EMPOWERWENT TECHNOLOGIES Week 1 and 2
EMPOWERWENT TECHNOLOGIES Week 1 and 2
WEEK 1 and 2
WHAT IS INTERNET?
• Is the global system of interconnected computer networks that use the Internet protocol suite to link billions of devices
worldwide;
• Means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers.
WHAT IS WORLD WIDE WEB (WWW)?
• Is an information space where documents and other web resources are identified by URLs, interlinked by hypertext
links, and can be accessed via the Internet.
• Invented by Tim-Berners Lee.
Examples of WWW
1. www.google.com
2. www.facebook.com
3. www.youtube.com
WHAT IS WEBSITE?
• A location connected to the Internet that maintains one or more pages on the World Wide Web.
• It is a related collection of World Wide Web (WWW) files that includes a beginning file located a home page.
TRENDS IN ICT
1) CONVERGENCE a) Technological convergence is the synergy of technological advancements to work on a similar
goal or task.
b) Convergence is using several technologies to accomplish a task conveniently.
2) SOCIAL MEDIA a) is a website, application, or online channel that enables web users to create, co-create, discuss,
modify, and exchange user-generated content.
3) MOBILE TECHNOLOGIES
a) The popularity of smartphones and tablets has taken a major rise over the years. Several of these devices are capable
of using high-speed Internet. Today, the latest mobile devices use 4G Networking (LTE), which is currently the fastest
mobile network
b) iOS – used in Apple devices such as the iPhone and iPad. Android – an open source operating system developed
by Google. Being open source means several mobile phone companies use this OS for free.
c) Blackberry OS – used in Blackberry devices.
d) Windows Phone OS – a closed source and proprietary operating system developed by Microsoft®.
e) Symbian – the original smartphone OS; used by Nokia devices.
f) WebOS – originally used for smartphones; now used for smart TVs. e. Windows Mobile– developed by Microsoft for
smartphones and pocket PCs.
4) ASSISTIVE MEDIA a) is a nonprofit service designed to help people who have visual and reading impairments. A
database audio recordings is used to read to the user
RULES OF NETIQUETTE
• Online security, safety and ethics
• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search and research skills
10 Best Rules of Netiquette
➢ The Golden Rule o (treat others as you would like to be treated)
➢ No Flaming o (Flame is a personal insult communicated through the internet
➢ Don’t type in ALL CAPS o (people may misinterpret)
➢ Don’t SPAM o (it is any unsolicited e-mail from unknown sources
➢ Don’t talk with people you do not know. o (do not arrange to meet anyone you meet online)
➢ Obey Copyright Laws o (Don’t steal someone else’s idea, property and rights)
➢ Use proper Grammar and Spelling o (errors diminishes the credibility of the message)
➢ Be honest/Be yourself o (tell the truth, do not pretend to be someone else)
➢ Follow the TOS (TOS-Term of Service) o (Rules and policy of the sites)
➢ Shop Secure Sites o (these are sites with transport layer security TLS or SLS Socket Layer Security
Antivirus:
➢ Windows Defender
➢ BitDefender
➢ ESET NOD32
➢ F-Secure
➢ Kaspersky
➢ Norton
➢ AVAST
➢ SMADAV
INTERNET THREATS
A. Malware – stands for malicious software; It is a set of instructions that run on your computer and make your system
do something that an attacker wants it to do.
Virus - a malicious program designed to replicate itself and transfer from one computer to another (internet, local
networks, FDs, CDs, etc.)
Spyware - a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor
what you are currently doing and typing through keylogging.
Adware - A program designed to send your advertisement, mostly as pop-ups; SPAM- Refers to the transmission of
unsolicited messages from various origins using electric messaging systems
A. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware.
B. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details.
Dangers on the Internet
Email Spam- Also known as junk email, it is usually unsolicited commercial email sent from one source with identical
message sent to multiple recipients. Although some of them are not harmful, deleting them one by one will eat up your
time and can clog your email. Dangerous spams carry virus like Trojan horse and other malicious software (malware).
Spamming is projected to continue because it is a cheap means of advertising. In addition, many countries do not have
laws to punish spammers.
Phishing- This is a deceitful practice of trying to get confidential information such as passwords and usernames and
credit card details by making it appear as if it comes from a trustworthy source. Phishing is usually done by email or
other similar means using a popular entity such as Microsoft, Yahoo, Google, Amazon and financial institutions to lure
you to their website. Internet users would think that they are accessing genuine website and through this way, a phisher
would be able to gather sensitive information from internet account user.
Pharming - This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious
website. The main object of pharming is to obtain username and passwords as well as credit card and financial
information and use these to steal their money electronically or use the credit card of the victims. Pharming is a major
concern of many online banking and electronic commerce transactions, which would comprise many of their client
accounts as well as the business. Antivirus and anti-spyware software cannot prevent and protect one from pharming.
Spyware - It is known that spyware programs also affect the performance and settings of the computer. Major antivirus
companies have incorporated in their products anti-spyware programs and many internet-based companies have
offered anti-spyware programs for a fee and some are free. But you must be careful which one to use to ensure your
protection.
Computer worm - This is a dangerous computer program that replicates itself through a network. Some worms delete
files, others disrupt the network function and still, others send junk mail from infected computer.
Trojan Horse - it can erase data, can allow access of the victim’s computer, can corrupt files, and can be used in Phishing
for bank accounts.
Hacker - This is a person who is able to enter and control other people’s computer without authorization. A hacker is
able to enter another’s computer, usually vandalizes the victim’s website, steals personal information, obtains intellectual
property, and performs credit card fraud. Firewalls are able to prevent entry by hackers.
IN ORDER TO BE SAFE ALL THE TIME, TAKE THE NETIQUETTE “GOLDEN RULE”: