Teaching Grandpa about the Internet

These days, there are so many different types of operating systems and network devices. I’ll explain what network devices are and how they are used.

  • First there is something called Network Interface Card (or NIC) which is used for physical interface between the computer and cabling. It prepares, sends, and controls the flow of data. It can also receive and translate data into bytes.
  • Next are network repeaters. These regenerate electrical, wireless, or or optical signals. It also amplifies the signal it receives.
  • The network hub connects multiple networks together, and is also used to transfer data. So when one piece of data is sent, multiple copies of that data gets sent to other ports connected to that network. A hub is not very safe or secure.
  • A switch is like a network hub, working at a layer of LAN (Local Area Network). It is smarter than a hub, filtering and forwarding data as it comes through.
  • Modem stands for Modulator + Demodulator. It is a wire that connects you to the internet. It amplifies or deamplifies the signal of data that passes through.
  • Next up is the network router. It is responsible for directing the flow of data from one network to another. These could be private or public.
  • A bridge works a lot like a router. It connects two sub networks as part of the same network.
  • Finally, there is the repeater. It amplifies the signal it receives. Basically re-transmitting it to be at a higher frequency.

All of these devices are what runs the information to your computer. Sometimes, it is not safe. However, there are ways you can stay safe while setting up a network.

  • Implement a formal information security governance.

— You can establish and maintain a framework that provides assurance information. Make sure you can detect incidents, investigate effectively and respond quickly.

  • Stop data loss.

— Control access to the computer. Users can often steal data, so it is good to know who is allowed on the computer. It is a good idea to know who is on the computer and when they are on so you know how you lost data if you ever lose some.

  • Back up data.

— It is important to have your important files backed up so you do not lose them. A lot of companies will often inform you that it is a good idea. Also, it is just common sense. When backing up files make sure you know what you are doing. Don’t accidentally delete the data.

  • Educate and train the users.

— Inform whoever uses the computer how to be safe and what not to do on the computer. Create and maintain strong passwords, recognize a phishing email, avoid dangerous applications, and ensure valuable information is safe and secure.

  • Update software systems.

— There are always software criminals who find their way into the system, so it’s a good idea to always keep up with software updates. Always make sure you are updated with the most recent update.

Sources:

https://www.observeit.com/blog/10-best-practices-cyber-security-2017/

One clap, two clap, three clap, forty?

By clapping more or less, you can signal to us which stories really stand out.