Chapter 2 Living It Era
Chapter 2 Living It Era
Chapter 2 Living It Era
BLACKMAIL
What about the word behind these
pictures?
ANSWER
SUPERHIGHWAY
What about the word behind these two
pictures?
ANSWER
CYBERCRIME
MODULE OVERVIEW
In this chapter, we will discuss the evolution of the Internet
along with many ways to connect to the Internet, how data
travels the Internet, and how the Internet works with domain
names and IP Addresses. It also introduces services available
on the Internet, such as email, video conferencing, telenet, file
transferring, world wide web, ecommerce, newsgroup, and
internet relay chat. Finally, understand the ethical issues and
how you protect yourself while using the Internet.
OBJECTIVES
Explore the current breakthrough technologies and
disruptive innovations that have appeared over the past
few years.
Identify the different services offered through the web.
Appreciate the evolution of world wide web.
Understand the risk of putting your information over
the internet
In the internet, there are no sidewalks,
just a huge superhighway where
information freely flows through. If in
the real world we have the police or the
military to monitor us, the internet is
unmonitored making it one of the most
abused technology we use.
Introduction to INTERNET?
2
The internet is a worldwide collection of networks that connects millions of businesses, government agencies,
educational institutions, and individuals. Each of the networks on the Internet provides resources that add to
the abundance of goods, services, and information accessible via the Internet.
The Internet has its roots in a networking project started by the Pentagon’s Advanced Research Projects
Agency (ARPA), an agency of the U.S> Department of Defense. ARPA’s goal was to build a network that (a)
allowed scientists at different physical locations to share information and work together on military and
scientific projects and (b) could function even if part of the network were disabled or destroyed by a disaster
such as a nuclear attack. That network, called ARPANET, became functional in September 1969, linking
scientific and academic researchers across the United States.
The Internet consists of many local, regional, national, and international networks. Both public and private
organization own networks on the Internet. These networks, along with phone companies, cable and satellite
companies, and the government, all contribute toward the internal structure of the Internet.
The popular term for the Internet is the “information highway”. Rather than moving through geographical
space, it moves your ideas and information through cyberspace – the space of electronic movement of ideas
and information.
CONNECTING TO THE INTERNET
Users can connect their computers and mobile devices to
2
the Internet through wired or wireless technology and then
access its services free or for a fee. With wired connections, a
computer or device physically attaches via a cable or wire to
a communication device such as a modem, that transmits data
and other items over a transmission media to the Internet.
DOMAIN NAMES
IP address, which stands for Internet Protocol address, is a series of
digits that uniquely identify the location of every computer or device
connected to the Internet or any other network.
The top-level domain (TLD) is the suffix of the domain name that
specifies the kind of organization linked with the domain. The table
below includes several prominent TLDs.
TOP LEVEL DOMAIN: 2
The top-level domain (TLD) is the suffix of the domain name that specifies the kind of organization linked with the domain.
The table below includes several prominent TLDs.
TLD Intended Purpose
.biz Businesses
.com Commercial organization, businesses, and
companies
The organization that approves and controls TLDs is the Public Technical Identifiers (PTI).
This nonprofit organization is an affiliate of ICANN which stands for Internet Corporation for
Assigned Names and Numbers.
The domain name system (DNS) is the method that the Internet uses to store domain names and
their corresponding IP addresses.
SERVICE OFFERED THROUGH 2
INTERNET
1. Electronic Mail (E-mail). Electronic mail is an electronic message that is transferred from one
computer to another computer through the internet. Here are some of the advantages of e-mail:
a. It is the cheapest and fastest mail service.
b. you can send any form of data like text, image, video, etc. c. physical presence or
recipient is not needed.
d. It can be read anywhere in the world
2. Telenet. Telenet is an Internet service that allows a computer in another area to access a
computer in another location. A remote computer may be accessed from another place via Telenet.
3. File Transferring. The Internet allows for the downloading and uploading of massive amounts of
data. To upload or download files from a distant computer, we require an FTP Client application.
4. Video Conferencing. Video conferencing is an innovative Internet service that allows individuals
in various locations to converse by observing one other.
SERVICE OFFERED THROUGH 2
5.INTERNET
World Wide Web (WWW). This site has millions of pages of information on a variety of topics. There are
millions of information-provider websites on the internet. The Internet Address or Uniform Resource Locator
identifies each website (URL).
6. E-commerce. It is an Internet service that allows us to sell or purchase items. We may get it using
specialized websites. Electronic commerce sites are those that allow users to purchase and sell items on
their websites.
7. Electronic Fax (E-Fax). It is a service that allows users to send and receive faxes from one computer to
another. A computer with a modem, an e-fax application, and access to the internet is required to utilize the
electronic fax service.
8. Newsgroup. A newsgroup is one of the services given by the Internet that allows users to publish notes or
messages on a variety of topics.
9. Internet Relay Chat. It is also one of the most popular Internet services, allowing users in different regions
to exchange and receive instant messages. We may use Internet Relay Chat to transmit voice or text
messages.
EVOLUTION OF THE
WORLD WIDE WEB
Although the Internet was developed in the late 1960s, the World Wide Web (WWW) appeared
in the early 1990s as an easier way to access online information using a web browser.
The World Wide Web (WWW) is a system of interconnected hypertext documents accessed
through the internet. To access text, images, videos, and other multimedia tools online, one
must have an internet connection. Tim Berners-Lee and Robert Cailliau proposed the use of
hypertext to integrate information into the web as nodes; through a browser, users can view the
hypertext. In this way, World Wide Web was designed as the first web service.
EVOLUTION OF THE
WORLD WIDE WEB
Web 1.0: The Read-Only Web/ The
Hypertext Web
Web 1.0 is the first generation of WWW and lasted between 1989
and 2005. Berners-Lee coined the term Web 1.0 and stated it as the
read-only web. Through read-only, internet users were only reading
information presented to them. It is less dynamic and less
interactive in comparison to what we currently have. The primary
aim of websites at this time was to make information public for
anyone and set up an online presence; web was mainly focused on
content delivery rather than interaction and production.
EVOLUTION OF THE WORLD WIDE WEB
Web 4.0
Web 4.0
Web 5.0
Currently, Web 5.0 is still progressing. This is defined as
linked, emotive, and symbolic web that promotes human-
computer interaction. To add, Web 5.0 is centered on
emotional connections with humans. It acts similarly to a
personal assistant. Technology and human contact have
grown inextricably linked. In this approach, they will pave
the path for a more customized experience, which will
attract an increasing number of individuals.
ETHICAL ISSUE A
GLIMPSE OF PRIVACY
Computer ethics
are defined as a “set of moral principles that govern an individual or a group
on what is acceptable behavior while using a computer.” It governs the
usage of computers and the sharing of information over the internet.
3.Piracy. This is the act of illegally reproducing or disseminating copyrighted material, such
as computer programs, books, music, and films, and other media.
Computer Ethics Issues
4. Fraud & Misuse.
The introduction of fake records into a computer system, theft of money by electronic methods, theft of
financial instruments, theft of services, and theft of valuable data are all examples of computer-related fraud.
Billing for services not rendered
Altering medical records
Use of unlicensed staff
Drug diversion (e.g. dispensing controlled substances with no legitimate medical purpose)
Kickbacks and bribery
Providing unnecessary services to members
Computer Ethics Issues
5. Liability.
8. Sabotage.
1. Educating Children/Teens
For parents and or older siblings, talk to and teach your children/younger siblings about the perils
of the internet and the threats of cyber predators. Tell them not to meet people they met online in
person and not to chat to people they do not know. Discuss the significance of not sharing
identifying information, sensitive information, images, or details about forthcoming events on the
internet.
Make sure kids realize that what they see on the internet may not be accurate. Teach children that
anything they put online is public unless they properly regulate the privacy settings. Spend time on
the internet with your kid, learn about their favorite online sites, know their passwords, restrict the
amount of time they spend online, and consider putting the computer in a public area of the house.
Examine your child's PC and emails on a regular basis. Know who your kids/siblings are chatting
with online
Protecting Yourself while using INTERNET
3. PARENTAL CONTROLS
4. PASSWORD
Make secure passwords with at least 10 (ten) characters and a mix of
upper-case letters, lower-case letters, symbols, and digits. Personal
information should not be included. When dealing with sensitive
information, consider changing your password at least every 90 days
(approximately 3 months). Passwords should never be left near your
computer or in plain sight. Use multiple passwords for different online
activity since if one is compromised, all are vulnerable. Never give
out your password. If you are offered the option of setting up a
password "hint" on an account, do not use something that others may
simply guess.
Protecting Yourself while using INTERNET
5. PERSONAL INFORMATION
Think twice before posting anything online or sending information in an email.
Anyone can see what you publish online. Sharing personal information with
someone you don't know is one of the most dangerous things you can do online.
Sharing sensitive information like your address, phone number, family members'
names, car information, passwords, work history, credit status, social security
numbers, birth date, school names, passport information, driver's license
numbers, insurance policy numbers, loan numbers, credit/ debit card numbers,
PIN numbers, and bank account information is dangerous and should be avoided.
Consider deleting your name from websites that disclose your personal
information gathered from public records with everyone on the internet
(including your phone number, address, social media avatars, and images).
Protecting Yourself while using INTERNET
6. PHOTOS
Photos taken with cellphones include GPS coordinates, which allow
people to decide the position of the photograph and may be used to
locate you. When uploading images to online social networking sites,
keep this in mind. Remember that photographs you upload online can
be copied, edited, and shared with many people without your
knowledge or agreement, unless you use privacy settings to limit who
can
see them.
Protecting Yourself while using INTERNET
7. PUBLIC COMPUTERS
8. SELLING
9. SHOPPING
Avoid purchasing products and services from websites that do not
have a secure check-out using “HTTPS (Hypertext Transfer Protocol
Secure).” Pay attention to checkout page’s address line; the checkout
page asks you to enter your credit card information. If the checkout
page does not have an “S” after “HTTP”, consider shopping
elsewhere. Be warned that certain information transferred on HTTP
pages is in plain text, which computer hackers may intercept.
Protecting Yourself while using INTERNET
10. SOCIAL
11. UPDATES
Keep your computer’s operating system,
browsers, antivirus, and other software up
to date with the latest or daily security
patches.
Protecting Yourself while using INTERNET
12. WEBCAMS
Be careful when using webcams. These devices can be high-jacked
and turned on remotely. This allows others to illegally view and listen
to individuals without their knowledge. Consider turning them off
or disconnecting them when not in use. Limit or do not allow your
children to use webcams and talk to them about the risks.
Protecting Yourself while using INTERNET
13. WIRELESS
Beware when connecting your laptops or mobile devices
to any unsecured networks. Computer hackers on the
same network can intercept your internet use; in some
cases, they can also access files on your computer. To add,
consider password protecting your home wireless network
and using a personal firewall program for added
protection.