0% found this document useful (0 votes)
20 views50 pages

Internet Security

Uploaded by

dixonlinggayo29
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views50 pages

Internet Security

Uploaded by

dixonlinggayo29
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 50

Stephen David Job Molina

INTERNET
What is Internet?

The Internet is a vast network that connects computers all over


the world. Through the Internet, people can share information
and communicate from anywhere with an Internet connection.
History of Internet

 Origins in ARPANET (1960s-1970s):


- The internet traces its roots to ARPANET, a project funded by the U.S. Department of
Defense's Advanced Research Projects Agency (ARPA) in the late 1960s. Its goal was to create a
decentralized communication network that could withstand a nuclear attack.
- ARPANET was the first network to use the TCP/IP (Transmission Control Protocol/Internet
Protocol) suite, a set of protocols that became the foundation of the modern internet.
History of Internet

 Expansion and Diversification (1980s):


- Throughout the 1980s, ARPANET expanded and evolved into a network
linking universities, research institutions, and government agencies.
- Other networks, such as CSNET (Computer Science Network) and NSFNET
(National Science Foundation Network), emerged during this period, further
expanding the reach of computer networking.
History of Internet

 Commercialization and the World Wide Web (1990s):


- The 1990s saw the commercialization of the internet and the development of
the World Wide Web (WWW) by British computer scientist Tim Berners-Lee at
CERN (European Organization for Nuclear Research) in 1989.
- The WWW introduced the concept of hyperlinked documents accessible via
the internet, revolutionizing information sharing and communication.
- Web browsers like Mosaic and Netscape Navigator made the WWW
accessible to the general public, leading to explosive growth in internet usage.
History of Internet

 Dot-Com Boom and Bust (late 1990s-early 2000s):


- The late 1990s saw the rise of the dot-com boom, characterized by rapid
growth in internet-based companies and investment in internet infrastructure.
- However, the boom was followed by a crash in the early 2000s, resulting in
the collapse of many internet companies and a period of consolidation in the
industry.
History of Internet

 Web 2.0 and Social Media (2000s):


- The 2000s witnessed the emergence of Web 2.0, a term coined to describe a
new generation of internet-based services characterized by user-generated content,
social networking, and interactive web applications.
- Platforms like Facebook, YouTube, and Twitter revolutionized how people
connect, share Information, and collaborate online.
History of Internet

 Web 2.0 and Social Media (2000s):


- The 2000s witnessed the emergence of Web 2.0, a term coined to describe a
new generation of internet-based services characterized by user-generated content,
social networking, and interactive web applications.
- Platforms like Facebook, YouTube, and Twitter revolutionized how people
connect, share Information, and collaborate online.
History of Internet

 Mobile Internet and the Internet of Things (IoT) (2010s):


- The proliferation of smartphones and tablets in the 2010s led to a shift
towards mobile internet usage, with more people accessing the internet on
mobile devices than on desktop computers.
- The Internet of Things (IoT) emerged as a new paradigm, connecting
everyday objects and devices to the internet, enabling greater automation and
data exchange.
History of Internet

 Current Trends and Future Directions:


- Today, the internet continues to evolve with advancements in
technologies like artificial intelligence, blockchain, and 5G networking.
- Issues such as net neutrality, online privacy, and cybersecurity remain
important topics of debate, shaping the future direction of the internet.
How Internet Works
How Internet Works

The internet is a global network of interconnected computers and devices


that communicate with each other using standardized protocols and technologies. At
its core, the internet operates on a client-server model, facilitated by a system of
networks, servers, and clients.
Overview of Internet

 Networks:
- Networks are the fundamental building blocks of the internet. They are composed of
interconnected devices, such as computers, routers, switches, and servers, that are linked together to
facilitate communication and data exchange.
- Networks can be categorized into local area networks (LANs), which cover a small
geographical area like a home, office, or campus, and wide area networks (WANs), which span larger
geographical areas and may consist of interconnected LANs, as well as links between cities or
countries.
- The internet itself is a massive global WAN that connects millions of networks worldwide.
Overview of Internet
Overview of Internet

 Servers:
- Servers are powerful computers or software systems that store and manage
resources, services, and data on the internet.
- They respond to requests from clients by providing access to resources such
as web pages, files, email, and databases.
- Servers are typically optimized for high-performance and reliability, and
they often operate continuously to ensure constant availability.
Overview of Internet

 Clients:
- Clients are devices, such as computers, smartphones, tablets, and IoT
devices, that request and consume resources and services from servers.
- Clients initiate communication with servers by sending requests for specific
resources or services, such as accessing a web page, sending an email, or
downloading a file.
- Web browsers, email clients, and mobile apps are common examples of
client software that users interact with to access internet services.
Overview of Internet
Overview of Internet

 Communication Protocols:
- Communication between clients and servers on the internet is governed by protocols,
which are sets of rules and conventions that define how data is formatted, transmitted, and received.
- The most widely used protocol suite on the internet is TCP/IP (Transmission Control
Protocol/Internet Protocol), which provides a reliable, connection-oriented method for transmitting
data across networks.
- Other protocols, such as HTTP (Hypertext Transfer Protocol) for web browsing, SMTP
(Simple Mail Transfer Protocol) for email, and FTP (File Transfer Protocol) for file transfer, operate
on top of TCP/IP to enable specific types of communication and services.
Overview of Internet
Summary

The internet operates on a client-server model, where clients request


resources and services from servers over interconnected networks using
standardized communication protocols. This system enables the
seamless exchange of information and the delivery of a wide range of
services that we rely on in our daily lives.
Key Components of the Internet
Key Components of the Internet

 Protocols
- Protocols are sets of rules and conventions that govern how data is
formatted, transmitted, and received over networks. They ensure that devices
can communicate effectively with each other.
- The most fundamental protocol suite used on the internet is TCP/IP
(Transmission Control Protocol/Internet Protocol), which provides reliable
and standardized communication between devices.
Key Components of the Internet

 Browsers:
- Web browsers are software applications that allow users to access and view content on the
World Wide Web (WWW).
- Browsers interpret and render HTML (Hypertext Markup Language), CSS (Cascading Style
Sheets), and JavaScript code to display web pages.
- Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge, Safari,
and Opera.
Key Components of the Internet

 Websites:
- Websites are collections of related web pages and multimedia content that
are hosted on web servers and accessible via the internet.
- A website may contain static content, such as text, images, and videos, as
well as dynamic content generated by server-side scripts or client-side
scripts.
- Websites serve various purposes, including providing information,
conducting e-commerce, delivering entertainment, and facilitating communication.
Key Components of the Internet

 URLs (Uniform Resource Locators):


- URLs are addresses used to identify and locate resources on the internet,
such as web pages, files, and services.
- A URL consists of several components, including the protocol (e.g., http:// or
https://), the domain name (e.g., www.example.com), and the path to the specific
resource (e.g., /page1.html).
- URLs provide a standardized way for users and web browsers to navigate the
web and access specific content.
Key Components of the Internet

 IP Addresses:
- IP addresses are unique numerical identifiers assigned to devices connected to a
network.
- They enable devices to communicate with each other by identifying the source
and destination of data packets.
- There are two versions of IP addresses currently in use: IPv4 (Internet Protocol
version 4) and IPv6 (Internet Protocol version 6). IPv4 addresses are 32 bits long,
while IPv6 addresses are 128 bits long and were introduced to address the exhaustion
of IPv4 addresses.
Key Components of the Internet

 DNS (Domain Name System):


- DNS is a hierarchical decentralized system that translates human-readable
domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) that
computers use to locate and communicate with each other on the internet.
- DNS resolves domain names to IP addresses through a distributed network of
DNS servers, which store and manage domain name records (DNS records).
- DNS plays a crucial role in making the internet more user-friendly by allowing
users to access websites using memorable domain names rather than numerical
IP addresses.
Summary

The internet consists of various interconnected components, including protocols for


communication, web browsers for accessing content, websites for hosting and sharing
information, URLs for addressing resources, IP addresses for device identification, and
DNS for translating domain names into IP addresses. These components work together
to enable the seamless exchange of data and services across the internet.
The Internet Society Impact
The Internet Society Impact

 Communication:
- The internet has revolutionized communication by enabling instant, global
connectivity between individuals and groups.
- Email, instant messaging, social media platforms, and video conferencing
have made it easier and faster to exchange messages, share information, and
collaborate across geographical boundaries.
- Social media platforms like Facebook, Twitter, Instagram, and LinkedIn
have changed the way people interact, connect, and share experiences, fostering
new forms of social engagement and community building.
The Internet Society Impact

 Education:
- The internet has democratized access to education by providing vast amounts
of information and educational resources online.
- E-learning platforms, online courses, and virtual classrooms offer flexible
learning opportunities for people of all ages and backgrounds.
- Distance learning programs enable students to pursue higher education and
professional development remotely, breaking down barriers to learning and
expanding educational access.
The Internet Society Impact

 Commerce:
- E-commerce has reshaped the way goods and services are bought and sold,
leading to the rise of online marketplaces like Amazon, eBay, and Alibaba.
- Online banking and payment systems have made financial transactions more
convenient and secure, facilitating electronic payments and money transfers.
- Digital marketing strategies, such as search engine optimization (SEO),
social media marketing, and targeted advertising, have transformed how businesses
promote their products and reach customers.
The Internet Society Impact

 Entertainment:
- The internet has revolutionized entertainment by providing on-demand access to a wide
range of content, including music, movies, TV shows, games, and live streaming.
- Streaming services like Netflix, Spotify, YouTube, and Twitch have disrupted
traditional media distribution models, offering personalized and immersive entertainment
experiences.
- User-generated content platforms, such as TikTok, YouTube, and Instagram, have
empowered individuals to create and share their own content, democratizing creativity and
expression.
Summary

Overall, the internet has had a transformative impact on society,


empowering individuals, expanding access to information and opportunities, and
reshaping industries and cultural practices. While it has brought about numerous
benefits, the internet has also raised concerns about privacy, security, digital
divide, and the proliferation of misinformation and online harassment,
highlighting the need for responsible use and regulation to ensure its continued
positive impact on society.
Internet Security
Online Threats

 Virus
 Malware
 Phishing
 Identity Theft
Virus

Computer viruses aim to disrupt systems, cause major operational issues, and
result in data loss and leakage. A key thing to know about computer viruses is that
they are designed to spread across programs and systems. Computer viruses
typically attach to an executable host file, which results in their viral codes
executing when a file is opened. The code then spreads from the document or
software it is attached to via networks, drives, file-sharing programs, or infected
email attachments.
Common Sign of Virus

 Speed of System
 Pop-up Windows
 Programs Self-executing
 Accounts Being Logged Out
 Crashing of the Device
 Mass Emails Being Sent from Your Email Account
 Changes to Your Homepage
How to Prevent from Virus

 Use a Trusted Antivirus Product


 Avoid Clicking Pop-up Advertisements
 Scan Your Email Attachments
 Scan the Files That You Download Using File-sharing Programs
Malware

Malware, or malicious software, is any program or file that is intentionally


harmful to a computer, network or server. Types of malware include computer
viruses, worms, Trojan horses, ransomware and spyware. These malicious programs
steal, encrypt and delete sensitive data; alter or hijack core computing functions and
monitor end users' computer activity.
Types of Malware

 Worm
 Trojan Horse
 Spyware
 Ransomware
 Backdoor
 Adware
 Keyloggers
How to Detect Malware

Users may be able to detect malware if they observe unusual activity such as a
sudden loss of disk space, unusually slow speeds, repeated crashes or freezes, or an
increase in unwanted internet activity and pop-up advertisements.
Phishing

Is a cybercrime in which a target or targets are contacted by email,


telephone or text message by someone posing as a legitimate institution to
lure individuals into providing sensitive data such as personally identifiable
information, banking and credit card details, and passwords.
Common Feature of Phishing

 Too Good to be True


 Sense of Urgency
 Hyperlink
 Attachments
 Unusual Sender
Phishing Example
Identity Theft

Identity theft, identity piracy or identity infringement occurs when someone


uses another's personal identifying information, like their name, identifying number,
or credit card number, without their permission, to commit fraud or other crimes.
Types of Identity Theft

Financial Identity Theft


Financial identity theft occurs when someone uses another person's identity
or information to obtain credit, goods, services, or benefits. This is the most
common form of identity theft
Types of Identity Theft

Social Security Identity Theft


If identity thieves obtain your Social Security number, they can use it to
apply for credit cards and loans and then not pay outstanding balances. Fraudsters
can also use your number to receive medical, disability, and other benefits.
Types of Identity Theft

Synthetic Identity Theft


is a type of fraud in which a criminal combines real (usually stolen) and fake
information to create a new identity. This new identity is used to open fraudulent
accounts and make fraudulent purchases. Synthetic identity theft allows the criminal
to steal money from credit card companies and lenders who extend them credit
based on the fake identity.
How to be safe in the Internet

 Using strong, unique passwords for each online account.


 Avoiding clicking on suspicious links or downloading files from unknown sources.
 Being cautious when sharing personal information online, especially on social media.
 Keeping software and antivirus programs updated.
 Using secure and reputable websites for online transactions.

You might also like