Lesson 2 Module 3 Lec - Data Security Awareness
Lesson 2 Module 3 Lec - Data Security Awareness
LESSON 2:
INTERNET & E-MAIL USE
Early networks - The first computer networks were dedicated special-purpose systems such as SABRE
(an airline reservation system) and AUTODIN I (a defense command-and-control system), both designed
and implemented in the late 1950s and early 1960s. By the early 1960s computer manufacturers had begun
to use semiconductor technology in commercial products, and both conventional batch-processing
and time-sharing systems were in place in many large, technologically advanced companies. Time-sharing
systems allowed a computer’s resources to be shared in rapid succession with multiple users, cycling
through the queue of users so quickly that the computer appeared dedicated to each user’s tasks despite the
existence of many others accessing the system “simultaneously.” This led to the notion of sharing
computer resources (called host
The rise of commercial Internet services and applications helped to fuel a rapid commercialization of the Internet. This
phenomenon was the result of several other factors as well. One important factor was the introduction of the personal
computer and the workstation in the early 1980s—a development that in turn was fueled by unprecedented progress
in integrated circuit technology and an attendant rapid decline in computer prices. Another factor, which took on increasing
importance, was the emergence of Ethernet and other “local area networks” to link personal computers. But other forces were
at work too. Following the restructuring of AT&T in 1984, NSF took advantage of various new options for national-level
digital backbone services for the NSFNET. In 1988 the Corporation for National Research Initiatives received approval to
conduct an experiment linking a commercial e-mail service (MCI Mail) to the Internet. This application was the first Internet
connection to a commercial provider that was not also part of the research community. Approval quickly followed to allow
other e-mail providers access, and the Internet began its first explosion in traffic.
The increased availability of wireless access enabled applications that were previously
uneconomical. For example, global positioning systems (GPS) combined with wireless Internet
access help mobile users to locate alternate routes, generate precise accident reports and initiate
recovery services, and improve traffic management and congestion control. In addition to
smartphones, wireless laptop computers, and personal digital assistants (PDAs), wearable devices
with voice input and special display glasses were developed.
9. Job-hunting
Classified ads are in abundance, but most are for technical positions.
10. Shopping
It’s difficult to believe that this category even ranks. It appears that
“cybermalls” are more for curious than serious shoppers.
∙ Working collaboratively
∙ Sending attachments
∙ Keeping a conversation together for multiple people (e.g.
thread)
∙ Searching capabilities
∙ Automating actions with rules
∙ Integrating calendars and appointments, etc.
∙ automatically create entries in your address book for every message you send
or receive
∙ respond to incoming emails automatically, eg to confirm receipt of an order, or
to let people know that you are on leave or out of the office
Despite the host of benefits, there are certain weaknesses of email that you
should be aware of, such as: