MODULE 7 and 8 - ITAPP
MODULE 7 and 8 - ITAPP
THE WEB (WORLD WIDE WEB) 1. Servers – Provide services and data. Types:
o Web, Mail, Proxy, File, Application, Policy Servers
2. IP Address – Unique ID for each device online
The Web is a collection of linked web pages with text, images, and 3. Browser – Software to access websites (e.g., Chrome, Safari)
multimedia. 4. DNS – Translates website names (e.g., facebook.com) to IP addresses
A website is a group of related web pages with a shared topic or 5. ISP – Companies that give internet access (e.g., PLDT, Converge)
purpose.
Invented by Tim Berners-Lee, who also developed HTML, URLs, COMMON USES OF THE INTERNET
and HTTP.
Users can read and write content (comment, post, share). HTML – Language for making web pages
More dynamic and focused on interaction and collaboration.
URL – The address of a web page
Examples: HTTP/HTTPS – Protocols for accessing web pages
o Social media: Facebook, Twitter, Instagram Download/Upload – Transfer of data to/from your device
o Blogs: WordPress, Blogger Encryption – Protects your online data
o Video sharing: YouTube, Vimeo Search Engine – Helps find websites (e.g., Google)
Key Features: Web Bot – Automated program that works online
o Tagging (Folksonomy) Router – Directs internet traffic to your home network
o User participation (comments, reviews)
o Subscription services (Long Tail)
MODULE 8: INTERNET THREATS
TYPES OF WEBSITES
Meaning: Actions taken by someone to gain unauthorized access to a
computer. The process by which cyber criminals gain access to your
E-commerce – Online shopping computer.
Business – Represents a company What it can do:
Entertainment – Movies, games, etc.
Portfolio – Showcases personal or professional work Find weaknesses (or pre-existing bugs) in your security settings
Media – News and reports and exploit them in order to access your information.
Brochure – Simple info about a business Install a Trojan horse, providing a back door for hackers to enter
Nonprofit – Donation and awareness and search for your information.
Educational – School and learning content
Infopreneur – Sells digital products (eBooks, courses) 2. MALWARE
Personal – Blogs, vlogs
Web Portal – Gathers info for internal use (like schools or companies) Meaning: Malicious software that infects your computer, such as computer
Wiki/Community Forum – Group-contributed knowledge sharing viruses, worms, Trojan horses, spyware, and adware.
What it can do:
THE INTERNET
Intimidate you with scareware, which is usually a pop-up message
that tells you your computer has a security problem or other false
A network of networks that connects billions of devices globally.
information.
Started in 1969 as ARPANET (no central server).
Reformat the hard drive of your computer causing you to lose all
The term "Internet" began in 1982. your information.
Alter or delete files.
KEY PEOPLE Steal sensitive information.
Send emails on your behalf.
Vinton Cerf – One of the “fathers of the Internet” (with Bob Kahn). Take control of your computer and all the software running on it.
3. PHARMING
Meaning: A means to point you to a malicious and illegitimate website by Meaning: (No formal definition given, but implied as a type of malware
redirecting the legitimate URL. disguised as legitimate software.)
What it can do: What it can do:
Convince you that the site is real and legitimate by spoofing or Delete your files.
looking almost identical to the actual site down to the smallest Use your computer to hack other computers.
details. You may enter your personal information and unknowingly
Watch you through your web cam.
give it to someone with malicious intent.
Log your keystrokes.
Record usernames, passwords and other personal information.
4. PHISHING
9. VIRUSES
Meaning: Fake emails, text messages and websites created to look like
they're from authentic companies, also known as "spoofing".
What it can do: Meaning: (Implied as malicious programs that infect other files.)
What it can do:
Meaning: A type of malware that restricts access to your computer or your It takes longer than usual for your computer to start up, it restarts
files and displays a message that demands payment for the restriction to be on its own or doesn't start up at all.
removed. It takes a long time to launch a program.
What it can do: Files and data have disappeared.
Your system and programs crash constantly.
Lock screen ransomware: Displays an image that prevents you Programs are running without your control.
from accessing your computer.
Display a notification stating that your computer or data have been 10. WI-FI EAVESDROPPING
locked and demanding a payment be made for you to regain
access.
Meaning: Virtual "listening in" on information that's shared over an unsecure
Sometimes the notification states that authorities have detected
(not encrypted) WiFi network.
illegal activity on your computer, and that the payment is a fine to
avoid prosecution.
What it can do:
6. SPAM
Potentially access your computer with the right equipment.
Meaning: The mass distribution of unsolicited messages, advertising or Steal your personal information including logins and passwords.
pornography to addresses found online.
What it can do: 11. WORMS
Annoy you with unwanted junk mail. Meaning: Lives in your computer memory, doesn't damage or alter the hard
Create a burden for communications service providers and drive and propagates by sending itself to other computers in a network.
businesses to filter electronic messages. What it can do:
Phish for your information by tricking you into following links or
entering details with too-good-to-be-true offers and promotions.
Spread to everyone in your contact list.
Cause a tremendous amount of damage by shutting down parts of
7. SPYWARE (SPYWARE & ADWARE) the Internet, wreaking havoc on an internal network and costing
companies' enormous amounts of lost revenue.
Meaning: Software that collects personal information about you without you
knowing, often from a 'free' download.
What it can do:
8. TROJAN HORSE