Relational Database Model in DBMS
Computer Networking
Computer Networking is the practice of connecting two or more computers and devices to share data,
resources, and communication.
Types of Networks:
- LAN: Local Area Network (e.g., home or office)
- MAN: Metropolitan Area Network (e.g., city-wide)
- WAN: Wide Area Network (e.g., the Internet)
- PAN: Personal Area Network (e.g., Bluetooth)
Network Devices:
- Router: Connects different networks
- Switch: Connects devices in a LAN
- Modem: Converts digital and analog signals
- Hub: Basic device to connect multiple systems
Internet and Terminology
The Internet is a global network of interconnected computers using standard protocols.
Basic Terms:
- IP Address: Unique ID for devices (e.g., 192.168.1.1)
- URL: Uniform Resource Locator (web address)
- HTTP/HTTPS: Web communication protocols (S = Secure)
- ISP: Internet Service Provider (e.g., Jio, Airtel)
- Bandwidth: Data transfer rate
- Domain Name: Human-friendly website address
- DNS: Translates domain names into IP addresses
- Firewall: Blocks unauthorized access
Cyber Threats
Relational Database Model in DBMS
Cyber Threats are dangers that can harm computers, networks, or data.
Common Threats:
- Malware: Harmful software like viruses, trojans
- Phishing: Fake websites/emails to steal data
- Ransomware: Locks data, demands payment
- Spyware: Secretly records user activities
- DoS: Overloads system to crash it
- Man-in-the-Middle: Intercepts communication
- SQL Injection: Attacks via malicious database queries
Cyber Security
Cyber Security protects systems, networks, and data from attacks.
Goals of Cyber Security:
- Confidentiality: Keep data private
- Integrity: Ensure data is accurate
- Availability: Ensure data is accessible
Types of Security:
- Network Security: Protects network connections
- Application Security: Safeguards software
- Information Security: Protects data
- Cloud Security: Protects cloud systems
- Endpoint Security: Protects individual devices
Best Practices:
- Use strong passwords
- Enable antivirus/firewall
- Regular software updates
Relational Database Model in DBMS
- Avoid suspicious links
- Use two-factor authentication
- Backup data regularly
Summary
- Networking connects devices for communication.
- The Internet is a global network using standard protocols.
- Cyber threats are malicious activities harming data or systems.
- Cyber security protects against these threats with tools and best practices.