0% found this document useful (0 votes)
8 views2 pages

MODULE 7 and 8 - ITAPP

The document outlines the major components of the Internet and the evolution of the Web from Web 1.0 (static) to Web 2.0 (interactive) and Web 3.0 (intelligent). It also discusses various types of websites and common internet threats such as hacking, malware, phishing, and ransomware, detailing their implications and potential damages. Key terms related to web technology and security are defined to enhance understanding of the internet landscape.

Uploaded by

mparas23-0544
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views2 pages

MODULE 7 and 8 - ITAPP

The document outlines the major components of the Internet and the evolution of the Web from Web 1.0 (static) to Web 2.0 (interactive) and Web 3.0 (intelligent). It also discusses various types of websites and common internet threats such as hacking, malware, phishing, and ransomware, detailing their implications and potential damages. Key terms related to web technology and security are defined to enhance understanding of the internet landscape.

Uploaded by

mparas23-0544
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

MODULE 7: THE WEB AND THE INTERNET MAJOR COMPONENTS OF THE INTERNET

THE WEB (WORLD WIDE WEB) 1. Servers – Provide services and data. Types:
o Web, Mail, Proxy, File, Application, Policy Servers
2. IP Address – Unique ID for each device online
 The Web is a collection of linked web pages with text, images, and 3. Browser – Software to access websites (e.g., Chrome, Safari)
multimedia. 4. DNS – Translates website names (e.g., facebook.com) to IP addresses
 A website is a group of related web pages with a shared topic or 5. ISP – Companies that give internet access (e.g., PLDT, Converge)
purpose.
 Invented by Tim Berners-Lee, who also developed HTML, URLs, COMMON USES OF THE INTERNET
and HTTP.

WEB 1.0 – READ-ONLY WEB (STATIC)  Research and education


 Communication (email, video calls)
 Buying and selling online
 Users could only read content; no interaction or posting.
 Watching videos, gaming
 Simple websites made by professionals.
 Social media and blogging
 Example sites: Home pages, directories, MP3.com.
 Online banking and security
 Limitations: No interaction, no social media, no user-generated
content.  Taking online courses

WEB 2.0 – READ-WRITE WEB (INTERACTIVE) IMPORTANT TERMS

 Users can read and write content (comment, post, share).  HTML – Language for making web pages
 More dynamic and focused on interaction and collaboration.
 URL – The address of a web page
 Examples:  HTTP/HTTPS – Protocols for accessing web pages
o Social media: Facebook, Twitter, Instagram  Download/Upload – Transfer of data to/from your device
o Blogs: WordPress, Blogger  Encryption – Protects your online data
o Video sharing: YouTube, Vimeo  Search Engine – Helps find websites (e.g., Google)
 Key Features:  Web Bot – Automated program that works online
o Tagging (Folksonomy)  Router – Directs internet traffic to your home network
o User participation (comments, reviews)
o Subscription services (Long Tail)
MODULE 8: INTERNET THREATS

Web 3.0 – Read-Write-Intelligent Web


Understanding internet threats is crucial in today’s digital world. These
threats can compromise your privacy, damage your device, or steal your
 Focuses on AI, machine learning, and semantic web (web data identity. Below are the common types of threats and what they can do:
understood by machines).
 More personalized and intelligent web experience.
1. HACKING

TYPES OF WEBSITES
Meaning: Actions taken by someone to gain unauthorized access to a
computer. The process by which cyber criminals gain access to your
 E-commerce – Online shopping computer.
 Business – Represents a company What it can do:
 Entertainment – Movies, games, etc.
 Portfolio – Showcases personal or professional work  Find weaknesses (or pre-existing bugs) in your security settings
 Media – News and reports and exploit them in order to access your information.
 Brochure – Simple info about a business  Install a Trojan horse, providing a back door for hackers to enter
 Nonprofit – Donation and awareness and search for your information.
 Educational – School and learning content
 Infopreneur – Sells digital products (eBooks, courses) 2. MALWARE
 Personal – Blogs, vlogs
 Web Portal – Gathers info for internal use (like schools or companies) Meaning: Malicious software that infects your computer, such as computer
 Wiki/Community Forum – Group-contributed knowledge sharing viruses, worms, Trojan horses, spyware, and adware.
What it can do:
THE INTERNET
 Intimidate you with scareware, which is usually a pop-up message
that tells you your computer has a security problem or other false
 A network of networks that connects billions of devices globally.
information.
 Started in 1969 as ARPANET (no central server).
 Reformat the hard drive of your computer causing you to lose all
 The term "Internet" began in 1982. your information.
 Alter or delete files.
KEY PEOPLE  Steal sensitive information.
 Send emails on your behalf.
 Vinton Cerf – One of the “fathers of the Internet” (with Bob Kahn).  Take control of your computer and all the software running on it.

3. PHARMING
Meaning: A means to point you to a malicious and illegitimate website by Meaning: (No formal definition given, but implied as a type of malware
redirecting the legitimate URL. disguised as legitimate software.)
What it can do: What it can do:

 Convince you that the site is real and legitimate by spoofing or  Delete your files.
looking almost identical to the actual site down to the smallest  Use your computer to hack other computers.
details. You may enter your personal information and unknowingly
 Watch you through your web cam.
give it to someone with malicious intent.
 Log your keystrokes.
 Record usernames, passwords and other personal information.
4. PHISHING

9. VIRUSES
Meaning: Fake emails, text messages and websites created to look like
they're from authentic companies, also known as "spoofing".
What it can do: Meaning: (Implied as malicious programs that infect other files.)
What it can do:

 Trick you into giving them information by asking you to update,


validate or confirm your account.  Display unwanted ads.
 It is often presented in a manner that seems official and  When a program is running, the virus attached to it could infiltrate
intimidating, to encourage you to act. your hard drive and spread to USB keys and external hard drives.

5. RANSOMWARE How will you know if your computer is infected?

Meaning: A type of malware that restricts access to your computer or your  It takes longer than usual for your computer to start up, it restarts
files and displays a message that demands payment for the restriction to be on its own or doesn't start up at all.
removed.  It takes a long time to launch a program.
What it can do:  Files and data have disappeared.
 Your system and programs crash constantly.
 Lock screen ransomware: Displays an image that prevents you  Programs are running without your control.
from accessing your computer.
 Display a notification stating that your computer or data have been 10. WI-FI EAVESDROPPING
locked and demanding a payment be made for you to regain
access.
Meaning: Virtual "listening in" on information that's shared over an unsecure
 Sometimes the notification states that authorities have detected
(not encrypted) WiFi network.
illegal activity on your computer, and that the payment is a fine to
avoid prosecution.
What it can do:
6. SPAM
 Potentially access your computer with the right equipment.
Meaning: The mass distribution of unsolicited messages, advertising or  Steal your personal information including logins and passwords.
pornography to addresses found online.
What it can do: 11. WORMS

 Annoy you with unwanted junk mail. Meaning: Lives in your computer memory, doesn't damage or alter the hard
 Create a burden for communications service providers and drive and propagates by sending itself to other computers in a network.
businesses to filter electronic messages. What it can do:
 Phish for your information by tricking you into following links or
entering details with too-good-to-be-true offers and promotions.
 Spread to everyone in your contact list.
 Cause a tremendous amount of damage by shutting down parts of
7. SPYWARE (SPYWARE & ADWARE) the Internet, wreaking havoc on an internal network and costing
companies' enormous amounts of lost revenue.
Meaning: Software that collects personal information about you without you
knowing, often from a 'free' download.
What it can do:

 Collect information about you without you knowing about it and


give it to third parties.
 Send your usernames, passwords, surfing habits, list of
applications you've downloaded, settings, and even the version of
your operating system to third parties.
 Change the way your computer runs without your knowledge.
 Take you to unwanted sites or inundate you with uncontrollable
pop-up ads.

8. TROJAN HORSE

You might also like