What is Internet The Internet is a worldwide

  • Slides: 43
Download presentation
What is Internet? The Internet is a worldwide, publicly accessible series of interconnected computer

What is Internet? The Internet is a worldwide, publicly accessible series of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked web pages and other resources of the World Wide Web (WWW). www. Assignment. Point. com

What is intranet? An intranet is a private computer network that uses Internet protocols

What is intranet? An intranet is a private computer network that uses Internet protocols (IP) and network connectivity to securely share part of an organization's information within its members and users. n Intranet is basically "a private version of an Internet, " or a version of the Internet confined to an organization. n www. Assignment. Point. com

What is the difference between WWW and Internet? n The Internet and the World

What is the difference between WWW and Internet? n The Internet and the World Wide Web are not synonymous. The Internet is a collection of interconnected computer networks. In contrast, the WWW is a collection of interconnected documents and other resources. The World Wide Web is one of the services accessible via the Internet, along with various others including e-mail, file sharing, online gaming and others. www. Assignment. Point. com

Who is the owner of the Internet? No one owns the internet n It

Who is the owner of the Internet? No one owns the internet n It is a public cooperative and independent network that is regulated by n n W 3 C (World Wide Web Consortium ) ( n W 3 C oversees research , sets standards & guidelines n I 2 (Internet 2) ( n I 2 conducts internet related research. It also conducts development projects. It develops and tests advanced Internet technologies www. Assignment. Point. com

How can one connect to the Internet? Slow-speed technology Dial-up access modem in your

How can one connect to the Internet? Slow-speed technology Dial-up access modem in your computer uses a standard telephone line to connect to the Internet Connection must be established each time you log on. High-speed connection Digital subscriber line (DSL), cable telephone Internet services (CATV), cable modem provide connections Connection is always on— whenever the computer is running www. Assignment. Point. com

What are the different options for connecting? n Existing telephone line n Cable television

What are the different options for connecting? n Existing telephone line n Cable television line n Personal satellite link n Wireless or cell phone service n High-speed telephone services n ISDN, DSL www. Assignment. Point. com

A brief history of Internet ARPANET Goal: To allow scientists at different locations to

A brief history of Internet ARPANET Goal: To allow scientists at different locations to share information Networking project by Pentagon’s Advanced Research Projects Agency (ARPA) Goal: To function if part of network were disabled Became functional September 1969 www. Assignment. Point. com

What is an E-mail? n n E-mail, short for electronic mail and often abbreviated

What is an E-mail? n n E-mail, short for electronic mail and often abbreviated to e-mail, email or simply mail, is a store and forward method of composing, sending and storing messages over electronic communication systems. Every email consists of n n n Message header Body of the message Many online service providers provide free email account for users n Gmail (www. gmail. com), Yahoo Mail (www. mail. yahoo. com), Hotmail (www. hotmail. com) www. Assignment. Point. com

What about forwarding and attaching in email? n Forwarding n n You can forward

What about forwarding and attaching in email? n Forwarding n n You can forward an email you received. The original message is either copied directly in the body or as attachment and send to some other email address you specify. You can add your own note during forwarding Attachment n An email attachment is a computer file which is sent along with an e-mail message. The file may be sent as a separate message or as part of the message to which it is attached. www. Assignment. Point. com

Junk/Spam E-mail n n Spam is unwanted email. Do not open a spam email.

Junk/Spam E-mail n n Spam is unwanted email. Do not open a spam email. Do not forward a spam email. Be very careful in opening a spam email. It is possible to figure out whether your email address is valid by sending spam. This can in turn be used to send more spam into your mailbox. Spam can be simply irritating as well as dangerous and harmful. Spam can carry virus. Spam emails can track your internet movements, steal your passwords, steal your bank accounts and money, and moreover cause real big problem for your life. Hence, the best line of defense is to delete spam as soon as you receive it. www. Assignment. Point. com

Netiquette n Netiquette is online jargon for “Internet etiquette”. Some of the professional etiquette

Netiquette n Netiquette is online jargon for “Internet etiquette”. Some of the professional etiquette includes: Do not send or forward spam Use uppercase and lowercase letters Check spelling Be careful what you send Be polite Be concise Be cautious with sarcasm and humor Use smileys cautiously : - ) Use the Bcc function for group mailings Don’t send replies to “all recipients” unless you want to so Don’t send huge attachments Explain all attachments in email body Stay alert for viruses Notify recipients of viruses www. Assignment. Point. com

IP and Domain Name n Each network device connected to the internet and intranet

IP and Domain Name n Each network device connected to the internet and intranet have a number given to it. This number is called IP (Internet Protocol). n The IP (Internet Protocol) is a protocol that uses datagrams to communicate over a packet-switched network. Text version of IP is called Domain Name n URL is unique address for a webpage. n www. Assignment. Point. com

Generic Top Level Domains aero - for the air transport industry. asia - for

Generic Top Level Domains aero - for the air transport industry. asia - for companies. organisations and individuals in the Asia-Pacific region. biz - for business use. cat - for Catalan language/culture. com - for commercial organizations, but unrestricted. coop - for cooperatives. edu - for post-secondary educational establishments. gov - for government entities within the United States at the federal, state, and local levels. info - for informational sites, but unrestricted. int - for international organizations established by treaty. jobs - for employment-related sites. mil - for the U. S. military. mobi - for sites catering to mobile devices. museum - for museums. name - for families and individuals. net - originally for network infrastructures, now unrestricted. org - originally for organizations now unrestricted. pro - for certain professions. tel - for services involving connections between the telephone network and the Internet www. Assignment. Point. com. travel - for travel agents, airlines, hoteliers, tourism bureaus, etc

Country Code top level domain n This list is extensive. You may view the

Country Code top level domain n This list is extensive. You may view the complete list from http: //en. wikipedia. org/wiki/Country_code_ top-level_domain. bd - bangladesh n. au – australia n. ca – canada n. in - india n www. Assignment. Point. com

Webpage, Website, Homepage, Web is another nickname for WWW n Each electronic document in

Webpage, Website, Homepage, Web is another nickname for WWW n Each electronic document in the web is called a webpage. n A website is a collection of related webpages. n The homepage (often written as home page) or main page is file that automatically loads when a web browser starts and when the browser's "home" button is pressed. n www. Assignment. Point. com

HTTP , Web Server, URL n n n HTTP (hypertext transfer protocol) is the

HTTP , Web Server, URL n n n HTTP (hypertext transfer protocol) is the protocol that allows web browsers to communicate with web servers. Web server is usually a computer program that is responsible for accepting HTTP requests and serving them HTTP responses along with optional data contents. Sometimes, a computer that runs such a computer program is called web server. URL (Uniform Resource Locator) is an internet address of a document on the web. www. Assignment. Point. com

Web Browser n Web Browser is the program that allows one to view Web

Web Browser n Web Browser is the program that allows one to view Web Pages. n n Example: Microsoft Internet Explorer, Mozilla Firefox, etc A web browser basically Fetched and displays web pages n Can Send data to web server for processing and can receive information from web server. n www. Assignment. Point. com

Downloading n Downloading is the process of a computer receiving information. The speed of

Downloading n Downloading is the process of a computer receiving information. The speed of downloading can vary for various reasons : internet connection speed, system’s ability to handle download, firewall, etc. www. Assignment. Point. com

Search Engine n n Search Engine is a software that searches for information and

Search Engine n n Search Engine is a software that searches for information and returns sites which provide that information. One of the most popular search engine today is Google n n www. google. com/ Google is so popular that the word google is used now to refer to searching. “ Google the word online”. This means search the world online. www. Assignment. Point. com

Search Portals At the height of the dotcom boom, web surfers had a plethora

Search Portals At the height of the dotcom boom, web surfers had a plethora of search engines to chose from: Atlavista, Excite, Infoseek, Lycos and many more. Today the major players of the past are mostly dead. n A few have soldiered on such as Ask. com but only after repeated redesign. n Google is so popular maybe because of its clean User Interface and high-quality search. n www. Assignment. Point. com

What are the basic types of websites? Portal n News n Informational n Business/marketing

What are the basic types of websites? Portal n News n Informational n Business/marketing n Educational n Entertainment n Advocacy n Personal n www. Assignment. Point. com

Contd… Ø Ø Ø Ø A Web site that offers a variety of services

Contd… Ø Ø Ø Ø A Web site that offers a variety of services from one convenient location is called a web portal. Example is www. yahoo. com News website is such a website that contains stories and articles relating to current or past events, life, money, sports, weather etc. Example is www. bdnews 24. com Informational website is such a website that contains factual information. Business/marketing website contains materials that promotes products. It may allow products to be purchased online through e-commerce. Example is www. ebay. com Entertainment website offers an interactive environment featuring music, video, sports, games, etc. Example is www. miniclip. com Advocacy website contain materials that state opinions, idea or content. Example is www. epinions. com Personal website is webpage maintained by individual. www. Assignment. Point. com

How are speed in a modem measured? n Speed is measured in terms of

How are speed in a modem measured? n Speed is measured in terms of bits per second n V. 90 – theoretical maximum speed of 56 Kbps modem n Even with perfect connection, a 56 Kbps modem tops out at about 44 Kbps n Slightly faster speeds may be available with the new V. 92 and V. 44 modem standards n Downstream vs. upstream www. Assignment. Point. com

What is DSL? n DSL (Digital Subscriber Line) is a highspeed, always-on, Internet access

What is DSL? n DSL (Digital Subscriber Line) is a highspeed, always-on, Internet access technology that runs over standard phone lines n Several versions exist – ADSL, SDSL, HDSL n x. DSL – refers to entire group of DSL technologies www. Assignment. Point. com

What is an ISP? n ISP is a company that provides Internet access to

What is an ISP? n ISP is a company that provides Internet access to businesses, organizations, and individuals n For example Bangladesh Online (BOL), Agni , Aftab IT, etc are some of the ISPs in Bangladesh www. Assignment. Point. com

How to select a password ? www. Assignment. Point. com

How to select a password ? www. Assignment. Point. com

What is T 1 and T 3 line? n T 1 n high-speed 1.

What is T 1 and T 3 line? n T 1 n high-speed 1. 544 Mbps digital network Popular for businesses and ISPs T 3 n Supports data rates of about 43 Mbps n Sometimes referred to as DS 3 (Digital Service -3) lines n Provide many of the links on the Internet backbone n Many US universities provide T 3 / T 1 line for free to its students, faculty and users n n www. Assignment. Point. com

What is a medium? n A medium is such that it can be used

What is a medium? n A medium is such that it can be used for presentation of information. n There are two ways to present some information n Unimedium n Multimedia presentation www. Assignment. Point. com

What is a multimedia computer system? n n A multimedia computer system is a

What is a multimedia computer system? n n A multimedia computer system is a computer system that has the capabilities to integrate two or more types of media for the purpose of generation, storage, representation, manipulation and access of multimedia information. Some of the components of multimedia include text, graphics, animation, audio, video, etc. Multimedia are used in presentation, video games, special effects, tv advertisements, natoks, cinema, etc www. Assignment. Point. com

Security Internet security is the techniques for ensuring that data stored in a computer

Security Internet security is the techniques for ensuring that data stored in a computer can not be compromised by any unauthorized individuals. n Most security measures involve data encryption and passwords. n Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. n A password is a secret word or phrase that gives a user access to a particular program or www. Assignment. Point. com system. n

Contd. . n Information Systems Security deals with n Security of end systems n

Contd. . n Information Systems Security deals with n Security of end systems n OS, files in a database, account information, logs, etc n Security of information in transit over a network n Ecommerce transaction, online banking, confidential email, file transfers, instant messaging etc www. Assignment. Point. com

What are the principles of computer security? n There are two principles. n Principle

What are the principles of computer security? n There are two principles. n Principle of easiest penetration: An intruder must be expected to use any available means of penetration. The penetration may not necessarily be by the most obvious means, nor is it necessarily the one against which the most solid defense has been installed. n Principle of adequate protection: Computer items must be protected only until they have absolutely lost their value. www. Assignment. Point. com

What are the types of Threats? n n n Interception n unauthorized party gaining

What are the types of Threats? n n n Interception n unauthorized party gaining access to an asset. Interruption n an asset of the system become lost, unavailable or unusable Modification n n not only unauthorized access, but also tampering with an asset Fabrication n addition of imaginary in information to a system www. Assignment. Point. com

MOM An attacker have n Method -- sufficient skill, tools and knowledge to initiate

MOM An attacker have n Method -- sufficient skill, tools and knowledge to initiate an attack n Opportunity -- Time and access to accomplish the attack n Motive -- Reasons to pursue the attack www. Assignment. Point. com

Security Goals n Confidentiality n n Integrity n n Resources can be accessed when

Security Goals n Confidentiality n n Integrity n n Resources can be accessed when needed by authorized means only Authenticity n n Assets can only be modified by authorized parties by authorized ways. Availability n n Resources stay hidden from unauthorized access It ensures that the sender of a message is correctly identified with an assurance that the identity is accurate Non-repudiation n It provides unforgivable evidence that a specific action has occurred. www. Assignment. Point. com

Vulnerabilities n Vulnerabilities exists in all three major categories of system Hardware Vulnerabilities n

Vulnerabilities n Vulnerabilities exists in all three major categories of system Hardware Vulnerabilities n Software Vulnerabilities n Data Vulnerabilities n www. Assignment. Point. com

Unsecured Wireless Network n Hackers can easily decrypt wireless signals that contain much of

Unsecured Wireless Network n Hackers can easily decrypt wireless signals that contain much of the network's information, such as the network's SSID (Service Set Identifier). An unsecured wireless network can lead to fraudulent activities. This can be very damaging for you. www. Assignment. Point. com

My recommendations n Use a good quality firewall n n Windows XP and Vista

My recommendations n Use a good quality firewall n n Windows XP and Vista comes preinstall with a built in firewall. However, these are not that good. I recommend using Norton Internet Security. Use a high quality antivirus n There are many antivirus in the market. I have been using Norton Antivirus for a long time. Norton Internet Security comes bundled with Norton Antivirus www. Assignment. Point. com

Contd. n Always clean your pc at least once a week to make sure

Contd. n Always clean your pc at least once a week to make sure cookies and clutters are gone n n CCleaner is a free software (freeware) available for download. It gets rid of all the unwanted junks from your computer Use a well known spyware remover n Lavasoft Adaware is really good for removing spywares. Use it occasionally. Best of all, it is free for private use www. Assignment. Point. com

Contd. . n Defragmenter n n Defragment your hard disk at least once a

Contd. . n Defragmenter n n Defragment your hard disk at least once a month. You can use the default windows defragmenter software to do this Be smart when you use your pc n n n Do not let any software to get installed unless you known the true identity of the software Try and avoid typing private details on public PCs, and always try and avoid visiting sites on public PCs that require you to enter your login details, e. g. An online banking account And before you enter you banking details, or any important passwords, delete your internet cookies and temporary internet files, as there maybe some that have the ability to track your personal information and what you type. www. Assignment. Point. com

Last Words: Internet Security – Just Wishful Thinking? n Thirty years into the personal

Last Words: Internet Security – Just Wishful Thinking? n Thirty years into the personal computer era, and it seems like security is only getting worse. Computer viruses and worms have proven as resilient as common cold. The web, e-mail and instant messaging have given criminals unprecedented opportunities for fraud, scams, and electronic spying. Now that we have built a digital world on an insecure foundation, the solution for security are really hard. Our digital world is built on a pack of insecure cards. www. Assignment. Point. com

ECommerce E-commerce describes financial transactions that are conducted electronically over a computer network n

ECommerce E-commerce describes financial transactions that are conducted electronically over a computer network n Pretty much every demographics from all the countries of the world use ecommerce. It is getting popular exponentially day by day n www. Assignment. Point. com

Definitions n B 2 B (Business to Business) e-commerce n n B 2 C

Definitions n B 2 B (Business to Business) e-commerce n n B 2 C (Business to Consumer) e-commerce n n typical e-commerce activities that the typical Web surfer enjoys C 2 C (Consumer to Consumer) e-commerce n n involves one enterprise buying goods and services from another enterprise includes online auctions and rummage sales B 2 G (Business to Government) e-commerce n aims to help businesses sell to governments www. Assignment. Point. com