Class 9 Computer Science Network Safety Of Computer System Notes

Download Class 9 Computer Science Network Safety Of Computer System Notes in PDF format. All Revision notes for Class 9 Computer Science have been designed as per the latest syllabus and updated chapters given in your textbook for Computer Science in Standard 9. Our teachers have designed these concept notes for the benefit of Grade 9 students. You should use these chapter wise notes for revision on daily basis. These study notes can also be used for learning each chapter and its important and difficult topics or revision just before your exams to help you get better scores in upcoming examinations, You can also use Printable notes for Class 9 Computer Science for faster revision of difficult topics and get higher rank. After reading these notes also refer to MCQ questions for Class 9 Computer Science given our website

Network Safety Of Computer System Class 9 Computer Science Revision Notes

Class 9 Computer Science students should refer to the following concepts and notes for Network Safety Of Computer System in standard 9. These exam notes for Grade 9 Computer Science will be very useful for upcoming class tests and examinations and help you to score good marks

Network Safety Of Computer System Notes Class 9 Computer Science

Network Safety and Security
Network Safety

Network safety consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.
Social Networking Ethics

1. Under no circumstances should a post be threatening, harassing, bullying, pornographic, racist, homophobic, or libellous.
2. Practice respectful conversation: No obscenities, personal attacks, name-calling, accusations, defamation, or hate speech.
3. Refrain from posting comments, images, or links not directly related to the content of the forum.
4. Do not post:
• Intentionally misleading or inaccurate information.
• Contact information or identifying details, such as phone numbers or e-mail addresses.
• Information related to advertising, promotion, job recruiting, and campaigning, lobbying, spam, soliciting, or proselytizing.
5. Do not post anything while posing as someone else.
6. Do not infringe on the copyright of others.
Network Security Tools and Services

This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as port scanners, packet injectors, network sniffers, and web assessment tools. Network security tools are used to lock down the network for safety.
LAN Management
A local area network (LAN) is a computer network that interconnects computers in a limited area such defining characteristics of LANs, in contrast to wide area network (WANs), include their smaller geographic area.Token ring and other technology standards have been used in the past, but Ethernet over twisted pair cabling and Wi- Fi are the two most common technologies currently used to build a home, school, computer laboratory, or office building using network media.
MAN Management
A Metropolitan Area Network(MAN) is a computer network in which two or more computers or communicating devices or networks which are geographically separated but in same metropolitan city and are connected to each other are said to be connected on MAN. Metropolitan limits are determined by local municipal corporations; the larger the city, the bigger the MAN, the smaller a metro city, smaller the MAN
WAN Management
A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunication network that links across metropolitan, regional, or national boundaries) using private or public network transports. Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. The Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and individuals.
PAN management
A PAN(Personal Area Network) is a network of Communicating devices (Computer, Phone, MP3/MP4 Player, Camera etc.) in the proximity of an individual. It can cover an area of a few meters radius.When you have to transfer songs from one cell phone to another, you set up a PAN of two phones. When files are transferred from a PC to an MP3 player, a PAN is set up between the two. There can also be multiple devices in PAN. A PAN can be set up using guided media (USB cable) or unguided media (Bluetooth, Infrared).
Voice over Internet Protocol (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Early providers of voice over IP services offered business models and technical solutions that mirrored the architecture of the legacy telephone network. Second-generation providers, such as Skype have built closed networks for private user bases, offering the benefit of free calls and convenience while potentially charging for access to other communication networks.
Cyber Security
Cyber security is information security applied to computers and computer network. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Cyber security also includes protection from unplanned events and natural disasters.
Need: Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber-attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security. So to secure all crucial and confidential data cyber security is required.Objectives Cyber Security’s main purpose is to secure the data and maintain confidentiality of any information stored in computer. It is use to secures the network, as well as protect and oversee operations being done.
Social Networking Practices
To practice safely on Social networking sites few things are important to keep in mind, such as:-
1. Never open random link or any link sends by unknown person.
2. Never trust any messages on your social network website or e-mail.
3. Always keep your personal information secure by private settings.
4. Try to avoid uploading any private information, picture or video.
5. Change use password after an interval.
6. Avoid opening your social network website or email id on unknown system.
New emerging trends
Mobile Computing
Mobile computing is human–computer interaction by which a computer is expected to be transported during normal usage. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications.
Cloud Computing
Cloud computing enables companies to consume compute resources as a utility just like electricity --rather than having to build and maintain computing infrastructures in-house.
Cloud computing promises several attractive benefits for businesses and end users including:
• Self-service provisioning: End users can spin up computing resources for almost any type of workload on-demand.
• Elasticity: Companies can scale up as computing needs increase and then scale down again as demands decrease.
• Pay per use: Computing resources are measured at a granular level, allowing users to pay only for the resources and workloads they use.
Cloud computing services can be private, public or hybrid.

More Study Material