2.1.2+Networks

**2.1.2 Networks** **//Social and ethical issues//**

Students must study and evaluate the social and ethical issues involved in the use of networks. These may include:
 *  vulnerability of networks to intrusion


 *  ability to implement different levels of access


 *  implications of network failure, for example, banks, transportation, hospitals, schools


 *  implications of collaboration, groupware and data sharing


 *  threat of compromising data integrity in shared databases


 *  additional threats to privacy on a network compared with stand-alone computers


 *  the need to authenticate information


 *  intellectual property protection on networks, for example, site licences, file access


 *  equality of access for different groups and individuals


 *  ability to monitor users (surveillance); concerns of people regarding monitoring


 *  ability to filter incoming data


 *  ability to control personal, business, military, government operations over a wide geographical area


 *  increased globalization, for example, EFT, EDI, e-commerce


 *  need for interface standards


 *  need for network use policy.

**//Knowledge of technology//**

In order to study and evaluate the social and ethical issues involved in the use of networks the student must have an understanding of related technological concepts. These may include:
 * <span style="color: #010101; font-family: Arial; font-size: 12pt; list-style-type: disc; margin-bottom: 0mm; margin-left: -6pt; margin-right: 0pt; margin-top: 0mm; padding-left: 0pt;"> key terms—LAN, WAN, client, server, Ethernet, access, access permissions, login, password, firewall, sysadmin, UPS, EDI


 * <span style="color: #010101; font-family: Arial; font-size: 12pt; list-style-type: disc; margin-bottom: 0mm; margin-left: -6pt; margin-right: 0pt; margin-top: 0mm; padding-left: 0pt;"> types of intrusion, for example, viruses, hacking, phreaking


 * <span style="color: #010101; font-family: Arial; font-size: 12pt; list-style-type: disc; margin-bottom: 0mm; margin-left: -6pt; margin-right: 0pt; margin-top: 0mm; padding-left: 0pt;"> security measures


 * <span style="color: #010101; font-family: Arial; font-size: 12pt; list-style-type: disc; margin-bottom: 0mm; margin-left: -6pt; margin-right: 0pt; margin-top: 0mm; padding-left: 0pt;"> network types, for example, Intranet, Internet, VPN

Local Area Network
Is a computer network system that connects workstation only covers a small area, such as a school, a home, or and airport. The computers are physically close to each other and usually in the same building. A LAN will have computers and periperhals such as printers and scanners. Each computer or peripheral in the network is called a node. Nodes are connected by hubs or switches. __http://itgsatwab.wikispaces.com/2.1.2+Networks﻿__
 * <span style="color: #010101; font-family: Arial; font-size: 12pt; list-style-type: disc; margin-bottom: 0mm; margin-left: -6pt; margin-right: 0pt; margin-top: 0mm; padding-left: 0pt;"> encryption and SSL


 * <span style="color: #010101; font-family: Arial; font-size: 12pt; list-style-type: disc; margin-bottom: 0mm; margin-left: -6pt; margin-right: 0pt; margin-top: 0mm; padding-left: 0pt;"> e-commerce.