Module 4 - Using Networks
Module 4 - Using Networks
The following CompTIA ITF+ domain objectives and examples are covered in
this module:
Page 327
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit Summary
Refer To Domain Objectives/Examples
Unit 4.4 / Using 2.5 Compare and contrast storage types.
Shared Storage Local network storage types (NAS, File server) •
Cloud storage service
6.7 Explain business continuity concepts.
Backup considerations—data [File backups,
Critical data, Database, OS backups], Backup
considerations—location [Stored locally, Cloud
storage, On-site vs. off-site]
Unit 4.5 / Using This unit does not cover specific exam domain
Mobile Devices objectives or content examples.
Page 328
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 1 Networking Concepts
Networking Concepts
Objectives
On completion of this unit, you will be able to:
Page 329
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 1
Network Components
Networks are built from media, appliances, and protocols but they exist to provide services and
resources to users. (Image by Svetlana Kurochkina © [Link].)
Page 330
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Networks in different geographic locations but with shared links are called Networking Concepts
Wide Area Networks (WAN). A WAN is more likely to make use of a service
provider network. Companies that operate national telephone networks are
called telecommunications companies or telcos. Companies that specialize
in providing Internet access are called Internet Service Providers (ISP).
Telcos operate as ISPs themselves but also make parts of their networks
available to smaller ISPs.
Network Media
A network is made by creating communications pathways between the devices
on the network. Network endpoints can be referred to as nodes or hosts.
Communications pathways are implemented using an adapter installed in the
host to transmit and receive signals and network media between the interfaces
to carry the signals. There are two main types of local network connections:
■ Wired data connections use cabling and either electrical signals over
copper wire or light signals over fiber optic to connect nodes. Most local
networks use a wired network standard called Ethernet to implement these
links.
Wide area networks can also use copper or fiber optic cabling and various
types of wireless networking, including point-to-point radio, cellular radio, and
satellite communications.
Networks use multiple protocols. The packet from one protocol can
be wrapped within the packet from another (encapsulation).
Page 331
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 1
TCP/IP
Packet Transmission
The original research underpinning TCP/IP was performed in the late 1960s
and early 1970s by the Advanced Research Projects Agency (ARPA), which
is the research arm of the US Department of Defense (DoD). The DoD
wanted to build a network to connect a number of military sites. The prototype
was a research network called ARPANET, first operational in 1972. This
connected four university sites using a system described as a packet
switching network.
As well as the forwarding function and use of multiple paths, data is divided
into small chunks or packets. Using numerous, small packets means that if
some are lost or damaged during transmission, it is easier to resend just the
small, lost packets than having to re-transmit the entire message.
Page 333
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 1 The four layers are as follows:
Page 334
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Internet Protocol Networking Concepts
The Internet Protocol (IP) is the primary protocol responsible for the
forwarding function we defined above. It provides packet delivery for all higher-
level protocols within the suite. It provides best effort delivery between hosts
on a local network or within an internetwork of an unreliable and
connectionless nature.
IP Packet Structure
At the IP layer, any information received from the transport layer is wrapped in
a datagram. The transport layer datagram is the payload and IP adds a
number of fields in a header to describe the payload and how to deliver it:
Field Explanation
Source IP address Identifies the sender of the datagram by IP
address.
Destination IP Identifies the destination of the datagram
address by IP address.
Protocol Indicates whether the data should be
passed to UDP or TCP at the destination
host.
Checksum Verifies the packet's integrity upon arrival
at the destination.
Time to Live The number of seconds a datagram is
allowed to stay on the network before
being discarded, otherwise packets could
endlessly loop around an internet. A router
will decrease the TTL by at least one
second when it handles the packet, and is
required to decrement the TTL by at least
the time spent in the router.
Once the fields have been added, the IP datagrams are packaged into a
suitable frame format and delivered over the local network segment.
IP Addresses
As you can see from the fields in the datagram, an IP address is used to
logically identify each device (host) on a given network. An IP address is a 32-
bit binary value. To make this value easier to enter in configuration dialogs, it is
expressed as four decimal numbers separated by periods: [Link] for
instance. Each number represents a byte value, that is, an eight-character
binary value, also called an octet, or a decimal value between 0 and 255. This
is referred to as dotted decimal notation.
Page 335
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 1 Recall that you can convert between binary and decimal by setting out the
place value of each binary digit. For example, you can convert 172 as follows:
128 64 32 16 8 4 2 1
1 0 1 0 1 1 0 0
128*1 64*0 32*1 16*0 8*1 4*1 2*0 1*0
128 + 0 + 32 + 0 + 8 + 4 + 0 + 0
= 172
Refer back to Unit 2.1 for the topic on binary and decimal notation.
Page 336
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Packet Delivery and Forwarding Networking Concepts
The Internet Protocol (IP) covers addressing and forwarding at a "logical" level
between networks with distinct IDs (network layer). Actual delivery of
information takes place at the lower physical/data link layer. The IP datagram
is put into a frame. Frames can only be delivered over a local network
segment.
MAC Addresses
Frames use a different addressing method than IP. At the data link layer, each
host is identified by the address of its network interface. This is called a
hardware address or a Media Access Control (MAC) address. The MAC
address is assigned to the network adapter at the factory. It is a 48-bit value
expressed in hex notation. It is often displayed as six groups of two
hexadecimal digits with colon or hyphen separators or no separators at all (for
example, [Link] or 00608c123abc) or as three groups of
four hex digits with period separators (0060.8c12.3abc).
Page 337
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 1 Routing
If the destination IP address is a local one (with the same network ID as the
source), the host uses ARP messaging to discover the local destination host. If
the network IDs are different, the sending host uses ARP messaging to
discover a router on the local segment (its default gateway) and uses that to
forward the packet. The router forwards the packet to its destination (if known),
possibly via intermediate routers.
As we have seen, network addressing uses 48-bit MAC values at the data link
layer and 32-bit IP addresses at the network layer. Computers can process
these numbers easily, but they are very difficult for people to remember or type
correctly.
Page 338
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
The namespace is structured like an inverted tree, starting at the root, and Networking Concepts
working down. Below the root are a set of Top Level Domains (TLD) that define
broad classes of entities (.com versus .gov, for instance) or national
authorities (.uk versus .ca, for instance). Within the TLDs, entities such as
companies, academic institutions, non-profits, governments, or even
individuals can all register individual domains. An organization may also create
sub-domains to represent different parts of a business. Domains and sub-
domains contain resource records. These records contain the host name to IP
address mapping information used to resolve queries.
Page 339
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 1 1) The resolver (client) sends a recursive DNS query to its local DNS server
asking for the IP address of [Link]. The local name server
checks its DNS data corresponding to the requested domain name.
3) The root name server has authority for the root domain and will reply with
the IP address of a name server for the .org top level domain.
An iterative query means that the local name server does not
expect the .com name server to return a record and that it will
accept a referral to another name server. Name servers that are
authoritative for domains will only typically respond to iterative
queries.
6) The local name server now queries the [Link] name server for the IP
address of [Link].
Note how each query brings the local name server closer to the IP address of
[Link].
The URL (or web address) contains the information necessary to identify and
(in most cases) access an item.
Page 340
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Networking Concepts
3) File path—specifies the directory and file name location of the resource, if
required. Each directory is delimited by a forward slash. The file path may
or may not be case-sensitive, depending on how the server is configured. If
no file path is used, the server will return the default (home) page for the
website.
Page 341
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 1 HTTP is usually used to serve HTML web pages, which are plain text files with
coded tags (HyperText Markup Language) describing how the page should
be formatted. A web browser can interpret the tags and display the text and
other resources associated with the page, such as picture or sound files.
Another powerful feature is its ability to provide hyperlinks to other related
documents. HTTP also features forms mechanisms (GET and POST) whereby
a user can submit data from the client to the server.
SSL/TLS
One of the critical problems for the provision of early e-commerce sites was the
lack of security in HTTP. Under HTTP, all data is sent unencrypted and there is
no authentication of client or server. Secure Sockets Layer (SSL) was
developed by Netscape and released as version 3.0 in 1996 to address these
problems. SSL proved very popular with the industry and is still in widespread
use. Transport Layer Security (TLS) was developed from SSL and ratified as
a standard by IETF. TLS is now the version in active development, with 1.2 as
the latest version.
Use the padlock icon displayed next to a secure web address to verify the identity of the certificate
holder.
Page 342
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Electronic Mail (Email) Networking Concepts
Email is a messaging system that can be used to transmit text messages and
binary file attachments encoded using Multipurpose Internet Mail
Extensions (MIME). Email can involve the use of multiple protocols. The
following process illustrates how an email message is sent from a typical
corporate mail gateway, using the Microsoft Exchange mail server, to a
recipient with dial-up Internet access:
2) When the Exchange SMTP server starts to process the queue, it first
contacts a DNS server to resolve the recipient's address (for example,
recipient@[Link]) to an IP address for the
[Link] email server, listed as an MX (Mail Exchanger)
record in DNS.
3) It then uses SMTP to deliver the message to this email server. The delivery
usually requires several "hops," from the mail gateway to the sender's
Internet Service Provider (ISP), then to the recipient's ISP. The hops taken
by a message as it is delivered over the Internet are recorded in the
message header.
Viewing SMTP Internet headers for a mail message. Screenshot used with permission from
Microsoft.
Page 343
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 1 4) The message is put in the message store on the recipient's mail server. To
retrieve it, the recipient uses his or her mail client software to connect with
the mailbox on the server, using the Post Office Protocol v3 (POP3) or
Internet Message Access Protocol (IMAP).
When using POP3, the messages are usually deleted from the server when
they are downloaded, though some clients have the option to leave them on
the server. IMAP supports permanent connections to a server and connecting
multiple clients to the same mailbox simultaneously. It also allows a client to
manage the mailbox on the server, to organize messages in folders and
control when they are deleted for instance, and to create multiple mailboxes.
Configuring Email
To configure an email account, you need the user name, password, and
default email address, plus incoming and outgoing server addresses and
protocol types from the ISP.
Configuring an email account—the incoming server is either POP3 or IMAP while the outgoing
server is SMTP. Screenshot used with permission from Microsoft.
Different mail systems have different requirements for allowed and disallowed
characters in the local part. The local part is supposed to be case-sensitive,
but most mail systems do not treat it as such. An incorrectly addressed email
will be returned with a message notifying that it was undeliverable. Mail may
also be rejected if it is identified as spam or if there is some other problem with
the user mailbox, such as the mailbox being full.
Page 344
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Networking Concepts
1) What is a WAN?
10) Which email protocol(s) are used to download messages from a mail
server?
Page 345
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 2
Module 4 / Unit 2
Connecting to a Network
Objectives
On completion of this unit, you will be able to:
□ Identify the roles of different network devices in providing local and Internet
network connectivity.
Page 346
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Internet Service Types Connecting to a Network
The sort of equipment and networks used at home and in small businesses are
often described as SOHO (Small Office Home Office). A SOHO network is
typically based around a single multifunction device. This type of network
device can perform the following sort of functions:
Typical SOHO Internet router/modems—the antennas visible on the one on the left show that it
can also function as a wireless access point. (Image © [Link].)
There are various ways in which the WAN link can be provisioned.
Page 347
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 2 Digital Subscriber Line (DSL)
Digital Subscriber Line (DSL) is one of the most popular SOHO Internet
service types. DSL works over an ordinary telephone line, providing the line is
of sufficient quality. The DSL modem/router is connected to the telephone line
using a cable with RJ-11 connectors between the WAN port on the router and
the telephone point. Data is transferred over the line using the high frequency
ranges that voice calls don't need to use. The telephone point is fitted with a
microfilter to prevent the data signals interfering with voice calls and vice versa.
Most residential DSL services are asymmetric (ADSL), meaning that the uplink
(up to about 1.4 Mbps) is slower than the downlink (up to about 24 Mbps). The
speeds achievable are heavily depending on the quality of the telephone wiring
and the distance to the local telephone exchange. The maximum supported
distance is about three miles.
Fiber Optic
Faster Internet services can be provisioned using fiber optic networks. Fiber
optic cables perform much better over long distances and are not affected by
noise in the way that electrical signals over copper cable are. Unfortunately,
providing a fiber cable all the way to customer premises, referred to as Fiber
to the Home (FTTH), requires substantial investment by the telecom providers
and is not widely available.
Cable
Where FTTC is offered by providers with origins in the telephone network, a
cable Internet connection is usually provided as part of a Cable Access TV
(CATV) service. These networks are often described as Hybrid Fiber Coax
(HFC) as they combine a fiber optic core network with coax links to customer
premises equipment. Coax is another type of copper cable but manufactured in
a different way to twisted pair.
Network status icons showing (left-to-right) a working connection, a disconnected cable, and a
connection with unknown or incomplete address information. Screenshot used with permission
from Microsoft.
You can test an Internet connection quite simply by trying to browse a website.
While a cabled Internet service will usually offer the best bandwidth, they are
not always available. Wireless services can be used in areas where it is too
difficult or expensive to lay cable.
Microwave Satellite
Satellite systems provide far bigger areas of coverage than can be achieved
using other technologies. The microwave dishes are aligned to orbital satellites
that can either relay signals between sites directly or via another satellite. The
widespread use of satellite television receivers allows for domestic Internet
connectivity services over satellite connections. Satellite services for business
are also expanding, especially in rural areas where DSL or cable services are
less likely to be available.
Cellular Radio
Cellular data connections use radio transmissions but at greater range than
Wi-Fi. Cellular data is more closely associated with Internet access for cell
phones and smartphones than with computers.
That said, a cell phone can share its Internet connection with a
computer (tethering), if the computer has no other means of
Internet access.
There are many different cellular Internet service types, marketed in terms of
"generations" (3G, 4G, and 5G). Support for a particular type is dependent on
the local cell tower. Some of the technologies used include:
Radio Frequency
As noted above, Radio Frequency (RF) is a means of provisioning a wireless
local network using Wi-Fi standard equipment. While this isn't a means of
Internet service provision in itself, it is a means for a client to connect to a
wireless router offering Internet access.
As well as the wireless router in your home network, you could use an open or
public access point to get on the Internet. You have to be careful to secure
the connections you open when doing this and to avoid using public access
points that have been set up for malicious purposes.
Page 351
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 2 The 802.11n standard can use either frequency band and deliver much
improved data rates (nominally up to 600 Mbps). The latest 802.11ac standard
is now widely supported. 802.11ac access points can deliver up to 1.7 Gbps
throughput at the time of writing. 802.11ac works only in the 5 GHz range with
the 2.4 GHz band reserved for legacy standards support (802.11b/g/n).
Most SOHO routers support 802.11g/n or 802.11g/n/ac. This means that you
can have a mix of client devices. For example, you might have a new router
that supports 802.11ac but computers and tablets with wireless adapters that
only support 802.11n. You can use the access point in compatibility mode to
allow these devices to connect.
Look at the SOHO router's setup guide to find out the router's IP address.
Open a web browser and type the router's IP address into the address bar.
This should open a management page for you to log on. Enter the user name
and password listed in the router's setup guide. Most routers will invite you to
complete the configuration using a wizard, which guides you through the
process.
Use the System page to choose a new admin password. The admin password
is used to configure the router. It is vital that this password be kept secret and
secure. You must choose a strong password that cannot be cracked by
password-guessing software. Use a long, memorable phrase of at least 12
characters.
■ SSID (Service Set ID)—a name for the WLAN. This is usually set by default
to the router vendor's name. It is a good idea to change the SSID from the
default to something unique to your network. Remember that the SSID is
easily visible to other wireless devices, so do not use one that identifies
you personally or your address. The SSID can be up to 32 characters.
See Unit 5.3 for more information about ciphers and encryption.
On a SOHO network, you would also generate a Pre-Shared Key (PSK) using
a wireless password. When you type a password into the box, the router
converts it into an encryption key to use with the cipher. You can see the key in
the screenshot above expressed as hex numerals. The same wireless
password must be entered on client devices for them to connect to the WLAN.
Page 354
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Configuring a Wireless Client Connecting to a Network
status icon in the notification area . Select the network name and then click
Connect. If you leave Connect automatically selected, Windows will save the
password and always try to connect to this SSID when it is in range. In the next
panel, enter the wireless password (PSK):
Connecting to a network and entering the network security key (password). Screenshot used with
permission from Microsoft.
When you connect to a new network, you are prompted to set its location. If
the link is configured as Public (selecting No in Windows 10), your computer is
hidden from other computers on the same network and file sharing is disabled.
If it is configured as Private (home or work) by selecting Yes, the computer is
discoverable and file sharing is enabled.
The computer should now be part of the SOHO network and able to connect to
the Internet. To verify, test that you can open a website in the browser.
Page 355
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 2 Speed Limitations (Attenuation and Interference)
A device supporting the Wi-Fi standard should have a maximum indoor range
of up to about 30m (100 feet), though the weaker the signal, the lower the data
transfer rate. The distance between the wireless client (station) and access
point determines the attenuation (or loss of strength) of the signal. Each
station determines an appropriate data rate based on the quality of the signal
using a mechanism called Dynamic Rate Switching/Selection (DRS). If the
signal is strong, the station will select the highest available data rate,
determined by the 802.11 standard. If the signal is weak, the station will reduce
the data rate to try to preserve a more stable connection.
Radio signals pass through solid objects, such as ordinary brick or drywall
walls but can be weakened or blocked by particularly dense or thick material
and metal. Other radio-based devices and nearby Wi-Fi networks can also
cause interference. Other sources of interference include devices as various
as fluorescent lighting, microwave ovens, cordless phones, and (in an
industrial environment) power motors and heavy machinery. Bluetooth uses
the 2.4 GHz frequency range but a different modulation technique, so
interference is possible but not common.
An enterprise network uses the same sort of switch, access point, and router
technologies as a SOHO network. In a SOHO network, these technologies are
likely to be combined within a single multifunction appliance. On an enterprise
network, multiple switch, access point, and router appliances will be used.
Modular wall plate with an RJ-45 patch cord connected. Image by Nikolai Lebedev © [Link].
Page 356
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
The cabling from each port is routed back to a telecommunications room where Connecting to a Network
it is connected to an Ethernet switch. While the switch in a SOHO Internet
router usually provides four ports, a single enterprise switch will support 20
ports or more. Modular enterprise switches can support hundreds of ports.
Furthermore, the switches can be interconnected to create a switched fabric
supporting thousands of ports within the same LAN.
Cisco Catalyst 3650 Series workgroup switch. Image © and Courtesy of Cisco Systems, Inc.
Unauthorized use not permitted.
Cisco Aironet access point. Image © and Courtesy of Cisco Systems, Inc. Unauthorized use not
permitted.
Page 357
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 2 Enterprise Network Routers
While the switches and access points can provide thousands of ports and
network connections, it is inefficient to have that many connections to the
same "logical" network. The ports are divided into groups using a technology
called Virtual LAN (VLAN) and each VLAN is associated with a different
subnet. Communications between different VLANs have to go through a router.
Cisco 1000 Series Advanced Services Router. Image © and Courtesy of Cisco Systems, Inc.
Unauthorized use not permitted
The graphic below illustrates how the network components described above
might be positioned. The whole network is connected to the wider Internet via
a router. The router is also used to divide the network into two subnets (A and
B). Within each subnet, a switch is used to allow nodes to communicate with
one another and, through the router, to the other subnet and the Internet. The
link between each node and the switch is a segment.
High bandwidth backbone segments are used between the router and the
Internet and between the router and the two switches.
Page 358
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Connecting to a Network
4) What is the latest Wi-Fi standard and which frequency band(s) does it use?
6) What is the risk of using a free Wi-Fi network to make an order from an
online shop?
Page 359
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 2
2) If you have a wired connection to the router, make the following checks:
○ The computer is connected to the router via a cable connecting the RJ-
45 ports on the two devices.
○ If you open the web browser then you can view a website such as
[Link].
3) If you have a wireless connection to the router, make the following checks:
○ If the icon shows that connections are available , click it, select your
wireless network name (SSID) and click Connect, then input the
passkey.
○ If you open the web browser then you can view a website such as
[Link].
4) Right-click the network status icon and select Open Network & Internet
Settings.
From here, you can configure Wi-Fi or Ethernet (as appropriate) settings,
and also create and configure Dial-up and VPN connections. You can also
configure your computer as a mobile hotspot.
Page 360
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Connecting to a Network
Network & Internet Settings. Screenshot used with permission from Microsoft.
5) Click the WiFi or Ethernet tab (depending on whether your computer has a
wireless or wired connection).
Network and Sharing Center. Screenshot used with permission from Microsoft.
Page 362
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
7) Under "view your active networks," click the Ethernet link or the SSID Connecting to a Network
(depending on whether your link is wired or wireless). This displays a
Status dialog showing the protocol used by the connection and the link
speed
8) Click the Details button. This shows the configuration of the link, including
the Internet Protocol (IP) address ([Link] in the example below)
and the IP address of the default gateway—your Internet router
([Link]).
Page 363
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 2
Network Connection Details dialog. Screenshot used with permission from Microsoft.
____________________________________________________________
11) Open the web browser then type the IP address of your default gateway
into the address bar.
This should load the configuration page for your Internet router. You could
log on here using the administrative credentials supplied with your router to
change settings or investigate problems.
12) Optionally, shut down your computer if you are not continuing to use it after
this lab.
Page 364
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 3 Secure Web Browsing
Objectives
On completion of this unit, you will be able to:
Page 365
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 3
Safe Browsing Practices
When you use a computer and web browser to access pages and other
resources over the Internet, you must consider the ways you can keep any
information you transmit secure and prevent any malicious software (malware)
from infecting your computer. There are a number of safe browsing practices
that you should be aware of.
It is also worth noting that any data you transfer over an Internet
connection is processed and may be stored on the ISP's
computers. When you use an ISP, you are trusting them not to
snoop on your unencrypted Internet traffic.
When using a public workstation, you should always be alert to the possibility
that it could be infected with malware. Clear the browser cache before shutting
down or logging off, and make sure you do not allow passwords to be cached.
Malware Threats
The web browser is one of the most well-exploited vectors for infecting a
system with malware or stealing information. Malware is malicious software
threats and tools designed to vandalize or compromise computer systems.
Malware can be categorized in a number of ways:
Page 366
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
■ Viruses and worms—malware principally designed to spread to other PCs. Secure Web Browsing
SubSeven RAT management console—the attacker could use this interface to snoop or exploit the
infected host. Image courtesy (CCAS4.0 International) J.SA13D034 from Wikimedia Comm ons.
The lines between useful utilities, adware, and spyware are not
completely clear-cut, but if something is there that the user (or IT
department) did not explicitly sanction, then it’s best to get rid of it.
Another symptom is redirection. This is where the user tries to open one page
but gets sent to another. This may imitate the target page. Redirection attacks
often target Internet search engines. In adware, redirection is just a blunt
means of driving traffic through a site, but spyware may exploit it to capture
authentication details.
Page 368
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Secure Web Browsing
All of these technologies pose some degree of risk as they can be used for
malicious purposes. When a web page needs to use active content and it is
either not permitted to by current security settings or because the required
plug-in is not installed, the browser displays a warning. Click the bar to install
the component or change security settings.
Page 369
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 3
Installing an add-on—the yellow information bar will tell you if the publisher is trusted (has a valid
digital certificate) and prompts you whether to install the add-on. Screenshot used with permission
from Microsoft.
Flash, Silverlight, and client-side Java have fallen out of favor with
web developers. Most modern sites use scripting for interactive
content.
Disabling scripting in the Firefox browser requires the advanced options configuration interface
and cannot be configured on a site-by-site basis.
Page 370
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Deactivating client-side scripting tends to break most of the websites published Secure Web Browsing
on the Internet because they depend very heavily on the functionality that
scripting allows. In theory, enabling scripting should not be significantly risky.
Modern browsers "sandbox" the scripts running on a page or browser tab so
that they cannot change anything on other tabs or on the computer (at least,
not without explicit authorization from the user). Scripting can be disabled in
some browsers by configuring settings, but others, Microsoft's new Edge
browser for instance, do not allow scripts to be disabled.
It is also possible to install a script blocker add-on. This provides more control
over which websites are allowed to run scripts.
You could use a script blocker extension such as NoScript ([Link]) to manage active content
instead. Make sure the extension is maintained by a reputable developer!
Managing Add-ons
While scripting is usually left enabled, all browsers provide tools for managing
add-ons. Add-ons come in several different types:
You can view installed add-ons and choose to remove or enable/disable them
using the browser settings button or menu.
Page 371
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 3
The interface will also provide an option for browsing and installing add-ons,
via the browser's store or portal, using the Get Add-ons link in the screenshot
above. You can read reviews of the add-on and determine whether it will be
useful and trustworthy. All extensions and plug-ins should be digitally signed
by the developer to indicate that the code is as-published. You should be
extremely wary of installing unsigned add-ons.
As well as protecting against risks from malware and malicious add-ons, you
also need to consider how the way your browser stores data and interacts with
websites protects, or doesn't protect, your personal information.
Cookies
A cookie is a plain text file created by a website when you visit it. The purpose
of cookies is to store session information so that the website can be
personalized for you. For example, cookies may record information you type
into forms, preferences you choose for the way the site works, and so on. They
may also be used to display targeted advertising to you or collect information
(metadata) about the browser you are using, your IP address, the links you
click, how often you visit a site, and so on. An IP address can often be tied
quite closely to a geographic location.
■ The site may record more information about you than you are aware, and
information in the cookies may be shared with other sites. Sites should
generally publish a privacy policy describing what information is collected
and how it is used.
■ Spyware and adware may make use of cookies to track what sites you visit
and display targeted adverts.
■ Cookies should normally expire (self-delete) after a given date, but some
try to set a date in the very distant future.
Do not type passwords into unsecure sites (any site not using the
HTTPS protocol). If you must use a password with an unsecure
site, do not reuse that password in any other context. While sharing
passwords between sites is not recommended generally, sharing a
password between encrypted and unencrypted sites is doubly
risky.
Pop-up Windows
A pop-up is a "sub-window" that appears over the main window. Pop-ups can
be implemented using scripts or add-ons. A pop-up can be opened
automatically by a script running on the page or in response to clicking a link. A
different kind of overlay pop-up can be implemented using Cascading Style
Sheets (CSS), which is HTML's extended formatting language. These don't
open a new window but place some content in a layer above the main content
so that you cannot view it without waiting for a timer to end or clicking a close
icon.
Most of the time pop-ups are designed to be helpful to the user. For example,
a form might use a pop-up window to explain what you are supposed to enter
in a particular field without having to navigate away from the form and lose the
information you have already entered.
Page 373
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 3
Example of a pop-up window—this one is trying to direct the user to the appropriate site home
page.
Pop-ups are also used for advertising however. For example, a site may have
some content you want to read and pop an advertising window over the top of
it, so that you cannot read the content without first looking at the advert and
closing it, or as the advertiser hopes, perhaps reading it, buying the product,
then returning to the article. They are also used by subscription-based sites to
prompt you to sign in with your account before you can view the content.
Page 374
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Secure Web Browsing
You can also choose to prevent sites from creating pop-up windows and
configure exceptions for this rule. Note that this will not block all types of
overlay pop-ups or advertising. If you want to have closer control over
advertising on a site you need to install a suitable browser extension.
Page 375
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 3 Disabling AutoFill and Clearing Browser Cache
Another privacy issue is that the browser can be set to store information typed
into forms, including passwords, and retains a history of browsed pages. Any
user using a publicly accessible computer should be trained to check these
settings and to clear the browser cache before logging off. This is done from
the browser's settings dialog or configuration page.
Private mode does allow the creation of cookies but only ones that
are directly connected to the URL you are visiting. It also deletes
the cookies when you close the page. Third-party cookies are not
accepted.
Private mode does not stop the browser from sending some
information to the website. You cannot avoid the website
discovering your IP address for instance. For fully "anonymous"
browsing, you have to use some sort of Virtual Private Network
(VPN) or proxy.
Page 376
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Digital Certificates and Anti-phishing Secure Web Browsing
Having a certificate is not in itself any proof of identity. The browser and server
rely upon a third-party—the Certificate Authority (CA)—to vouch for the
server's identity. This framework is called Public Key Infrastructure (PKI).
■ If the certificate is valid and trusted, a padlock icon is shown. Click the icon
to view information about the certificate and the Certificate Authority
guaranteeing it.
Browsing a secure site: 1) Check the domain name as highlighted in the address bar; 2) Only
enter confidential data into a site using a trusted certificate; 3) Click the padlock to view
information about the certificate holder and the CA that issued it and optionally to view the
certificate itself.
■ If the certificate is highly trusted, the address bar is colored green. High
assurance certificates make the website owner go through a (even) more
rigorous identity validation procedure.
Enabling a Firewall
Types of Firewall
On a TCP/IP network, each host is identified by an IP address, while each
application protocol (HTTP, FTP, SMTP, and so on) is identified by a port
number. Packet filters on a firewall can be applied to IP addresses and port
numbers.
Checking the status of Windows Defender Firewall. Screenshot used with permission from
Microsoft.
Page 379
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 3 To configure the firewall, open Windows Defender Security Center and then
click the Firewall & network protection node. Use the links to configure the
settings. For example, to allow an app through the firewall, click Allow an app
through the firewall.
You can also access Windows Defender Firewall settings by using the Control
Panel Windows Defender Firewall applet.
Checking the status of Windows Defender Firewall. Screenshot used with permission from
Microsoft.
To turn off the firewall, which is only advisable if you are using an alternative
host firewall software product, in Settings, click the active network and then
click the On button to turn off the firewall. In Control Panel, click the Turn
Windows Defender Firewall on or off link. You can then configure the
required settings, as shown below.
Configuring the firewall state for links to private and public networks. Screenshot used with
permission from Microsoft.
The Allow an app or feature link lets you configure applications that are
allowed to accept incoming Internet connections.
Page 380
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Secure Web Browsing
Allowed Programs configuration dialog of the Windows Firewall. Screenshot used with permission
from Microsoft.
Some proxy servers work transparently so that clients use them without any
extra configuration of the client application. Other proxies require that client
software, such as the browser, be configured with the IP address and port of the
proxy server. This information would be provided by the network administrator.
Configuring Firefox to use a proxy by entering its IP address and port number. Any requests will
be passed to the proxy for processing rather than trying to contact a web server directly.
Page 381
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 3
1) If you use an open network, what email configuration setting should you
ensure is enabled?
3) You want to use a website that hosts training modules in a custom media
format. What type of add-on would you need to install to play this media?
4) What type of file might a website use to track whether you have visited it
before?
6) You are using a computer in an Internet cafe. What should you do at the
end of the session?
7) What identifies a website as using the secure HTTPS protocol with a valid
certificate?
Page 382
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Secure Web Browsing
3) Click the Security tab. Check that the settings for the Internet zone are
Medium-High.
4) Click the Privacy tab then click the Advanced button. Note that the default
policy is to accept all kinds of cookies.
5) Click Cancel. Note the check box for the "Pop-up Blocker." Click the
Settings button next to it.
This dialog allows you to specify sites that are allowed to show pop-ups,
regardless of the default policy.
6) Click Close.
7) Click the Content tab then the Settings button next to AutoComplete.
The checked boxes represent data that Internet Explorer is caching. If you
are using a public computer, you should make sure all these boxes are
unchecked.
10) This takes you to a secure page—look for the protocol (HTTPS not HTTP)
and the padlock icon. Click the icon to view the CA (the company that
issued the certificate) and confirmation that the certificate matches the web
address shown in the bar.
Page 383
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 3
Notice that this secure site is highlighted in green; this means that the
certificate has undergone "extended validation" by the CA. Compare the
certificate details with those of Amazon.
12) Press CTRL+SHIFT+H and note the record of the sites you have visited.
Select the Safety button then click Delete Browsing History.
13) Note the different options—delete whatever cached data you want or click
Cancel if you want to keep it for now.
15) Open a couple of sites in InPrivate mode then close both browsers.
16) Open Internet Explorer and check the browser history—the sites you just
visited will not be listed.
17) Start the Edge browser then click the More Actions ellipse icon and
select Settings.
18) Under "Clear browsing data," click the Choose what to clear button.
19) Note the different types of browsing data that can be deleted then click the
Back chevron.
20) Click View advanced settings and scroll through the list of options.
Edge does not support ActiveX at all, so there is no option to configure it.
You can choose to enable Flash or not. JavaScript is always supported and
can only be disabled using an advanced Windows configuration tool
(Group Policy). There are also options for managing cookies and whether
passwords are cached.
Page 384
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Exercise 2 / Installing a Plug-in Secure Web Browsing
One of the most widely used plug-ins is Flash Player, published by Adobe.
2) Open [Link] in the Edge browser. Click the Reviews > Laptops link.
4) Click the More Actions ellipse icon and select Extensions then
click the Get extensions from the Store link.
5) Take a minute to browse the different plug-ins available. Click the link for
Ghostery. On the product page, click the Get button.
6) When setup is complete, click the Launch button. In Edge, click the Turn it
on button.
The website displays a notification requesting that you allow ads to enable
the website owner to continue to receive revenue for running the site.
8) Click Continue without whitelisting. Note that the banner ads are now no
longer present.
10) Optionally, shut down your computer if you are not continuing to use it after
this lab.
Page 385
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 4
Module 4 / Unit 4
Using Shared Storage
Objectives
On completion of this unit, you will be able to:
Page 386
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Local Network Sharing and Storage Using Shared Storage
One of the main uses of a network is to share files. There are a number of
different methods for making shared storage available on a local network.
Direct attached storage—this computer has a local hard drive and optical drive and a USB-
attached hard drive and removable SD memory card. Any of these drives can be shared on the
network. Screenshot used with permission from Microsoft.
When the computer is on a network, any internal or external local drives can be
shared with other computers. When a computer shares an attached hard drive,
or folder on an attached drive, it can be referred to as Direct Attached
Storage. The computer is acting as a file server.
Network Attached Storage (NAS) server appliance—the display shows the device's IP address
while the housings beneath allow the installation of up to six hard disks. There are also two USB
ports on the left. Image © [Link].
■ Share the printer via Windows—an administrator can share any locally
installed printer via its Sharing tab in the Properties dialog. Locally
installed means that Windows communicates with the print device directly
over the relevant port. It does not matter whether the port is wired (USB or
Ethernet) or wireless (Bluetooth or Wi-Fi). The main disadvantage of this
approach is that both the printer and the Windows PC must be switched on
for other devices to be able to access the printer.
Page 388
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Windows File Sharing Using Shared Storage
Using the System applet to view the network name configuration—this PC is called "COMPTIA"
and is joined to the default workgroup. Screenshot used with permission from Microsoft.
In Windows 10, you can also use the Access work or school page from the
Settings app.
Page 389
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 4 File and Printer Sharing
As long as the network location/Windows firewall settings have been
configured to allow it, any file or folder on a Windows computer can be shared
with other computers. To share an object, right-click it and select Give access
to. You can then select the user accounts allowed to access the share and
whether they can modify files in it or not. You can choose to share an object
with the Everyone special account to grant access to all users.
Basic folder sharing in Windows 10—select an account then set the permission level for that
account. Note that an account can be a specific user (like David) or a group of users (like
Everyone). Screenshot used with permission from Microsoft.
When configuring file sharing like this, it is important for users to have
matching user accounts, with the same user name and password, on both the
host and client computer. This can become very complex to manage.
To allow unauthenticated access, you can enable the Guest account via the
User Accounts applet. Alternatively, you can disable password-protected file
sharing by opening the Network and Sharing Center from Control Panel and
clicking Advanced sharing settings. Neither of these options are very secure
however.
Page 390
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using Shared Storage
Windows 10 Advanced sharing settings dialog—you can use this to disable password-protected
sharing or use the public folders to share files with anyone with network access. Screenshot used
with permission from Microsoft.
Browse network resources via the Network object. Screenshot used with permission from
Microsoft.
Opening a computer object shows the shares available. Browse into a share to
view the files and subfolders it contains.
Page 391
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 4
Browsing a network share—note the UNC path selected in the address bar. Screenshot used with
permission from Microsoft.
You can also access a shared folder by entering its UNC (Universal Naming
Convention) in the address bar. A UNC is composed of a double slash (\\)
followed by the server name and then a single slash and the shared folder
name. For example, \\COMPTIA\CERTS is the UNC of a folder named
"CERTS" located on a server named "COMPTIA."
If you access a share often, you can map it as a network drive. To do so, right-
click the share and select Map network drive:
Select a drive letter then click Finish. The network drive will now appear under
the Computer/This PC object in Explorer:
Page 392
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using Shared Storage
The "CERTS" share has been mapped as drive M on the local PC. Screenshot used with
permission from Microsoft.
The sharing and storage options discussed above make resources available to
computers on the same local network. If you want to make resources available
over a wider network, such as the Internet, you likely need to make use of a
hosted storage solution.
Like plain HTTP, FTP has no security mechanisms. All authentication and data
transfers are communicated as plain text. An FTP session can be protected
using encryption protocols.
Page 393
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 4
Cloud Computing
Hosted storage means leasing a web server from a service provider. Hosted
services can also be provided as a "cloud." Cloud computing has lots of
different definitions but generally refers to any sort of computing resource
provided to the customer on a pay-per-use basis. The customer is not
responsible for configuring and provisioning the computing resource within the
cloud.
Among other benefits, the cloud provides rapid elasticity. This means that the
cloud can scale quickly to meet peak demand. For example, a company may
operate a single web server instance for most of the year but provision
additional instances for the busy Christmas period and then release them
again in the New Year. This example also illustrates the principles of on-
demand and pay-per-use; key features of a cloud service (as opposed to a
hosted service). On-demand implies that the customer can initiate service
requests and that the cloud provider can respond to them immediately. This
feature of cloud service is useful for project-based needs, giving the project
members access to the cloud services for the duration of the project, and then
releasing the cloud services back to the provider when the project is finished.
This way, the organization is only paying for the services for the duration of the
project.
Page 394
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
In order to respond quickly to changing customer demands, cloud providers Using Shared Storage
must be able to provision resources quickly. This is achieved through resource
pooling and virtualization. Resource pooling means that the hardware making
up the cloud provider's data center is not dedicated or reserved to a particular
customer account. The layers of virtualization used in the cloud architecture
allow the provider to provision more CPU, memory, disk, or network resource
using management software, rather than (for instance) having to go to the data
center floor, unplug a server, add a memory module, and reboot.
Cloud-based Storage
Cloud-based storage solutions are very popular, both for home and business
use. Vendors such as Apple, Google, and Microsoft (plus many ISPs) offer
users a certain amount of free cloud-based storage. There are also business-
oriented solutions, such as DropBox and Amazon. These services are typically
operated with a browser or smartphone/tablet app. In Windows 10, a cloud
storage client (OneDrive) is built into the OS and can be accessed via File
Explorer.
Microsoft's OneDrive cloud-based storage product. Screenshot used with permission from
Microsoft.
Page 395
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 4
Google G Suite online word processing, spreadsheet, and presentation software that multiple
users can collaborate on over the web.
Page 396
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
P2P networks have often been used to distribute music and video without Using Shared Storage
respecting copyright. There is also the risk of files being infected with malware.
Most companies prevent the use of P2P file sharing software on corporate
networks.
Backups
Whenever you consider a storage solution, you must also consider backup. It
is essential to make a backup of data files. Making a backup of the system
configuration is also important, as reinstalling Windows, software
applications, and reconfiguring custom settings can be very time consuming.
Backup Considerations
You should understand the main principles of backups:
■ Keep the device or media used to store backup data in a secure location.
■ Keep more than one copy of data—if you delete or accidentally change a
file then make a backup, you will not be able to restore the file. You need
multiple backups going back to different points in time to recover from this
type of data error.
■ Make a backup regularly—the frequency depends how often your data files
change, but most people should consider making a backup every week.
Data in an office is typically backed up every day. Make a system backup
whenever you install new software or perform an upgrade.
Page 397
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 4 It is a good idea to use a combination of methods, to cover both on-site and
off-site backups for instance. You could back up often to locally attached
storage or NAS and then copy the backups to a cloud storage solution for off-
site security.
When configuring backups, you need to understand that not all critical data
may be stored in files within a user folder or shared folder. Critical data could
be stored in a settings file outside of the normal data areas or be located within
a database or message store. You also have to consider that critical data
might include confidential, proprietary, and/or personal information. When you
make a copy of such information by making a backup, you need to ensure that
the copy is subject to the same security policies and access controls as the
original.
Database Backups
If the data that you're considering backing up is part of a RDBMS (Relational
Database Management System), such as SQL data, or a messaging system,
such as Exchange, then the data is probably being used all the time. Each
change in the database is referred to as a transaction. Transactions that add,
amend, or retrieve a record might comprise several read/write operations.
These operations are bundled as transaction to ensure that the data records
remain consistent and are not corrupted by partially completed write
operations. Ordinary file copy backup methods are not "transaction-aware" and
so cannot be reliably used to back up a database. Consequently, database
backup requires the use of software dedicated to that purpose.
Page 398
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Replication doesn't protect you from errors such as accidentally deleting a Using Shared Storage
record, however. If the error is accepted as a valid transaction, it will be
propagated amongst all the replicas at the next scheduled replication interval.
You still have to back up the replicated data therefore, so that you can restore
data to a point-in-time. An RDBMS keeps a transaction log. It is critical to
include the transaction log along with the database tables in backup operations
to support rollback of mistaken transactions and recovery from critical
disasters.
You may also want to make read-only copies of the database. This is
supported through snapshots. A snapshot-based backup might be useful for
keeping historical records of changes to the database or for recovering from
really serious administrative errors that cannot be corrected through
transaction rollbacks.
OS Backups
An OS or system backup makes a copy of the OS and installed applications
so that a workstation or server can be recovered without having to manually
reinstall software and reconfigure settings. Older methods of system backup
could involve lengthy recovery procedures. Typically, the operating system
would have to be reinstalled, then the backup applied to the new OS to recover
the old configuration.
A bare metal backup is one that can be applied directly to a partitioned drive
without the separate step of reinstalling the OS. Bare metal backups typically
work by making an image. The backup software provides a recovery boot disk
which enables the system to connect to the recovery media (an external hard
drive or network drive for instance). The only drawback to this method is that
system images require multi-gigabyte storage media.
Page 399
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 4
Windows Backup
In Windows, there are a number of options for backing up your files, and for
providing for file recovery. These are:
Backup and Restore (Windows 7). Screenshot used with permission from Microsoft.
File History app in Windows 10. Screenshot used with permission from Microsoft.
These are accessible from the Backup tab in the Update & Security category
Page 400
in the Settings app.
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Scheduling and Frequency Using Shared Storage
Having selected the type of backup and what files to include, you then need to
define a schedule on which to run the backup and work out how frequently to
make backups.
You also need to consider whether you need to keep backups to a certain
point in time. If you delete or change a file by accident, then make a backup,
there will be no way to restore the file from the last backup. To do so, you
would have to have made an earlier backup and gone back to that. To keep
multiple backups, you will need multiple drives (ideally) or enough space on a
single drive to store multiple backups.
Page 401
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 4 Restoring Data and Verifying Backups
It is critical to test that backup operations work properly. There can be no
worse feeling in IT than turning to the backups you have been happily making
for the last six months only to discover that a critical data file has never been
included in the job! The following represent some of the main backup
verification and testing issues:
As well as completing test restores, you should review the status report to
confirm that the backup ran successfully.
Choosing folders and files to restore from a particular point in time. Screenshot used with
permission from Microsoft.
Page 402
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using Shared Storage
1) True or false? A hard disk connected to a computer via a USB port could
be described as "Direct Attached Storage."
4) True or false? Any version or edition of Windows can be used to share files
with other users.
5) How could you access a network folder called DATA on a network server
called TOWER1 using the Explorer address bar?
8) You have made a backup of system data using a removable hard disk.
What should you do next?
Page 403
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 4
2) Click Start, click Settings, click System and then select the About node.
Using the Settings app to view system information. Screenshot used with permission from
Microsoft.
____________________________________________________________
4) Open Control Panel, and click System and Security, then click System.
The same computer name is listed.
Page 404
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
5) The computer should be part of a workgroup name "Workgroup." If it is not, Using Shared Storage
complete the following additional steps:
○ Click Close.
6) Right-click the network status icon on the taskbar, and then click Open
Network & Internet settings.
Settings app—network status information and options. Screenshot used with permission from
Microsoft.
Page 405
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 4 7) With the Status node selected, scroll down and click Network and
Sharing Center.
Network and Sharing Center—under "View your active networks," check that the network type is
set to "Private network." Screenshot used with permission from Microsoft.
8) Check that the network type is set to "Private network." If it is not, complete
the following steps:
○ Switch to Settings.
Page 406
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using Shared Storage
Viewing network connection properties via the Settings app. Screenshot used with permission
from Microsoft.
Note that this page gives you another way to view the adapter's
address configuration. Also, you can use the Copy button here to
obtain the information for pasting into a document or an email. This
is useful if you need a user to give you the computer's current
network configuration.
Advanced sharing settings—check that network discovery and file and printer sharing are enabled.
Screenshot used with permission from Microsoft.
10) If necessary, select Turn on network discovery and Turn on file and
printer sharing.
11) Click in the window address bar, type documents, then press Enter.
12) In the Documents folder, right-click the Holidays folder and select Give
access to > Specific people.
13) In the "Network access" dialog, select Everyone from the list box then click
Add.
Page 408
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
14) Leave the permission level set to "Read" and click the Share button. Note Using Shared Storage
the UNC share path. Click Done to finish.
If you have a second computer, complete the following steps. If not, just
use your first PC, but be aware that you will receive different results when
viewing the shared folder and testing the permissions you have.
Also, this lab assumes you are accessing the second PC with a
user account with a different name and password.
○ Open File Explorer and expand the Network object from the navigation
pane. You should see both computer names listed.
○ Double-click the icon for your first computer. You should see a
"Holidays" shared folder.
○ Test that you have only view permissions on this folder by trying to
delete one of the existing files and create a new file.
15) Back on your first PC, in File Explorer, right-click the C:\Holidays folder
and select Share with > Stop sharing.
16) Optionally, shut down your computer if you are not continuing to use it after
this lab.
Page 409
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 5
Module 4 / Unit 5
Using Mobile Devices
Objectives
On completion of this unit, you will be able to:
□ Identify the key features of different types of mobile devices and mobile
operating systems.
Page 410
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using a Mobile Device Using Mobile Devices
A touchscreen allows the user to control the OS directly through the screen (or
with a stylus) rather than using navigation buttons or a scroll wheel.
Gesture-based Interaction
Modern mobile devices use capacitive touchscreens. These capacitive
displays support multitouch, meaning that gestures can be interpreted as
events and responded to by software in a particular way.
■ Pinch and stretch—typically used to zoom out (bring your fingers together)
and zoom in (spread your fingers).
Page 411
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 5 Passcode Locks
If an attacker is able to gain access to a smartphone or tablet, they can obtain
a huge amount of information and the tools with which to launch further
attacks. Quite apart from confidential data files that might be stored on the
device, it is highly likely that the user has cached passwords for services such
as email or remote access networks and websites. In addition to this, access to
contacts and message history (SMS, email, and IM) greatly assists social
engineering attacks.
The screen lock can also be configured with a lockout policy. This means that
if an incorrect passcode is entered, the device locks for a set period. This could
be configured to escalate, so the first incorrect attempt locks the device for 30
seconds while the third locks it for 10 minutes for instance. This deters
attempts to guess the passcode.
Another possibility is for the phone to support a remote wipe or "kill switch."
This means that if the handset is stolen, it can be set to the factory defaults or
cleared of any personal data. Some utilities may also be able to wipe any plug-
in memory cards too. The remote wipe could be triggered by a number of
incorrect passcode attempts or by enterprise management software. Other
features include backing up data from the phone to a server first and displaying
a "Lost/stolen phone—return to XX" message on the handset.
Page 412
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using Mobile Devices
Most corporate messaging systems come with a Remote Wipe feature, allowing mail, calendar,
and contacts information to be deleted from mobile devices.
A thief can (in theory) prevent a remote wipe by ensuring the phone cannot
connect to the network then hacking the phone and disabling the security.
■ All user data on the device is always encrypted, but the key is stored on the
device. This is primarily used as a means of wiping the device. The OS just
needs to delete the key to make the data inaccessible rather than wiping
each storage location.
■ Email data and any apps using the "Data Protection" option are also
encrypted using a key derived from the user's passcode (if this is
configured). This provides security for data in the event that the device is
stolen. Not all user data is encrypted; contacts, SMS messages, and
pictures are not, for example.
Page 413
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 5
Apps are installable programs that extend the functionality of the mobile
device. An app must be written and compiled for a particular mobile operating
system (Apple iOS, Android, or Windows).
Third-party developers can create apps for iOS using Apple's Software
Development Kit (SDK). The SDK can only be installed and run on a computer
using macOS. Apps have to be submitted to and approved by Apple before
they are released to users. Apps are made available for free or can be bought
from the App Store.
Android's app model is more relaxed, with apps available from both Google
Play and third-party sites, such as Amazon's app store. The SDK for Android
apps is available to install on Linux, Windows, and macOS development
machines.
Page 414
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using Mobile Devices
Apps are supposed to run in a sandbox and have only the privileges granted
by the user.
Network Connectivity
There are generally two choices for connecting a smartphone or tablet to the
Internet:
In iOS, cellular network options are configured via Settings > General >
Network. In Android, the options are configured via Settings > Data usage.
Configuring mobile data options in iOS (left) and Android (right). Page 415
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 5 Devices default to using Wi-Fi if it is available. The indicator on the status bar
at the top of the screen shows the data link in use.
Wi-Fi networks can be setup via Settings > Wi-Fi. Choose the SSID and
configure the security level (WEP, WPA, or WPA2 for instance). Enter either
the key (for pre-shared key networks) or your user name and password
(Enterprise networks) and test the connection. If the Wi-Fi network is not
broadcasting its SSID, you can connect to the network by entering the network
name manually.
Use the Wi-Fi screen to switch between networks. To remove a network, select
it, then choose Forget Network.
Airplane Mode
Most airlines prevent flyers from using radio-based devices while onboard a
plane. A device can be put into "airplane mode" to comply with these
restrictions, though some carriers insist that devices must be switched off
completely at times such as takeoff and landing. Airplane mode disables all
wireless features (cellular data, Wi-Fi, GPS, and Bluetooth). On some devices,
some services can selectively be re-enabled while still in airplane mode.
Both iOS and Android provide a notification or toggle shade with some quick
configuration options, including toggles for wireless options.
Wireless options can be quickly switched on or off in iOS and Android using the toggle shades.
Swipe up from the bottom of the screen in iOS or down from the top of the screen in Android.
Page 416
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Email Configuration Using Mobile Devices
One of the most important features of smartphones is the ability to receive and
compose email. The settings are configured on the phone in much the same
way you would set up a mail account on a PC. For example, in iOS, open
Settings > Mail, Contacts, Calendars then click Add Account. In Android,
the configuration is performed via Settings > Accounts.
Choose the mail provider (Exchange, Gmail, and so on) then enter your user
credentials and test the connection. If the mail provider is not listed, you can
enter the server address manually by selecting Other, then inputting the
appropriate server addresses.
■ The outgoing mail server will be a Simple Mail Transfer Protocol (SMTP)
server. The client sends a new message to an SMTP server, which then
handles the process of transferring the message to the recipient's SMTP
server.
The other important option is to enable SSL/TLS. This option should always be
chosen if the server supports a secure link.
Mobile device synchronization refers to copying data back and forth between a
PC and phone or tablet. This method can be used to share email, calendar,
and contacts with a locally installed mail application, though setting up an "over
the air" server or cloud service sync, as described above for email, is generally
preferable. It can also be used to share media files between devices—camera
pictures, downloaded music tracks or videos, and so on.
iOS can synchronize with a PC via the iTunes program. The device must be
connected to the PC via a USB to Apple Lightning cable or a Wi-Fi link.
Android-based phones are primarily set up to sync with Google's Gmail email
and calendar/contact manager services. You can usually view the phone from
Windows (Android phones use standard USB ports) and allow drag and drop
or copy and paste for file transfer with a Windows PC using the Picture
Transfer Protocol (PTP) or Media Transfer Protocol (MTP).
Connecting to an Android smartphone's storage folders via Windows. The inset shows the
connection options available from the Android device (choosing between MTP and PTP).
Page 418
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Remote Backup Using Mobile Devices
While devices can often store gigabytes of data, improved Internet bandwidth
means that it can be feasible to back this data up to a cloud storage provider.
As well as keeping a security copy, this can allow files to be shared and
synchronized between multiple devices. Notable service providers include
Apple's iCloud, Dropbox, Microsoft's OneDrive, and Google's Cloud Platform.
Page 419
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit 5
4) True or false? A smartphone cannot join a Wi-Fi network if the SSID is not
being broadcast.
Page 420
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Summary Using Networks
Using Networks
In this module you investigated the components and protocols used to create
networks and how to configure basic SOHO networks and file sharing.
□ DNS provides a means for people to use plain names or labels to access
resources. DNS maps these labels to IP addresses.
□ Make sure you can match application protocols in the TCP/IP suite to
functions such as web browsing and email.
□ Make sure you know the configuration parameters for setting up a wireless
network, such as standards support, SSID, and encryption type.
Page 421
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 4 / Unit Summary Module 4 / Unit 4 / Using Shared Storage
□ Local file and print sharing can use direct attached storage (file server) or a
Network Attached Storage appliance.
□ Windows network client settings are configured via the System Properties
or Settings. Shared resources can be browsed using the Network object in
File Explorer or the share's UNC. A shared folder can also be mapped as a
drive.
□ Make sure you understand the issues and procedures surrounding backing
up and restoring data files, especially different kinds of backup (data,
database, OS) and the need for off-site storage.
□ Make sure you know how to set up email and data synchronization
services.
Page 422
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM