data we would like to keep
protected
Network segmentation. Dividing and
sorting network traffic based on certain
classifications streamlines the job for security
support personnel
Application security
Security information and event management.
These security systems (called SIEMs) combine
host-based and network-based intrusion detection
systems that combine real-time network traffic
monitoring with historical data log file scanning to
provide administrators with a comprehensive
picture of all activity across the network.
Web security. Web security software serves a few
purposes
The principles of network security
The principles of network security