0% found this document useful (0 votes)
18 views33 pages

Unit - 2 (Internet)

The document provides an overview of web browsers, their functionality, types, and security features, along with details on accessing websites and browsing the internet. It also discusses antivirus software, its types, key features, and the importance of protection against various cyber threats. Additionally, it covers customization options for web browsers, proxy settings, bookmarks, search toolbars, and pop-up blockers.

Uploaded by

Vikash Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views33 pages

Unit - 2 (Internet)

The document provides an overview of web browsers, their functionality, types, and security features, along with details on accessing websites and browsing the internet. It also discusses antivirus software, its types, key features, and the importance of protection against various cyber threats. Additionally, it covers customization options for web browsers, proxy settings, bookmarks, search toolbars, and pop-up blockers.

Uploaded by

Vikash Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Topic :-

• Web Browsers,
Access of websites, Surfing the Web, Search Engines, Customization of web
browsers, proxy settings, bookmarks, search toolbars, pop-up blockers.
• Antivirus types,
Protection from various threats.
Internet
The Internet is a global network of interconnected computers and
servers that communicate with each other using standardized
protocols.

How the Internet Works:


1. Devices connect to Internet Service Providers (ISPs)
2. ISPs connect to Network Service Providers (NSPs)
3. NSPs connect to backbone networks (optical fibber)
4. Backbone networks interconnect globally
5. Data transmission via packet switching
Web Browsers

• A web browser is a software application that allows users to access


and view websites on the internet.

Types of Web Browsers:


1. Google Chrome
2. Mozilla Firefox
3. Microsoft Edge
4. Safari
5. Opera
6. Internet Explorer
7. Brave
8. Tor Browser
Etc…
How Web Browsers Work:
1. User enters URL or searches for content
2. Browser sends request to DNS resolver
3. DNS resolver returns IP address
4. Browser establishes connection with web server
5. Web server sends HTML, CSS, and JavaScript files
6. Browser renders web page
7. User interacts with web page

Web Browser Security:


1. Encryption (HTTPS)
2. Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
3. Password management
4. Phishing protection
5. Malware protection
6. Firewall
7. Regular updates and patches
Web Browser Optimization:
1. Clear browsing data
2. Disable unnecessary extensions
3. Update browser regularly
4. Use ad blockers
5. Enable private browsing
6. Use browser cache
7. Optimize browser settings

Popular Web Browser Extensions:


1. AdBlock
2. uBlock Origin
3. LastPass
4. Google Translate
5. Grammarly
6. Pocket
7. EvernoteX
Access of website
Accessing a website involves several steps:
Step 1: Entering the URL
1. Open a web browser (e.g., Google Chrome, Mozilla Firefox).
2. Type the website's URL (Uniform Resource Locator) in the address bar.
3. Press Enter.

Step 2: DNS Resolution


1. The browser sends the URL to a DNS (Domain Name System) resolver.
2. The DNS resolver translates the domain name into an IP address.

Step 3: Establishing a Connection


1. The browser establishes a connection with the web server using the IP address.
2. The connection is made using HTTP (Hypertext Transfer Protocol) or HTTPS (Hypertext
Transfer Protocol Secure).
Step 4: Sending an HTTP Request
1. The browser sends an HTTP request to the web server.
2. The request includes the URL, HTTP method (e.g., GET, POST), and headers.

Step 5: Receiving the HTTP Response


1. The web server processes the request.
2. The web server sends an HTTP response back to the browser.
3. The response includes the website's content (HTML, CSS, JavaScript, images, etc.).

Step 6: Rendering the Website


1. The browser receives the HTTP response.
2. The browser renders the website's content.
3. The website is displayed in the browser window.
Accessing a Website:
Methods
1. Direct URL entry
2. Bookmark or favourite
3. Search engine results
4. Hyperlink from another website
5. Social media link
6. Email link
7. Mobile app
Tools
1. Web browsers (e.g., Chrome, Firefox)
2. Search engines (e.g., Google, Bing)
3. URL shorteners (e.g., (link unavailable))
4. Website aggregators (e.g., RSS readers)
5. Mobile apps (e.g., website-specific apps)
6. Browser extensions (e.g., ad blockers)
7. VPNs (Virtual Private Networks)
Surfing the Web:
• Surfing the web refers to browsing and exploring the internet using a web browser.
• Surfing the web, also known as browsing the web, is the activity of using a web
browser to explore the internet and navigate between websites and webpages
Basic Steps:
1. Open a web browser (e.g., Google Chrome, Mozilla Firefox).
2. Enter a URL (web address) or search query.
3. Press Enter or click Search.
4. Browse through search results or navigate to desired websites.
Web Browsing Tools:
1. Search engines (e.g., Google, Bing).
2. Bookmarks/Favourites.
3. Browser history.
4. Tabs and windows.
5. Hyperlinks.
Web Browsing Tips:
1. Use reputable search engines.
2. Verify website credibility.
3. Avoid phishing scams.
4. Use strong passwords.
5. Keep browser software up-to-date.
Search engine
A search engine is a software program that:
1. Retrieves data from the internet.
2. Ranks and displays relevant results.
3. Allows users to search for specific information.

Popular Search Engines:


1. Google
2. Bing
3. Yahoo
4. DuckDuckGo
5. Baidu
6. Yandex
7. Ask
8. WoW
How Search Engines Work:
1. Crawling: Bots scan and index web pages.
2. Indexing: Data stored in massive databases.
3. Query processing: Search query analysed.
4. Retrieval: Relevant results retrieved.
5. Ranking: Results ranked by relevance.

Search Engine Features:


1. Keyword search
2. Advanced search filters
3. Image search
4. Video search
5. Maps integration
6. Voice search
7. Autocomplete suggestions
Customization of web browser
Customizing your web browser can enhance your browsing experience. Here's a
comprehensive overview:

Customization Options:
1. Home Page: Set your preferred homepage.
2. Search Engine: Choose your default search engine.
3. Theme/Skin: Change browser's appearance.
4. Extensions/Add-ons: Install plugins for added functionality.
5. Toolbars: Customize toolbar layout and buttons.
6. Keyboard Shortcuts: Assign custom shortcuts.
7. Font and Zoom: Adjust font size and zoom level.
8. Startup Settings: Configure startup behaviour.
9. New Tab Page: Customize new tab content.
10. Privacy Settings: Adjust tracking and data collection.
Benefits of Customization:
1. Enhanced productivity.
2. Improved accessibility.
3. Increased security.
4. Personalized browsing experience.
5. Streamlined workflow.

Precautions:
1. Be cautious when installing extensions.
2. Avoid conflicting customizations.
3. Regularly update browser and extensions.
4. Back up customization settings.
Proxy
Proxy settings allow you to configure your device or browser to use a proxy server,
which acts as an intermediary between your device and the internet.

What is a Proxy Server ?


A proxy server is a computer or service that:
1. Hides your IP address.
2. Masks your location.
3. Encrypts data.
4. Caches frequently accessed resources.
5. Blocks access to certain websites.
Proxy
server

Facebook
server
Types of Proxy Servers:
1. HTTP Proxy: Handles HTTP requests.
2. SOCKS Proxy: Handles TCP and UDP requests.
3. VPN (Virtual Private Network) Proxy: Encrypts all internet traffic.
4. Transparent Proxy: Intercepts and caches HTTP requests.
5. Reverse Proxy: Protects servers from external access.

Use Cases for Proxy Settings:


1. Anonymous browsing.
2. Access blocked websites.
3. Improve network security.
4. Reduce bandwidth usage.
5. Bypass geographical restrictions.

Common Proxy Errors:


1. Proxy server not responding.
2. Proxy authentication failed.
3. Proxy connection timed out.
4. Proxy server refused connection
Bookmarks
Bookmarks are saved links to web pages, allowing quick access to
frequently visited sites.

Types of Bookmarks:
1. Browser Bookmarks: Saved within a web browser.
2. Social Bookmarks: Shared publicly (e.g., Delicious, Pinterest).
3. Personal Bookmarks: Stored locally or in cloud storage.

Bookmarking Features:
1. Add/Edit Bookmarks
2. Organize using folders/tags
3. Search bookmarks
4. Sync across devices
5. Import/Export bookmarks
Bookmark Management Tools:
1. Bookmark managers (e.g., Bookmark Manager, Bookmarks Organizer)
2. Browser extensions (e.g., Bookmark Sync, Bookmark Manager)
3. Cloud storage services (e.g., Google Drive, Dropbox)

Benefits of Bookmarks:
1. Quick access to frequently visited sites
2. Organized browsing
3. Time-saving
4. Personalized browsing experience

Best Practices: Common Bookmark Issues:


1. Regularly organize bookmarks 1. Duplicate bookmarks
2. Use descriptive names and tags 2. Broken links
3. Remove unnecessary bookmarks 3. Lost bookmarks
4. Sync bookmarks across devices 4. Syncing issues
Search Toolbar
A search toolbar is a graphical user interface (GUI) element that allows users to
search for specific information within a website, application, or database.

Types of Search Toolbars:


1. Browser Search Toolbar: Integrated into web browsers.
2. Website Search Toolbar: Embedded within websites.
3. Application Search Toolbar: Integrated into software applications.

Search Toolbar Features:


1. Search Box: Text input field.
2. Search Button: Initiates search.
3. Dropdown Menu: Suggestions or filters.
4. Search History: Recent searches.
5. Advanced Search Options: Filters, sorting.
Popular Search Toolbars:
1. Google Search Toolbar
2. Bing Search Toolbar
3. Yahoo Search Toolbar
4. DuckDuckGo Search Toolbar
5. StartPage

Browser Search Toolbar:


Benefits:
1. Google Chrome: Address bar doubles as search bar. 1. Quick access to search functionality.
2. Mozilla Firefox: Search box in toolbar. 2. Streamlined search process.
3. Microsoft Edge: Search box in toolbar. 3. Personalized search results.
4. Safari: Search box in toolbar. 4. Enhanced productivity.

Customization Options: Best Practices:


1. Change default search engine. 1. Use relevant keywords.
2. Add/remove search engines. 2. Utilize filters and sorting.
3. Customize search toolbar layout. 3. Clear search history regularly.
4. Enable/disable search suggestions. 4. Customize search toolbar for efficiency.
Pop-up Blockers
Pop-up blockers prevent unwanted pop-up windows from appearing
while browsing the internet.

Types of Pop-up Blockers:


1. Built-in browser pop-up blockers
2. Browser extensions (e.g., AdBlock, uBlock Origin)
3. Standalone software (e.g., Pop-up Stopper)
4. Firewall and security suite integrations

How Pop-up Blockers Work:


1. Filter pop-up requests
2. Block unwanted pop-ups
3. Allow exceptions for trusted sites
4. Provide customizable settings
Popular Pop-up Blockers:
1. Google Chrome's built-in pop-up blocker
2. Mozilla Firefox's built-in pop-up blocker Configuration Options:
3. Microsoft Edge's built-in pop-up blocker 1. Enable/disable pop-up blocking
4. AdBlock 2. Add exceptions for trusted sites
5. uBlock Origin 3. Customize filter settings
6. NoScript 4. Whitelist specific domains
7. Pop-up Blocker Pro
Best Practices:
Benefits: 1. Enable pop-up blocking by default
1. Reduced distractions 2. Configure exceptions for trusted sites
2. Improved browsing experience 3. Regularly update pop-up blocker software
3. Enhanced security 4. Monitor performance impact
4. Reduced malware risk
5. Increased productivity Common Issues:
1. Overly aggressive blocking
Drawbacks: 2. False positives
1. Some legitimate pop-ups may be blocked 3. Compatibility issues with certain websites
2. Configuration required for exceptions 4. Software conflicts
3. Potential performance impact
Antivirus:
Antivirus software detects, prevents, and removes malicious software
(malware) from computers, laptops, mobile devices, and other electronic
devices.

Primary Functions: Types of Malware:


1. Scan files and programs for malware. 1. Viruses
2. Detect and remove malware. 2. Trojans
3. Prevent malware installation. 3. Worms
4. Provide real-time protection. 4. Spyware
5. Update malware definitions. 5. Adware
6. Ransomware
7. Rootkits
8. Botnets
Antivirus Types:
There are several types of antivirus software, each with unique features and functionalities.
1. Signature-based Antivirus: Scans files and programs for known malware signatures.
2. Behavioral-based Antivirus: Monitors system behavior to detect unknown malware.
3. Cloud-based Antivirus: Uses cloud computing to analyze and block threats.
4. Hybrid Antivirus: Combines signature-based and behavioral-based detection.
5. Next-Generation Antivirus (NGAV): Uses AI, machine learning, and behavioral analysis.
6. Endpoint Detection and Response (EDR): Provides real-time threat detection and response.
7. Internet Security Suites: Comprehensive protection including antivirus, firewall, and privacy tools.
8. Free Antivirus: Basic protection for individual users.
9. Paid Antivirus: Advanced features and support for individuals and businesses.
10. Enterprise Antivirus: Centralized management and security for large organizations.
Key Features:
1. Real-time protection
2. Scheduled scanning
3. Automatic updates
4. Firewall integration
5. Anti-phishing and anti-ransomware
6. Password management
7. System optimization

How Antivirus Works:


1. Signature-based detection: Matches malware against known signatures.
2. Behavioural-based detection: Monitors system behaviour to detect unknown malware.
3. Cloud-based detection: Analyses files and programs in the cloud.

Benefits:
1. Protects against malware.
2. Prevents data loss.
3. Ensures system stability.
4. Safeguards online transactions.
5. Enhances system performance.
Importance:
1. Protects sensitive information.
2. Prevents identity theft.
3. Safeguards financial data.
4. Ensures business continuity.
5. Maintains system integrity.
When choosing antivirus software,
consider:
Popular Antivirus Software: 1. Detection rates
1. Norton Antivirus 2. System performance impact
2. McAfee Antivirus 3. User interface
3. Kaspersky Antivirus 4. Additional features
4. Avast Antivirus 5. Customer support
5. AVG Antivirus 6. Pricing
6. Microsoft Defender
7. Bitdefender Antivirus Best Practices:
8. Trend Micro Antivirus 1. Install reputable antivirus software.
9. ESET Antivirus 2. Keep software up-to-date.
10. Malwarebytes 3. Run regular scans.
4. Avoid suspicious downloads.
5. Use strong passwords.
Threats:
Threats are potential occurrences that could compromise the security, integrity, or availability of
information, systems, or networks.

Types of Threats:
1. Malware: Viruses, worms, trojans, ransomware.
2. Phishing: Social engineering attacks via email or messaging.
3. Network Threats: Unauthorized access, denial of service (DoS).
4. Physical Threats: Theft, vandalism, natural disasters.
5. Insider Threats: Malicious employees or contractors.
6. External Threats: Hackers, cyber terrorists.
7. Environmental Threats: Power outages, flooding.
8. Human Threats: Social engineering, impersonation.
Cyber Threats: Insider Threats:
1. Hacking 1. Data Theft
2. Identity Theft 2. Sabotage
3. Online Harassment 3. Unauthorized Access Threat Assessment:
4. Ransomware 4. Privilege Abuse 1. Identify potential threats
5. Spyware 5. Intellectual Property Theft 2. Assess likelihood and impact
6. Adware 3. Develop mitigation strategies
7. Botnets External Threats: 4. Implement security controls
8. SQL Injection 1. Hackers 5. Monitor and review
9. Cross-Site Scripting (XSS) 2. Cyber Terrorists
10. Denial of Service (DoS) 3. Nation-State Actors
4. Organized Crime Groups
Physical Threats: 5. Script Kiddies
1. Theft
2. Vandalism Threat Levels:
3. Fire
4. Flood
1. Low: Minimal impact
5. Earthquake 2. Medium: Moderate impact
6. Power Outage 3. High: Significant impact
7. Natural Disasters 4. Critical: Catastrophic impact
Protection from Various Threats:
Types of Threats:
1. Malware (Viruses, Worms, Trojans, Ransomware)
Hardware Protection:
2. Phishing 1. Router firewalls
3. Spyware 2. Network switches
4. Adware 3. Secure routers
5. Rootkits 4. Encryption devices
6. Botnets
7. Denial of Service (DoS) Attacks Network Protection:
8. Man-in-the-Middle (MitM) Attacks 1. Virtual Private Networks (VPNs)
9. SQL Injection Attacks 2. Secure Sockets Layer (SSL) encryption
10. Cross-Site Scripting (XSS) Attacks 3. Transport Layer Security (TLS) encryption
4. Network segmentation
Protection Measures:
Software Protection: User Education:
1. Antivirus software 1. Password management
2. Firewall 2. Safe browsing habits
3. Anti-malware software 3. Email security
4. Intrusion Detection Systems (IDS) 4. Social engineering awareness
5. Intrusion Prevention Systems (IPS) 5. Regular software updates
Best Practices: Incident Response:
1. Use strong passwords 1. Contain the threat
2. Enable two-factor authentication 2. Eradicate the threat
3. Keep software up-to-date 3. Recover from the incident
4. Use antivirus software 4. Post-incident activities
5. Avoid suspicious downloads
6. Use a firewall
7. Use encryption
8. Regularly back up data

Threat Intelligence:
1. Monitor system logs
2. Analyze network traffic
3. Identify potential threats
4. Implement incident response plans

You might also like