0% found this document useful (0 votes)
15 views6 pages

Accessing The Internet

The document outlines various methods of accessing the internet, including dial-up, cable, and DSL, as well as the concept of intranets for secure internal communication. It also discusses network security measures such as user IDs, passwords, encryption, and authentication techniques to protect against unauthorized access. Additionally, it highlights the differences between the internet and intranets in terms of accessibility and security features.

Uploaded by

levi makokha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views6 pages

Accessing The Internet

The document outlines various methods of accessing the internet, including dial-up, cable, and DSL, as well as the concept of intranets for secure internal communication. It also discusses network security measures such as user IDs, passwords, encryption, and authentication techniques to protect against unauthorized access. Additionally, it highlights the differences between the internet and intranets in terms of accessibility and security features.

Uploaded by

levi makokha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

ACCESSING THE INTERNET

❖ ISP (Internet Service Provider): A company that provides internet


access, usually for a fee.
❖ User Registration:
✓ Users get login details (username & password).
✓ Allows monitoring of internet usage.

Email Accounts,

✓ Provided by most ISPs.


✓ Emails allow sending of documents, attachments (word
documents, spreadsheets, audio/video files, etc.).
✓ Email format: username@hostname (e.g
[email protected]).

METHODS OF ACCESSING THE INTERNET

i. Dial-up Internet Access


✓ Slowest type (~60 kbps).
✓ Connects via telephone line; not always on.
✓ ISP contracts are time-based (e.g., hourly).
✓ Disadvantage: Telephone line is occupied when in use.

ii. Cable Internet Access

✓ Provided by local cable television operators.


✓ Uses a cable modem.

iii. DSL (Broadband) Internet Access

✓ Faster download speeds (at least 11,000 kbps).


✓ Often includes wireless functionality (requires an AP &
router).
✓ May have a download limit (e.g 20 GB).
✓ Always on; does not tie up the telephone line.
✓ Supports VOIP (Voice Over IP) and online chat rooms.

INTRANETS

❖ This a private computer network using internet technology,


designed for internal company information sharing.

Advantages of an Intranet

More secure-Less chance of external hacking/viruses.


Controlled access-Prevents access to unwanted websites.
Customized Information- Content is specific to the company.
Secure Messaging- Allows sensitive internal communication.

COMPARISON BTWN INTERNET AND INTRANET

✓ "Internet" → International Network.


✓ "Intranet" → Internal Restricted Access Network.
❖ Internet is global information while Intranet is company-specific
information.
❖ When it comes to access Control,
✓ Intranet can block certain websites (harder to do on
the internet).
✓ Requires password authentication.
✓ Accessible only from designated points.
❖ Security of Intranet:
✓ Firewall protection prevents hacking, viruses, unauthorized
users.
✓ Local storage: Data is stored on local servers (safer from
external threats).

NETWORK SECURITY

Security Issues in Networks

Using networks like the internet comes with security risks. To protect against these
risks, several security measures are used. This section focuses on four key areas.
These are,

i. User ID (Username)

ii. Password

iii. Encryption

iv. Authentication Techniques

USER ID (USERNAME)

❖ When logging into a system, users must enter a User ID.


❖ The system assigns different levels of access:
Administrator: Can set passwords, delete files, and manage
users.
Normal User: Can only access their own files and work area.
❖ Helps in tracking user activity for security.

PASSWORDS

❖ After entering the User ID, a password is required for login.


❖ Good password practices are,
✓ Should be a mix of letters and numbers.
✓ Displayed as ******* to prevent others from seeing it.

Verification Steps

✓ Some systems require users to enter the password twice to


avoid typing mistakes.
✓ Users have a limited number of tries (e.g 3 attempts) before
the account is locked.

Forgotten Passwords

✓ Users can request a reset link via email.

ENCRYPTION

❖ Encryption scrambles data so that unauthorized users cannot read


it.

How encryption Works

✓ Uses encryption software or an encryption key to encode


messages.

Example,

-Message: "THIS IS AN EXAMPLE"

-Encrypted Message: "43Kr Kr T7 W04887W"

✓ The receiver uses a decryption key to decode it.

Benefits of encryption

a) Prevents hackers from reading data.


b) Used for securing banking details, passwords, and personal
information.
Encryption Algorithm

✓ The date/time of sending is often included for extra security.


✓ Modern encryption uses complex algorithms to prevent
cracking.

AUTHENTICATION TECHNIQUES

❖ Authentication ensures that a user is who they claim to be.


Most systems use at least two of these methods:
a) Something you know – e.g a password or PIN.
b) Something you own – e.g a bank card.
c) Something unique to you – e.g fingerprints or face ID.

Banking Example,

• A user logs into a bank account online.


• Security steps,
✓ Enters username and password.
✓ Uses card reader to generate a unique code.
✓ System checks if login time and date match the user's
previous activity.
✓ If unusual activity is detected, extra security measures are
taken.
• The system may use radio buttons for final verification.
Summary

SECURITY FEATURE PURPOSE EXAMPLES


Identifies users and
USER ID Admin vs. Normal user
controls access levels
Prevents unauthorized Should be strong (letters
PASSWORDS
access + numbers)
Scrambles data to Used in banking,
ENCRYPTION
protect it from hackers messaging
PIN, fingerprint, security
AUTHENTICATION Verifies user identity
code

You might also like