Unit - 2 (Internet)
Unit - 2 (Internet)
• Web Browsers,
Access of websites, Surfing the Web, Search Engines, Customization of web
browsers, proxy settings, bookmarks, search toolbars, pop-up blockers.
• Antivirus types,
Protection from various threats.
Internet
The Internet is a global network of interconnected computers and
servers that communicate with each other using standardized
protocols.
Customization Options:
1. Home Page: Set your preferred homepage.
2. Search Engine: Choose your default search engine.
3. Theme/Skin: Change browser's appearance.
4. Extensions/Add-ons: Install plugins for added functionality.
5. Toolbars: Customize toolbar layout and buttons.
6. Keyboard Shortcuts: Assign custom shortcuts.
7. Font and Zoom: Adjust font size and zoom level.
8. Startup Settings: Configure startup behaviour.
9. New Tab Page: Customize new tab content.
10. Privacy Settings: Adjust tracking and data collection.
Benefits of Customization:
1. Enhanced productivity.
2. Improved accessibility.
3. Increased security.
4. Personalized browsing experience.
5. Streamlined workflow.
Precautions:
1. Be cautious when installing extensions.
2. Avoid conflicting customizations.
3. Regularly update browser and extensions.
4. Back up customization settings.
Proxy
Proxy settings allow you to configure your device or browser to use a proxy server,
which acts as an intermediary between your device and the internet.
Facebook
server
Types of Proxy Servers:
1. HTTP Proxy: Handles HTTP requests.
2. SOCKS Proxy: Handles TCP and UDP requests.
3. VPN (Virtual Private Network) Proxy: Encrypts all internet traffic.
4. Transparent Proxy: Intercepts and caches HTTP requests.
5. Reverse Proxy: Protects servers from external access.
Types of Bookmarks:
1. Browser Bookmarks: Saved within a web browser.
2. Social Bookmarks: Shared publicly (e.g., Delicious, Pinterest).
3. Personal Bookmarks: Stored locally or in cloud storage.
Bookmarking Features:
1. Add/Edit Bookmarks
2. Organize using folders/tags
3. Search bookmarks
4. Sync across devices
5. Import/Export bookmarks
Bookmark Management Tools:
1. Bookmark managers (e.g., Bookmark Manager, Bookmarks Organizer)
2. Browser extensions (e.g., Bookmark Sync, Bookmark Manager)
3. Cloud storage services (e.g., Google Drive, Dropbox)
Benefits of Bookmarks:
1. Quick access to frequently visited sites
2. Organized browsing
3. Time-saving
4. Personalized browsing experience
Benefits:
1. Protects against malware.
2. Prevents data loss.
3. Ensures system stability.
4. Safeguards online transactions.
5. Enhances system performance.
Importance:
1. Protects sensitive information.
2. Prevents identity theft.
3. Safeguards financial data.
4. Ensures business continuity.
5. Maintains system integrity.
When choosing antivirus software,
consider:
Popular Antivirus Software: 1. Detection rates
1. Norton Antivirus 2. System performance impact
2. McAfee Antivirus 3. User interface
3. Kaspersky Antivirus 4. Additional features
4. Avast Antivirus 5. Customer support
5. AVG Antivirus 6. Pricing
6. Microsoft Defender
7. Bitdefender Antivirus Best Practices:
8. Trend Micro Antivirus 1. Install reputable antivirus software.
9. ESET Antivirus 2. Keep software up-to-date.
10. Malwarebytes 3. Run regular scans.
4. Avoid suspicious downloads.
5. Use strong passwords.
Threats:
Threats are potential occurrences that could compromise the security, integrity, or availability of
information, systems, or networks.
Types of Threats:
1. Malware: Viruses, worms, trojans, ransomware.
2. Phishing: Social engineering attacks via email or messaging.
3. Network Threats: Unauthorized access, denial of service (DoS).
4. Physical Threats: Theft, vandalism, natural disasters.
5. Insider Threats: Malicious employees or contractors.
6. External Threats: Hackers, cyber terrorists.
7. Environmental Threats: Power outages, flooding.
8. Human Threats: Social engineering, impersonation.
Cyber Threats: Insider Threats:
1. Hacking 1. Data Theft
2. Identity Theft 2. Sabotage
3. Online Harassment 3. Unauthorized Access Threat Assessment:
4. Ransomware 4. Privilege Abuse 1. Identify potential threats
5. Spyware 5. Intellectual Property Theft 2. Assess likelihood and impact
6. Adware 3. Develop mitigation strategies
7. Botnets External Threats: 4. Implement security controls
8. SQL Injection 1. Hackers 5. Monitor and review
9. Cross-Site Scripting (XSS) 2. Cyber Terrorists
10. Denial of Service (DoS) 3. Nation-State Actors
4. Organized Crime Groups
Physical Threats: 5. Script Kiddies
1. Theft
2. Vandalism Threat Levels:
3. Fire
4. Flood
1. Low: Minimal impact
5. Earthquake 2. Medium: Moderate impact
6. Power Outage 3. High: Significant impact
7. Natural Disasters 4. Critical: Catastrophic impact
Protection from Various Threats:
Types of Threats:
1. Malware (Viruses, Worms, Trojans, Ransomware)
Hardware Protection:
2. Phishing 1. Router firewalls
3. Spyware 2. Network switches
4. Adware 3. Secure routers
5. Rootkits 4. Encryption devices
6. Botnets
7. Denial of Service (DoS) Attacks Network Protection:
8. Man-in-the-Middle (MitM) Attacks 1. Virtual Private Networks (VPNs)
9. SQL Injection Attacks 2. Secure Sockets Layer (SSL) encryption
10. Cross-Site Scripting (XSS) Attacks 3. Transport Layer Security (TLS) encryption
4. Network segmentation
Protection Measures:
Software Protection: User Education:
1. Antivirus software 1. Password management
2. Firewall 2. Safe browsing habits
3. Anti-malware software 3. Email security
4. Intrusion Detection Systems (IDS) 4. Social engineering awareness
5. Intrusion Prevention Systems (IPS) 5. Regular software updates
Best Practices: Incident Response:
1. Use strong passwords 1. Contain the threat
2. Enable two-factor authentication 2. Eradicate the threat
3. Keep software up-to-date 3. Recover from the incident
4. Use antivirus software 4. Post-incident activities
5. Avoid suspicious downloads
6. Use a firewall
7. Use encryption
8. Regularly back up data
Threat Intelligence:
1. Monitor system logs
2. Analyze network traffic
3. Identify potential threats
4. Implement incident response plans