0% found this document useful (0 votes)
61 views24 pages

Chapter-The Internet and Its Uses

The document discusses various topics related to internet and cyber security. It begins by explaining what the internet is and how devices connect to it using an Internet Service Provider. It then discusses the World Wide Web and how it functions using HTTP and web browsers. Other topics covered include URLs, domain name systems, cookies, digital currencies, blockchain, and common cyber security threats like hacking, malware, and social engineering. It provides information on how these systems and threats work and potential solutions to enhance security.

Uploaded by

sahran sanur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views24 pages

Chapter-The Internet and Its Uses

The document discusses various topics related to internet and cyber security. It begins by explaining what the internet is and how devices connect to it using an Internet Service Provider. It then discusses the World Wide Web and how it functions using HTTP and web browsers. Other topics covered include URLs, domain name systems, cookies, digital currencies, blockchain, and common cyber security threats like hacking, malware, and social engineering. It provides information on how these systems and threats work and potential solutions to enhance security.

Uploaded by

sahran sanur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Chapter-Internet

and its uses

PRANESH SIR
Internet: It is a world wide network/Network of networks where millions
of webservers are interconnected.

Things required to connect with internet:


-A device with NIC
-Modem
-An account with ISP
-Communication software(protocols, web browser)

Internet service Provider: It is an agent who provides internet conection


to our devices.
PRANESH SIR
World Wide Web(WWW):It is a massive collection of multimedia web pages and
web resources and is based on the hypertext transfer protocol.
Internet is the network infrastructure that is used to access the world wide web.

PRANESH SIR
Hyper Text Transfer Protocol: It is a set of rules used to access data on
the world wide web. It can be used to transfer the data in the form of
plain text, hypertext, audio, video, and so on.
HTTP client initiates a request and waits for a response from the server.
The server process the request and sends back the response to the HTTP
client.
When some form of extra security is used, then this is changed to HTTPs.
‘s’ stands for secure which indicates more secure way i.e. encrypted
communication is performed between client and sever across the internet.

PRANESH SIR
Web browser: It is a communication software which is used to access webpages from the
internet. It send request for a webpage to the webserver. Webserver send the requested
content in HTML form to the web browser. Web browser interpret the code and display the
webpage to us.

Features of a web browser:


 Recording user’s browsing history
 Storing bookmarks
 Provide navigation tools
 Allows use of multiple tabs at a time
 Stores cookies
 Provide an address bar
PRANESH SIR
Uniform Resource Locator(URL):It is a unique text based address of web resources in world
wide web.
https://www.abc.com//index1.html
-protocol name
-Domain name
-File name
Protocol:It is set of rules used to control/govern communication between two devices in a
network.
Example- Http, FTP, IP, TCP

Domain Name System(DNS):It is a system which converts an URL to its correspond IP


address.
PRANESH SIR
Tasks performed after requesting for a webpage:
 The browser passes the Domain name to the connected DNS.
 DNS stores a list of Domain name and their IP address in a database.
 After getting request from browser the DNS looks for the Domain name in their database.
 If found the corresponding IP address is returned back to the browser
 The browser uses the IP address to send request to the webserver.
 After receiving the request, webserver send the web resource or script to the browser.
 Finally web browser interpret that script and display the webpage

PRANESH SIR
Cookies
These are a small files or codes sent by a web server to a web browser. These are
generated each time the user visits the website.
There are two types of cookies-
i) Session Cookies-a cookie that is stored temporarily on a computer; it is deleted when
the browser is closed or the website session ends.
ii) Persistent Cookies- a cookie that is stored on the user’s hard drive and only deleted
when the expiry date is reached or the cookie is deleted by the user

Use of Cookies:
 Some servers use it for security reason which trace the activity of the users by cookies.
 Online shopping sites used it to track user’s preference and holding items in an online
shopping cart.
 Used to store login details, email addresses and invoice details
 Track internet habits and user’s website histories or bookmarks.
 Targets users with advertising that matches their previous buying or surfing habits
PRANESH SIR
Digital Currency:
Digital currency refers to any means of payment that exists in a purely electronic form. Digital money is not
physically tangible like a dollar or a coin. It is accounted for and transferred using online systems. One well-
known form of digital money is the crypto currency Bitcoin. Cryptocurrency uses cryptography to
track transactions
Comparison between Crypto currency and traditional digital currency:
 Traditional digital currencies are regulated by central banks and governments. This
means all transactions and exchange rates are determined by these two bodies.
Cryptocurrency has no state control and all the rules are set by the cryptocurrency
community itself.
 Unlike existing digital currencies, cryptocurrency transactions are publicly available and
therefore all transactions can be tracked and the amount of money in the system is
monitored.
 The cryptocurrency system works by being within a blockchain network which means it
is much more secure. PRANESH SIR
Block Chain:
Blockchain is a decentralised database. All the transactions of networked members are
stored on this database. Blockchain consists of a number of interconnected computers but
they are not connected to a central server. All transaction data is stored on all computers
in the blockchain network.
Whenever a new transaction takes place, all the networked computers get a copy of the
transaction; therefore it cannot be changed without the consent of all the network
members. This effectively removes the risk of security issues such as hacking.

PRANESH SIR
How Block Chain works:
 on a blockchain network, two nodes can exchange data or information (transaction), the
blockchain network will verify the authenticity of the transaction.
 Whenever a new transaction takes place, a new block is created:

 A new hash value is created each time a new block is produced. This hash value is
unique to each block and includes a timestamp, which identifies when an event
actually takes place.
PRANESH SIR
How Block Chain works:
Then adding the new block into blockchain is done through a process known as Proof-of-work
which makes sure it takes about ten minutes to determine the necessary proof-of-work
for each block before it can be added to the chain.

Block ‘1’ is known as the genesis block since it doesn’t point to any previous block. Now suppose
block ‘2’ is changed in some way. Any changes to the data within block ‘2’ will cause the value of the
hash to change (it will no longer have the value 6AB1). This means that block ‘3’ and beyond will now
be invalid since the chain was broken between block ‘2’ and ‘3’ (previous hash 6AB1 in block ‘3’ is no
longer valid).This will prevent tampering (for example, by a hacker).
PRANESH SIR
Cyber Security threads:
 Brute force attacks
 Data interception
 Distributed Denial of Service (DDoS) attacks
 Hacking
 Malware (viruses, worms, Trojan horse, spyware, adware and
ransomware)
 Phishing
 Pharming
 Social Engineering.

PRANESH SIR
Brute force attack: It is a ‘trial and error’ method used by cybercriminals to crack
passwords by finding all possible combinations of letters, numbers and symbols until the
password is found.

Data Interception: Data interception is a form of stealing data by tapping into a wired or
wireless communication link. Interception can be carried out using a packet sniffer, which
examines data packets being sent over a network. The intercepted data is sent back to the
Hacker.
Wi-Fi (wireless) data interception can be carried out using wardriving (sometimes called
Access Point Mapping).

Denial of Service (DoS) attack: It is a cyber attack that prevents users from
accessing part of a network or an internet server by flooding it with lots of requests. It is
also used to clog up a user’s mailbox by sending out thousands of spam emails.

PRANESH SIR
Distributed Denial of Service (DDoS) attack: In a distributed denial of service
(DDoS) attack the spam traffic/requests originates from many different computers, which
makes it hard to block the attack.

There are certain signs a user can look out for to see if they have become a victim of a
DDoS attack:
» slow network performance while opening files or accessing certain websites
» inability to access certain websites
» large amounts of spam email reaching the user’s email account.

An individual user or a website can guard against these attacks by:


» using an up-to-date malware checker
» setting up a firewall to restrict traffic to and from the web server or user’s
computer
» applying email filters to filter out unwanted traffic (for example, spam).
PRANESH SIR
Hacking: It is a act of gaining illegal access to a computer system without the owner’s
permission. This can lead to identity theft or the gaining of personal information. By
hacking a system, data can be deleted, passed on, changed or corrupted.

It is always an illegal act. But sometimes ethical hacking occurs when companies
authorise paid hackers to check out their security measures and test how robust their
computer systems are to hacking attacks.
Prevention:
 Using firewall
 Use of strong password
 Use of anti hacking software
 Using encryption which makes the data useless to hacker

Malware: Malicious program installed on a user’s computer for deleting, corrupting and
manipulating data illegally.There are many forms of malware
PRANESH SIR
Malware: Malicious program installed on a user’s computer for deleting, corrupting and
manipulating data illegally. There are many forms of malware

PRANESH SIR
Prevention:
 Install anti virus software and update it in regular interval
 Don’t use software from unknown sources
 Be careful when opening emails/attachments from unknown sender
 Scan the removable storages by antimalware before using
PRANESH SIR
Phishing:

PRANESH SIR
Pharming:

PRANESH SIR
Social Engineering: Manipulating people into breaking their normal security procedures and not
following best practice. There are five types of threat that commonly exist:

PRANESH SIR
Solutions for security threads:
 Access levels
 Anti-malware including anti-virus and anti-spyware
 Authentication (username and password, biometrics, two-step verification)
 Automating software updates
 Checking the spelling and tone of communications
 Checking the URL attached to a link
 Firewalls
 Privacy settings
 Proxy-servers

PRANESH SIR
Secure Socket Layer (SSL):It is a type of protocol (a set of rules used by
computers to communicate with each other across a network). This allows data to be
sent and received securely over the internet.
When a user logs onto a website, SSL encrypts the data – only the user’s computer
and the web server are able to make sense of what is being transmitted. A user will
know if SSL is being applied when they see https or the small padlock in the
status bar at the top of the screen.

The handshaking process between user’s web browser and the web server is shown in the
next slide

PRANESH SIR
PRANESH SIR

You might also like