Internet Security
Internet Security
INTERNET
What is Internet?
Networks:
- Networks are the fundamental building blocks of the internet. They are composed of
interconnected devices, such as computers, routers, switches, and servers, that are linked together to
facilitate communication and data exchange.
- Networks can be categorized into local area networks (LANs), which cover a small
geographical area like a home, office, or campus, and wide area networks (WANs), which span larger
geographical areas and may consist of interconnected LANs, as well as links between cities or
countries.
- The internet itself is a massive global WAN that connects millions of networks worldwide.
Overview of Internet
Overview of Internet
Servers:
- Servers are powerful computers or software systems that store and manage
resources, services, and data on the internet.
- They respond to requests from clients by providing access to resources such
as web pages, files, email, and databases.
- Servers are typically optimized for high-performance and reliability, and
they often operate continuously to ensure constant availability.
Overview of Internet
Clients:
- Clients are devices, such as computers, smartphones, tablets, and IoT
devices, that request and consume resources and services from servers.
- Clients initiate communication with servers by sending requests for specific
resources or services, such as accessing a web page, sending an email, or
downloading a file.
- Web browsers, email clients, and mobile apps are common examples of
client software that users interact with to access internet services.
Overview of Internet
Overview of Internet
Communication Protocols:
- Communication between clients and servers on the internet is governed by protocols,
which are sets of rules and conventions that define how data is formatted, transmitted, and received.
- The most widely used protocol suite on the internet is TCP/IP (Transmission Control
Protocol/Internet Protocol), which provides a reliable, connection-oriented method for transmitting
data across networks.
- Other protocols, such as HTTP (Hypertext Transfer Protocol) for web browsing, SMTP
(Simple Mail Transfer Protocol) for email, and FTP (File Transfer Protocol) for file transfer, operate
on top of TCP/IP to enable specific types of communication and services.
Overview of Internet
Summary
Protocols
- Protocols are sets of rules and conventions that govern how data is
formatted, transmitted, and received over networks. They ensure that devices
can communicate effectively with each other.
- The most fundamental protocol suite used on the internet is TCP/IP
(Transmission Control Protocol/Internet Protocol), which provides reliable
and standardized communication between devices.
Key Components of the Internet
Browsers:
- Web browsers are software applications that allow users to access and view content on the
World Wide Web (WWW).
- Browsers interpret and render HTML (Hypertext Markup Language), CSS (Cascading Style
Sheets), and JavaScript code to display web pages.
- Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge, Safari,
and Opera.
Key Components of the Internet
Websites:
- Websites are collections of related web pages and multimedia content that
are hosted on web servers and accessible via the internet.
- A website may contain static content, such as text, images, and videos, as
well as dynamic content generated by server-side scripts or client-side
scripts.
- Websites serve various purposes, including providing information,
conducting e-commerce, delivering entertainment, and facilitating communication.
Key Components of the Internet
IP Addresses:
- IP addresses are unique numerical identifiers assigned to devices connected to a
network.
- They enable devices to communicate with each other by identifying the source
and destination of data packets.
- There are two versions of IP addresses currently in use: IPv4 (Internet Protocol
version 4) and IPv6 (Internet Protocol version 6). IPv4 addresses are 32 bits long,
while IPv6 addresses are 128 bits long and were introduced to address the exhaustion
of IPv4 addresses.
Key Components of the Internet
Communication:
- The internet has revolutionized communication by enabling instant, global
connectivity between individuals and groups.
- Email, instant messaging, social media platforms, and video conferencing
have made it easier and faster to exchange messages, share information, and
collaborate across geographical boundaries.
- Social media platforms like Facebook, Twitter, Instagram, and LinkedIn
have changed the way people interact, connect, and share experiences, fostering
new forms of social engagement and community building.
The Internet Society Impact
Education:
- The internet has democratized access to education by providing vast amounts
of information and educational resources online.
- E-learning platforms, online courses, and virtual classrooms offer flexible
learning opportunities for people of all ages and backgrounds.
- Distance learning programs enable students to pursue higher education and
professional development remotely, breaking down barriers to learning and
expanding educational access.
The Internet Society Impact
Commerce:
- E-commerce has reshaped the way goods and services are bought and sold,
leading to the rise of online marketplaces like Amazon, eBay, and Alibaba.
- Online banking and payment systems have made financial transactions more
convenient and secure, facilitating electronic payments and money transfers.
- Digital marketing strategies, such as search engine optimization (SEO),
social media marketing, and targeted advertising, have transformed how businesses
promote their products and reach customers.
The Internet Society Impact
Entertainment:
- The internet has revolutionized entertainment by providing on-demand access to a wide
range of content, including music, movies, TV shows, games, and live streaming.
- Streaming services like Netflix, Spotify, YouTube, and Twitch have disrupted
traditional media distribution models, offering personalized and immersive entertainment
experiences.
- User-generated content platforms, such as TikTok, YouTube, and Instagram, have
empowered individuals to create and share their own content, democratizing creativity and
expression.
Summary
Virus
Malware
Phishing
Identity Theft
Virus
Computer viruses aim to disrupt systems, cause major operational issues, and
result in data loss and leakage. A key thing to know about computer viruses is that
they are designed to spread across programs and systems. Computer viruses
typically attach to an executable host file, which results in their viral codes
executing when a file is opened. The code then spreads from the document or
software it is attached to via networks, drives, file-sharing programs, or infected
email attachments.
Common Sign of Virus
Speed of System
Pop-up Windows
Programs Self-executing
Accounts Being Logged Out
Crashing of the Device
Mass Emails Being Sent from Your Email Account
Changes to Your Homepage
How to Prevent from Virus
Worm
Trojan Horse
Spyware
Ransomware
Backdoor
Adware
Keyloggers
How to Detect Malware
Users may be able to detect malware if they observe unusual activity such as a
sudden loss of disk space, unusually slow speeds, repeated crashes or freezes, or an
increase in unwanted internet activity and pop-up advertisements.
Phishing