Chapter-The Internet and Its Uses
Chapter-The Internet and Its Uses
PRANESH SIR
Internet: It is a world wide network/Network of networks where millions
of webservers are interconnected.
PRANESH SIR
Hyper Text Transfer Protocol: It is a set of rules used to access data on
the world wide web. It can be used to transfer the data in the form of
plain text, hypertext, audio, video, and so on.
HTTP client initiates a request and waits for a response from the server.
The server process the request and sends back the response to the HTTP
client.
When some form of extra security is used, then this is changed to HTTPs.
‘s’ stands for secure which indicates more secure way i.e. encrypted
communication is performed between client and sever across the internet.
PRANESH SIR
Web browser: It is a communication software which is used to access webpages from the
internet. It send request for a webpage to the webserver. Webserver send the requested
content in HTML form to the web browser. Web browser interpret the code and display the
webpage to us.
PRANESH SIR
Cookies
These are a small files or codes sent by a web server to a web browser. These are
generated each time the user visits the website.
There are two types of cookies-
i) Session Cookies-a cookie that is stored temporarily on a computer; it is deleted when
the browser is closed or the website session ends.
ii) Persistent Cookies- a cookie that is stored on the user’s hard drive and only deleted
when the expiry date is reached or the cookie is deleted by the user
Use of Cookies:
Some servers use it for security reason which trace the activity of the users by cookies.
Online shopping sites used it to track user’s preference and holding items in an online
shopping cart.
Used to store login details, email addresses and invoice details
Track internet habits and user’s website histories or bookmarks.
Targets users with advertising that matches their previous buying or surfing habits
PRANESH SIR
Digital Currency:
Digital currency refers to any means of payment that exists in a purely electronic form. Digital money is not
physically tangible like a dollar or a coin. It is accounted for and transferred using online systems. One well-
known form of digital money is the crypto currency Bitcoin. Cryptocurrency uses cryptography to
track transactions
Comparison between Crypto currency and traditional digital currency:
Traditional digital currencies are regulated by central banks and governments. This
means all transactions and exchange rates are determined by these two bodies.
Cryptocurrency has no state control and all the rules are set by the cryptocurrency
community itself.
Unlike existing digital currencies, cryptocurrency transactions are publicly available and
therefore all transactions can be tracked and the amount of money in the system is
monitored.
The cryptocurrency system works by being within a blockchain network which means it
is much more secure. PRANESH SIR
Block Chain:
Blockchain is a decentralised database. All the transactions of networked members are
stored on this database. Blockchain consists of a number of interconnected computers but
they are not connected to a central server. All transaction data is stored on all computers
in the blockchain network.
Whenever a new transaction takes place, all the networked computers get a copy of the
transaction; therefore it cannot be changed without the consent of all the network
members. This effectively removes the risk of security issues such as hacking.
PRANESH SIR
How Block Chain works:
on a blockchain network, two nodes can exchange data or information (transaction), the
blockchain network will verify the authenticity of the transaction.
Whenever a new transaction takes place, a new block is created:
A new hash value is created each time a new block is produced. This hash value is
unique to each block and includes a timestamp, which identifies when an event
actually takes place.
PRANESH SIR
How Block Chain works:
Then adding the new block into blockchain is done through a process known as Proof-of-work
which makes sure it takes about ten minutes to determine the necessary proof-of-work
for each block before it can be added to the chain.
Block ‘1’ is known as the genesis block since it doesn’t point to any previous block. Now suppose
block ‘2’ is changed in some way. Any changes to the data within block ‘2’ will cause the value of the
hash to change (it will no longer have the value 6AB1). This means that block ‘3’ and beyond will now
be invalid since the chain was broken between block ‘2’ and ‘3’ (previous hash 6AB1 in block ‘3’ is no
longer valid).This will prevent tampering (for example, by a hacker).
PRANESH SIR
Cyber Security threads:
Brute force attacks
Data interception
Distributed Denial of Service (DDoS) attacks
Hacking
Malware (viruses, worms, Trojan horse, spyware, adware and
ransomware)
Phishing
Pharming
Social Engineering.
PRANESH SIR
Brute force attack: It is a ‘trial and error’ method used by cybercriminals to crack
passwords by finding all possible combinations of letters, numbers and symbols until the
password is found.
Data Interception: Data interception is a form of stealing data by tapping into a wired or
wireless communication link. Interception can be carried out using a packet sniffer, which
examines data packets being sent over a network. The intercepted data is sent back to the
Hacker.
Wi-Fi (wireless) data interception can be carried out using wardriving (sometimes called
Access Point Mapping).
Denial of Service (DoS) attack: It is a cyber attack that prevents users from
accessing part of a network or an internet server by flooding it with lots of requests. It is
also used to clog up a user’s mailbox by sending out thousands of spam emails.
PRANESH SIR
Distributed Denial of Service (DDoS) attack: In a distributed denial of service
(DDoS) attack the spam traffic/requests originates from many different computers, which
makes it hard to block the attack.
There are certain signs a user can look out for to see if they have become a victim of a
DDoS attack:
» slow network performance while opening files or accessing certain websites
» inability to access certain websites
» large amounts of spam email reaching the user’s email account.
It is always an illegal act. But sometimes ethical hacking occurs when companies
authorise paid hackers to check out their security measures and test how robust their
computer systems are to hacking attacks.
Prevention:
Using firewall
Use of strong password
Use of anti hacking software
Using encryption which makes the data useless to hacker
Malware: Malicious program installed on a user’s computer for deleting, corrupting and
manipulating data illegally.There are many forms of malware
PRANESH SIR
Malware: Malicious program installed on a user’s computer for deleting, corrupting and
manipulating data illegally. There are many forms of malware
PRANESH SIR
Prevention:
Install anti virus software and update it in regular interval
Don’t use software from unknown sources
Be careful when opening emails/attachments from unknown sender
Scan the removable storages by antimalware before using
PRANESH SIR
Phishing:
PRANESH SIR
Pharming:
PRANESH SIR
Social Engineering: Manipulating people into breaking their normal security procedures and not
following best practice. There are five types of threat that commonly exist:
PRANESH SIR
Solutions for security threads:
Access levels
Anti-malware including anti-virus and anti-spyware
Authentication (username and password, biometrics, two-step verification)
Automating software updates
Checking the spelling and tone of communications
Checking the URL attached to a link
Firewalls
Privacy settings
Proxy-servers
PRANESH SIR
Secure Socket Layer (SSL):It is a type of protocol (a set of rules used by
computers to communicate with each other across a network). This allows data to be
sent and received securely over the internet.
When a user logs onto a website, SSL encrypts the data – only the user’s computer
and the web server are able to make sense of what is being transmitted. A user will
know if SSL is being applied when they see https or the small padlock in the
status bar at the top of the screen.
The handshaking process between user’s web browser and the web server is shown in the
next slide
PRANESH SIR
PRANESH SIR