Chapter 2 Living It Era

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 48

2

The WEB and the INTERNET


LIVING IN THE IT ERA
Are you ready to
play the Word
Picture Game?
What word is shown in these pictures?
ANSWER:
What word do we have for these pictures?
ANSWER

BLACKMAIL
What about the word behind these
pictures?
ANSWER

SUPERHIGHWAY
What about the word behind these two
pictures?
ANSWER

CYBERCRIME
MODULE OVERVIEW
In this chapter, we will discuss the evolution of the Internet
along with many ways to connect to the Internet, how data
travels the Internet, and how the Internet works with domain
names and IP Addresses. It also introduces services available
on the Internet, such as email, video conferencing, telenet, file
transferring, world wide web, ecommerce, newsgroup, and
internet relay chat. Finally, understand the ethical issues and
how you protect yourself while using the Internet.
OBJECTIVES
Explore the current breakthrough technologies and
disruptive innovations that have appeared over the past
few years.
 Identify the different services offered through the web.
 Appreciate the evolution of world wide web.
 Understand the risk of putting your information over
the internet
In the internet, there are no sidewalks,
just a huge superhighway where
information freely flows through. If in
the real world we have the police or the
military to monitor us, the internet is
unmonitored making it one of the most
abused technology we use.
Introduction to INTERNET?

2
The internet is a worldwide collection of networks that connects millions of businesses, government agencies,
educational institutions, and individuals. Each of the networks on the Internet provides resources that add to
the abundance of goods, services, and information accessible via the Internet.
 The Internet has its roots in a networking project started by the Pentagon’s Advanced Research Projects
Agency (ARPA), an agency of the U.S> Department of Defense. ARPA’s goal was to build a network that (a)
allowed scientists at different physical locations to share information and work together on military and
scientific projects and (b) could function even if part of the network were disabled or destroyed by a disaster
such as a nuclear attack. That network, called ARPANET, became functional in September 1969, linking
scientific and academic researchers across the United States.
 The Internet consists of many local, regional, national, and international networks. Both public and private
organization own networks on the Internet. These networks, along with phone companies, cable and satellite
companies, and the government, all contribute toward the internal structure of the Internet.
 The popular term for the Internet is the “information highway”. Rather than moving through geographical
space, it moves your ideas and information through cyberspace – the space of electronic movement of ideas
and information.
CONNECTING TO THE INTERNET
 Users can connect their computers and mobile devices to
2
the Internet through wired or wireless technology and then
access its services free or for a fee. With wired connections, a
computer or device physically attaches via a cable or wire to
a communication device such as a modem, that transmits data
and other items over a transmission media to the Internet.

 Users often connect to the Internet via broadband Internet


service because of its fast data transfer speeds and its always-
on connection.

 Hot Spot is a wireless network that provides Internet


connections to mobile computers and devices. Although most
hot spots enable unrestricted or open access, some require
that users agree to terms of service, obtain a password or
perform some other action to connect the Internet.
Internet Service Provider (ISP) 2
An Internet Service Provider (ISP), often known as an Internet access
provider, is a company that provides free or paid Internet connection to
consumers and companies. ISPs (Internet Service Providers) often charge a
flat fee for an Internet connection, with consumers able to choose from a
range of plans based on desired speeds, capacity, and services.

Bandwidth is a measure of a network's capacity to send and receive data.


Data sizes are commonly expressed in megabytes and gigabytes.

 Megabyte (MB) is equal to approximately one million characters.


 Gigabyte (GB) is equal to approximately one billion characters.

MOBILE SERVICES PROVIDER
A mobile service provider, also known as a wireless data provider,
2
is an Internet service provider that provides wireless Internet access
to computers and mobile devices that have the necessary built-in
wireless capability, wireless modems, or other communications
devices that enable wireless connectivity. To communicate with a
mobile service provider, an antenna attached to or integrated into a
computer or device, wireless modem, or communications device
commonly delivers signals over the airways.
 Connected computers and gadgets use servers and clients, as well as
different wired and wireless transmission mediums, to send data
around the world. Your computer or device is a client on the
Internet, which may access data and services on several servers.
Phone lines are examples of wired transmission medium.
IP ADDRESSES and DOMAIN NAMES
 IP address, which stands for Internet Protocol address, is a series of
2
digits that uniquely identify the location of every computer or device
connected to the Internet or any other network.

DOMAIN NAMES
 IP address, which stands for Internet Protocol address, is a series of
digits that uniquely identify the location of every computer or device
connected to the Internet or any other network.

 The top-level domain (TLD) is the suffix of the domain name that
specifies the kind of organization linked with the domain. The table
below includes several prominent TLDs.
TOP LEVEL DOMAIN: 2
The top-level domain (TLD) is the suffix of the domain name that specifies the kind of organization linked with the domain.
The table below includes several prominent TLDs.
TLD Intended Purpose
.biz Businesses
.com Commercial organization, businesses, and
companies

.edu Educational institutions


.gov Government agencies
.mil Military organizations
.net Network providers or commercial companies
.org Nonprofit organizations
.pro Licensed professionals

The organization that approves and controls TLDs is the Public Technical Identifiers (PTI).
This nonprofit organization is an affiliate of ICANN which stands for Internet Corporation for
Assigned Names and Numbers.
The domain name system (DNS) is the method that the Internet uses to store domain names and
their corresponding IP addresses.
SERVICE OFFERED THROUGH 2
INTERNET
1. Electronic Mail (E-mail). Electronic mail is an electronic message that is transferred from one
computer to another computer through the internet. Here are some of the advantages of e-mail:
a. It is the cheapest and fastest mail service.
b. you can send any form of data like text, image, video, etc. c. physical presence or
recipient is not needed.
  d. It can be read anywhere in the world
 
2. Telenet. Telenet is an Internet service that allows a computer in another area to access a
computer in another location. A remote computer may be accessed from another place via Telenet.
 
3. File Transferring. The Internet allows for the downloading and uploading of massive amounts of
data. To upload or download files from a distant computer, we require an FTP Client application.
 
4. Video Conferencing. Video conferencing is an innovative Internet service that allows individuals
in various locations to converse by observing one other.
SERVICE OFFERED THROUGH 2
5.INTERNET
World Wide Web (WWW). This site has millions of pages of information on a variety of topics. There are
millions of information-provider websites on the internet. The Internet Address or Uniform Resource Locator
identifies each website (URL).
 
6. E-commerce. It is an Internet service that allows us to sell or purchase items. We may get it using
specialized websites. Electronic commerce sites are those that allow users to purchase and sell items on
their websites.
 
7. Electronic Fax (E-Fax). It is a service that allows users to send and receive faxes from one computer to
another. A computer with a modem, an e-fax application, and access to the internet is required to utilize the
electronic fax service.
 
8. Newsgroup. A newsgroup is one of the services given by the Internet that allows users to publish notes or
messages on a variety of topics.
 
9. Internet Relay Chat. It is also one of the most popular Internet services, allowing users in different regions
to exchange and receive instant messages. We may use Internet Relay Chat to transmit voice or text
messages.
EVOLUTION OF THE
WORLD WIDE WEB
Although the Internet was developed in the late 1960s, the World Wide Web (WWW) appeared
in the early 1990s as an easier way to access online information using a web browser.
 
The World Wide Web (WWW) is a system of interconnected hypertext documents accessed
through the internet. To access text, images, videos, and other multimedia tools online, one
must have an internet connection. Tim Berners-Lee and Robert Cailliau proposed the use of
hypertext to integrate information into the web as nodes; through a browser, users can view the
hypertext. In this way, World Wide Web was designed as the first web service.
EVOLUTION OF THE
WORLD WIDE WEB
Web 1.0: The Read-Only Web/ The
Hypertext Web
 Web 1.0 is the first generation of WWW and lasted between 1989
and 2005. Berners-Lee coined the term Web 1.0 and stated it as the
read-only web. Through read-only, internet users were only reading
information presented to them. It is less dynamic and less
interactive in comparison to what we currently have. The primary
aim of websites at this time was to make information public for
anyone and set up an online presence; web was mainly focused on
content delivery rather than interaction and production.
EVOLUTION OF THE WORLD WIDE WEB

WEB 2.0: The Read-Write Web/ The


Social Web
Web 2.0, or the read-write web, is more people-centric and
participative compared to its precursor. Unlike 1.0 version,
Web 2.0 allows more control to users and provides interaction.
At this point, the web has introduced a business revolution in
the computer industry; businesses have moved into the web
platform to introduce their services to more people.
Interaction in Web 2.0 is bidirectional; businesses publish
content, as do people. That is why Web 2.0 is also distinctly
called as the Social Web. Blogs and other social profiles
became popular at this time.
EVOLUTION OF THE WORLD WIDE WEB

Web 3.0: Executable Web/ The Semantic


Web 3.0 is known as the semantic web; it includes integration,
automation, data, and discovery. It encourages mobility and
globalization.
Through Web 3.0, users are allowed to find, share, and collaborate
among each other. The semantic web allows a person or a computer
to start off in one database, and then move through an unending set
of databases.
From Berners-Lee, “if HTML (Hypertext Markup Language) and the
Web made all the online documents look like one huge book, RDF,
schema, and inference languages will make all the data in the world
look like on huge database”.
EVOLUTION OF THE WORLD WIDE WEB

Web 4.0
Web 4.0

Web 4.0 is founded on the use of wireless communications.


Computers and mobile devices are utilized to connect people and
objects anytime and anywhere. An example of Web 4.0
technology is the GPS (Global Positioning System).
EVOLUTION OF THE WORLD WIDE WEB

Web 5.0
Currently, Web 5.0 is still progressing. This is defined as
linked, emotive, and symbolic web that promotes human-
computer interaction. To add, Web 5.0 is centered on
emotional connections with humans. It acts similarly to a
personal assistant. Technology and human contact have
grown inextricably linked. In this approach, they will pave
the path for a more customized experience, which will
attract an increasing number of individuals.
ETHICAL ISSUE A
GLIMPSE OF PRIVACY
Computer ethics  
 are defined as a “set of moral principles that govern an individual or a group
on what is acceptable behavior while using a computer.” It governs the
usage of computers and the sharing of information over the internet.

Some of the common issues of computer ethics is the violation of copyright


issues, accessing personal information of other people, confidentiality and
privacy issues, among other issues. These common issues are defined below.
Computer Ethics Issues

1.Ethics and Responsible Decision-Making. An IT student/practitioner/professional


should be made aware of their individual responsibility in making ethical decisions
associated with information security. Ethical decision-making is based on core character
values like trustworthiness, respect, responsibility, fairness, caring, and good
citizenship

2.Confidentiality & Privacy. Computers can be used to frighten, deceive, or swindle


victims metaphorically. Attorneys, government entities, and companies are increasingly
using piles of computer-generated data to confuse their audiences legally.

3.Piracy. This is the act of illegally reproducing or disseminating copyrighted material, such
as computer programs, books, music, and films, and other media.
Computer Ethics Issues
4. Fraud & Misuse.

The introduction of fake records into a computer system, theft of money by electronic methods, theft of
financial instruments, theft of services, and theft of valuable data are all examples of computer-related fraud.
 Billing for services not rendered
 Altering medical records
 Use of unlicensed staff
 Drug diversion (e.g. dispensing controlled substances with no legitimate medical purpose)
 Kickbacks and bribery
 Providing unnecessary services to members
Computer Ethics Issues

5. Liability.

An explicit warranty includes promises and affirmations made by


the software creator to the user concerning the nature and quality
of the application. Express warranties can be defined by
programmers or merchants. As a result, businesses must be
realistic when making claims and forecasts about the capabilities,
quality, and nature of their software or hardware. They should
think about the legal implications of their affirmative promises,
product demonstrations, and product descriptions. Every word
they say might be as legally binding as if it were written down.
Computer Ethics Issues

6. Patent and Copyright Law. A patent can safeguard an idea's unique


and confidential qualities. In comparison to copyright, obtaining a patent
is extremely difficult. Complete disclosure is necessary in the case of
computer software; the patent holder must publish all the specifics of a
program for a skilled programmer to develop the program.
Copyright law is an extremely powerful legal instrument for
safeguarding computer software, both before and after a security
incident. This sort of breach might involve the theft of data, computer
programs, documents, or other comparable materials. As a result, the
information security professional should be conversant with the
fundamentals of copyright law.
Computer Ethics Issues

7. Trade Secrets. A trade secret safeguards


something valuable and beneficial. This
legislation safeguards the unique and private
elements of ideas that are known only to the
discoverer and his/her confidants. Once revealed,
the trade secret is no longer a secret following
laws. The use of trade secret legislation is
especially crucial in the computer industry,
where even a little head start in the creation of
software or hardware can give a major
competitive advantage.
Computer Ethics Issues

8. Sabotage.

The computer can be the object of attack in


computer crimes such as the unauthorized use
of computer facilities, alternation or destruction
of information, data file sabotage, and
vandalism against a computer system.
Computers have been shot, stabbed, short-
circuited, and bombed, which affects their
performance,
Protecting Yourself while using INTERNET

1. Educating Children/Teens
For parents and or older siblings, talk to and teach your children/younger siblings about the perils
of the internet and the threats of cyber predators. Tell them not to meet people they met online in
person and not to chat to people they do not know. Discuss the significance of not sharing
identifying information, sensitive information, images, or details about forthcoming events on the
internet.
Make sure kids realize that what they see on the internet may not be accurate. Teach children that
anything they put online is public unless they properly regulate the privacy settings. Spend time on
the internet with your kid, learn about their favorite online sites, know their passwords, restrict the
amount of time they spend online, and consider putting the computer in a public area of the house.
Examine your child's PC and emails on a regular basis. Know who your kids/siblings are chatting
with online
Protecting Yourself while using INTERNET

2. EMAILS, PHISHING, and MALWARE


When opening emails from unfamiliar individuals or sources, especially when they are
unsolicited, use caution. By clicking on links or downloading attachments, you risk infecting
your computer with a virus or being a victim of fraud, malware, or a scam. Some viruses can
destroy your computer, while others can steal your personal information and, eventually,
your identity. When you get emails that appear to be from your bank or another financial
institution, be suspicious,
especially if they require you to verify or submit personal or financial information. Be wary
of scams that employ email links to take you to a website or provide you with a phone
number to call. Some email links might be deceptive. Consider entering your own link to the
banks and corporations, or search for them.
Protecting Yourself while using INTERNET

3. PARENTAL CONTROLS

To limit internet access to safe websites, parents should


consider using parental controls through their internet
service provider and/or blocking software on family
computers and smartphones. If you have any questions,
please contact your internet service provider. Research
your options when it comes to parental controls on
different items.
Protecting Yourself while using INTERNET

4. PASSWORD
Make secure passwords with at least 10 (ten) characters and a mix of
upper-case letters, lower-case letters, symbols, and digits. Personal
information should not be included. When dealing with sensitive
information, consider changing your password at least every 90 days
(approximately 3 months). Passwords should never be left near your
computer or in plain sight. Use multiple passwords for different online
activity since if one is compromised, all are vulnerable. Never give
out your password. If you are offered the option of setting up a
password "hint" on an account, do not use something that others may
simply guess.
Protecting Yourself while using INTERNET

5. PERSONAL INFORMATION
Think twice before posting anything online or sending information in an email.
Anyone can see what you publish online. Sharing personal information with
someone you don't know is one of the most dangerous things you can do online.
Sharing sensitive information like your address, phone number, family members'
names, car information, passwords, work history, credit status, social security
numbers, birth date, school names, passport information, driver's license
numbers, insurance policy numbers, loan numbers, credit/ debit card numbers,
PIN numbers, and bank account information is dangerous and should be avoided.
Consider deleting your name from websites that disclose your personal
information gathered from public records with everyone on the internet
(including your phone number, address, social media avatars, and images).
Protecting Yourself while using INTERNET

6. PHOTOS
Photos taken with cellphones include GPS coordinates, which allow
people to decide the position of the photograph and may be used to
locate you. When uploading images to online social networking sites,
keep this in mind. Remember that photographs you upload online can
be copied, edited, and shared with many people without your
knowledge or agreement, unless you use privacy settings to limit who
can
see them.
Protecting Yourself while using INTERNET

7. PUBLIC COMPUTERS

Avoid typing sensitive information on public computers,


such as those in a public library or an internet café.
Spyware may be installed on these computers that record
your every keystroke. Also, you never know who may be
watching your activity. Never select the feature that
automatically signs you on to email or check any box to
“Remember my Password” on websites
Protecting Yourself while using INTERNET

8. SELLING

Beware of selling and listing items in local ads or


elsewhere online. Never meet someone alone. If
necessary, consider meeting in a public place, like a post
office or bank rather than a parking lot. Beware of posting
photos taken from smartphones for online adds. You could
be sharing your home address with a criminal.
 
Protecting Yourself while using INTERNET

9. SHOPPING
Avoid purchasing products and services from websites that do not
have a secure check-out using “HTTPS (Hypertext Transfer Protocol
Secure).” Pay attention to checkout page’s address line; the checkout
page asks you to enter your credit card information. If the checkout
page does not have an “S” after “HTTP”, consider shopping
elsewhere. Be warned that certain information transferred on HTTP
pages is in plain text, which computer hackers may intercept.
Protecting Yourself while using INTERNET

10. SOCIAL

Be wary about meeting somebody in person who you met


on the internet or over email. Not everyone is truthful
about their identity, age, gender, or objectives. Do your
investigation using public documents if required, and
consider finding reliable recommendations. If you decide
to meet someone, never travel alone, notify others of your
plans, meet in a public spot, and have your mobile phone
nearby.
Protecting Yourself while using INTERNET

11. UPDATES
Keep your computer’s operating system,
browsers, antivirus, and other software up
to date with the latest or daily security
patches.
Protecting Yourself while using INTERNET

12. WEBCAMS
Be careful when using webcams. These devices can be high-jacked
and turned on remotely. This allows others to illegally view and listen
to individuals without their knowledge. Consider turning them off
or disconnecting them when not in use. Limit or do not allow your
children to use webcams and talk to them about the risks.
Protecting Yourself while using INTERNET

13. WIRELESS
Beware when connecting your laptops or mobile devices
to any unsecured networks. Computer hackers on the
same network can intercept your internet use; in some
cases, they can also access files on your computer. To add,
consider password protecting your home wireless network
and using a personal firewall program for added
protection.

You might also like