0% found this document useful (0 votes)
1 views

DF Module - 2

Module 2 covers the fundamentals of computer networks, including types of networks (LANs, WANs, PANs), network devices (modems, routers, switches), and the evolution of networking technologies. It also addresses security aspects such as malware and prevention methods, as well as the importance of network performance and maintenance. The module emphasizes the significance of networking in modern communication, collaboration, and business operations.

Uploaded by

gurveersinghsyan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

DF Module - 2

Module 2 covers the fundamentals of computer networks, including types of networks (LANs, WANs, PANs), network devices (modems, routers, switches), and the evolution of networking technologies. It also addresses security aspects such as malware and prevention methods, as well as the importance of network performance and maintenance. The module emphasizes the significance of networking in modern communication, collaboration, and business operations.

Uploaded by

gurveersinghsyan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

Module 2: Computer Networks (10 Hours)

Introduction to Computer Networks, Evolution of Networking, types of networks,


Network devices - Modem, Ethernet card, RJ45, Repeater, Hub, Switch, Router,
and
Gateways, Identification of Nodes in a Network Communication, Internet, Web and
the Internet of Things, Domain Name Systems. Security Aspects- Threats and
Prevention, Malware - virus, Worms, Ransomware, Trojan, spyware, adware, key
loggers, Modes of Malware distribution, Antivirus, HTTP vs HTTPS Firewall,
Cookies,
Hackers and Crackers

Introduction to Computer Networks


A computer network is a system that connects two or more computing devices for
transmitting and sharing information. The devices on a network can be anything from
personal computers to printers to smartphones.

The main purpose of a computer network is to allow users to share resources, such as
files, printers, and internet access. Networks can also be used to communicate with
each other, play games, and collaborate on projects.

There are many different types of computer networks, but the two most common are
local area networks (LANs) and wide area networks (WANs).

● A LAN is a network that covers a small area, such as a home, office, or school.
LANs are typically used to connect computers and devices within a building or
campus.
● A WAN is a network that covers a large area, such as a city, state, or country.
WANs are typically used to connect LANs together, or to connect computers and
devices that are far apart.

Computer networks are essential for modern communication and collaboration. They
allow us to share information, work together on projects, and access resources from
anywhere in the world.

Here are some of the basic components of a computer network:

● Nodes: Nodes are the devices that are connected to the network. They can be
computers, printers, routers, switches, and other devices.
● Transmission media: Transmission media is the physical medium that carries
data between nodes. It can be wired, such as copper cables or optical fibers, or
wireless, such as radio waves or microwaves.
● Protocols: Protocols are the rules that govern how data is exchanged between
nodes. They ensure that data is transmitted correctly and reliably.
● Software: Software is used to manage and control the network. It includes
operating systems, network management software, and applications.

Computer networks are a complex and ever-evolving technology. However, the basic
principles of networking are relatively simple. By understanding these principles, you
can better understand how computer networks work and how to use them to your
advantage.

Here are some of the benefits of using computer networks:

● Resource sharing: Computer networks allow users to share resources, such as


files, printers, and internet access. This can save money and improve efficiency.
● Communication: Computer networks allow users to communicate with each
other, regardless of their location. This can be done through email, instant
messaging, video conferencing, and other applications.
● Collaboration: Computer networks allow users to collaborate on projects. This
can be done through shared documents, shared whiteboards, and other tools.
● Entertainment: Computer networks can be used to access entertainment content,
such as movies, music, and games.
● Business: Computer networks are essential for businesses of all sizes. They are
used to run operations, communicate with customers, and collaborate with
partners.

Evolution of Networking
The evolution of networking has been a long and gradual process, with many important
milestones along the way. Here are some of the key events in the evolution of
networking:

● 1962: The concept of packet switching is first proposed by Paul Baran. Packet
switching is a method of dividing data into small packets that are routed through
the network independently. This allows for more efficient and reliable data
transmission.
● 1969: The ARPANET is created. The ARPANET was the first packet-switched
network, and it is considered to be the predecessor to the internet.
● 1972: The first email is sent. Email is one of the most popular applications of
computer networking, and it has revolutionized the way we communicate.
● 1983: The internet is officially launched. The internet is a global network of
networks, and it has made it possible for people all over the world to connect and
communicate with each other.
● 1990: The World Wide Web is invented. The World Wide Web is a graphical user
interface for the internet, and it has made it possible for people to access and
share information more easily.
● 1993: The first commercial web browser is released. The release of the web
browser made it possible for anyone to access the World Wide Web, and it led to
the rapid growth of the internet.
● 2000: The first 3G mobile networks are launched. 3G mobile networks provide
faster data speeds and better quality of service than previous generations of
mobile networks.
● 2001: The first Wi-Fi networks are deployed. Wi-Fi is a wireless networking
technology that allows devices to connect to the internet without the need for
cables.
● 2010: The first 4G mobile networks are launched. 4G mobile networks provide
even faster data speeds than 3G networks.
● 2019: The first 5G mobile networks are launched. 5G mobile networks are the
latest generation of mobile networks, and they offer even faster data speeds and
lower latency than previous generations.

The evolution of networking is still ongoing, and there are many exciting new
developments on the horizon. Some of the areas of active research in networking
include:

● Network security: As networks become more complex, so too do the threats to


their security. Network security researchers are working on new ways to protect
networks from cyberattacks.
● Network congestion: As more and more devices connect to the internet, network
congestion is becoming a growing problem. Network congestion researchers are
working on new ways to improve the efficiency of networks and reduce
congestion.
● Network optimization: Network optimization researchers are working on new
ways to optimize the performance of networks. This includes finding ways to
improve the routing of data, reduce latency, and conserve energy.
● Network scalability: As networks continue to grow, it is important to ensure that
they can scale to meet the needs of users. Network scalability researchers are
working on new ways to make networks more scalable.

The evolution of networking is a fascinating and ever-changing field. It is a field that is


essential for the modern world, and it is sure to continue to evolve in the years to come.

types of networks
There are many different types of networks, but they can be broadly classified into three
categories:

● Personal area networks (PANs): PANs are small networks that connect devices
close to each other, such as computers, smartphones, and printers. PANs are
typically used to share files and printers, or to connect devices for gaming or
entertainment.
● Local area networks (LANs): LANs are larger networks that connect devices
within a building or campus. LANs are typically used to connect computers,
printers, and other devices so that users can share resources and communicate
with each other.
● Wide area networks (WANs): WANs are the largest type of networks. They
connect LANs and other networks over long distances, such as across cities,
states, or countries. WANs are typically used to connect businesses and
organizations, or to provide internet access to homes and businesses.

Here are some of the other types of networks:

● Metropolitan area networks (MANs): MANs are a type of WAN that covers a city
or metropolitan area. MANs are typically used to connect LANs and other
networks within a city.
● Wireless networks: Wireless networks use radio waves to transmit data between
devices. Wireless networks can be used to create PANs, LANs, and WANs.
● Storage area networks (SANs): SANs are a type of network that connects
storage devices, such as disk arrays and tape libraries. SANs are typically used
to provide high-performance storage for servers.
● Virtual private networks (VPNs): VPNs are a type of network that creates a
secure connection between two or more devices over the internet. VPNs are
typically used to connect remote users to a corporate network, or to connect two
or more networks securely.

The type of network that is used depends on the needs of the users and the
organization. For example, a PAN might be used to connect a laptop to a printer, while a
LAN might be used to connect computers in an office. A WAN might be used to connect
offices in different cities, while a MAN might be used to connect computers in a city.

The choice of network also depends on the technology that is available. For example, a
wireless network might be used if there is no wired infrastructure available. A VPN might
be used if it is necessary to create a secure connection between two networks.

The different types of networks are interconnected by routers and switches. Routers are
devices that direct data traffic between networks, while switches are devices that
connect devices within a network.

The networking infrastructure is the physical components that make up a network, such
as cables, routers, and switches. The networking software is the software that controls
the network, such as operating systems and network protocols.

The security of a network is important to protect data from unauthorized access.


Network security measures include firewalls, intrusion detection systems, and
encryption.
The performance of a network is important to ensure that data is transmitted efficiently
and reliably. Network performance is affected by factors such as the bandwidth of the
network, the number of devices on the network, and the distance between devices.

The maintenance of a network is important to ensure that it is operating properly.


Network maintenance tasks include troubleshooting problems, upgrading software, and
replacing hardware.

Network devices
There are many different types of network devices, but some of the most common
include:

● Repeater: A repeater operates at the physical layer. Its job is to regenerate the
signal over the same network before the signal becomes too weak or corrupted
to extend the length to which the signal can be transmitted over the same
network. An important point to be noted about repeaters is that they not only
amplify the signal but also regenerate it. When the signal becomes weak, they
copy it bit by bit and regenerate it at its star topology connectors connecting
following the original strength. It is a 2-port device.
● Routers: Routers are devices that direct data traffic between networks. They use
routing protocols to determine the best path for data to travel.
● Switches: Switches are devices that connect devices within a network. They use
MAC addresses to forward data packets to the correct destination.
● Hubs: Hubs are devices that connect multiple devices on the same network.
They repeat all data packets that are received on any port to all other ports.
● Bridges: Bridges are devices that connect two or more networks. They operate at
the data link layer of the OSI model and forward data packets between networks
based on their MAC addresses.
● Gateways: Gateways are devices that connect two or more networks that use
different protocols. They translate data packets from one protocol to another.
● Modems: Modems are devices that connect a computer to a network using a
telephone line or cable. They modulate and demodulate signals so that they can
be transmitted over the desired medium.
● Access points: Access points are devices that provide wireless connectivity to a
network. They use radio waves to transmit data between devices.
● Firewalls: Firewalls are devices that protect a network from unauthorized access.
They filter data packets based on their source and destination addresses, ports,
and protocols.
● Intrusion detection systems (IDSs): IDSs are devices that monitor a network for
suspicious activity. They can detect unauthorized access attempts, malware
infections, and other threats.
● Intrusion prevention systems (IPSs): IPSs are devices that take action to prevent
unauthorized access attempts and other threats. They can block malicious traffic,
quarantine infected devices, and send alerts to administrators.
These are just a few of the many different types of network devices. The specific
devices that are used in a network depends on the size and complexity of the network,
the needs of the users, and the budget.

Modem

A modem, short for modulator-demodulator, is a device that converts digital data into
analog signals that can be transmitted over a physical medium, such as a phone line,
coaxial cable, or fiber optic cable. It can also convert analog to digital. The modem then
converts the analog signals back to digital data at the receiving end.

Modulator - converts to analog signals

Demodulator - converts to digital signals.

Modems are used in a variety of applications, including:

● Connecting homes and businesses to the internet


● Connecting point-of-sale (POS) terminals to credit card networks
● Connecting wireless routers to the internet
● Connecting satellite receivers to the internet
● Transmitting data over long distances, such as between two remote offices

There are two main types of modems:

● Dial-up modems: Dial-up modems use phone lines to connect to the internet.
They are relatively slow and outdated, but they are still used in some rural areas
where broadband internet is not available.
● Broadband modems: Broadband modems offer much faster speeds than dial-up
modems. They are available in a variety of types, including:
○ DSL modems: DSL modems use phone lines to connect to the internet,
but they offer much faster speeds than dial-up modems.
○ Cable modems: Cable modems use coaxial cables to connect to the
internet. They offer the fastest speeds of any type of modem.
○ Fiber optic modems: Fiber optic modems use fiber optic cables to connect
to the internet. They offer the fastest speeds of any type of modem, but
they are not widely available yet.

Ethernet card (NIC - Network Interface Card)


An Ethernet card, also known as a network interface card (NIC), is a computer
hardware component that connects a computer to a computer network. It allows the
computer to communicate with other devices on the network, such as other computers,
printers, and servers. It also allows for the computer to be identified on the internet
(using MAC address).

A MAC address (Media Access Control address) is a unique identifier assigned to a


network interface
controller (NIC). It is a
12-digit hexadecimal
number that is burned
into the NIC's hardware
during manufacturing.

MAC addresses are


used to identify devices
on a network and to
control access to
network resources. For
example, a router may
use MAC addresses to
filter traffic and to
assign IP addresses to
devices.
Ethernet card

Ethernet cards are typically installed in an expansion slot on a desktop computer, or


they may be integrated into the motherboard of a laptop computer. They have a port on
the back of the card that can be connected to an Ethernet cable.

Ethernet cables are used to connect devices on a local area network (LAN). LANs are
typically small networks that are used in homes, businesses, and schools. Ethernet
(CAT-6) cables are also used to connect devices to the internet.

Ethernet cards are available in a variety of speeds, including 10 Mbps, 100 Mbps, 1
Gbps, and 10 Gbps. The speed of the Ethernet card will determine how fast the
computer can communicate with other devices on the network.

Here are some of the benefits of using an Ethernet card:

● Ethernet cards offer faster speeds than Wi-Fi.


● Ethernet cards are more reliable than Wi-Fi.
● Ethernet cards are less susceptible to interference from other devices.

If you need a fast and reliable connection to your network, you should use an Ethernet
card.

Here are some of the uses of Ethernet cards:

● Connecting a computer to a home or office network


● Connecting a computer to the internet
● Connecting a computer to a printer or other network device
● Creating a peer-to-peer network between two computers
● Connecting a computer to a virtual private network (VPN)

Ethernet cards are an essential component of most computer networks. They offer a
fast and reliable way to connect computers to each other and to the internet.

RJ45

RJ45 is a type of connector that is used to connect Ethernet cables to devices. It is the
most common type of connector used for wired Ethernet networks. The cable used for
ethernet (LAN) has 8 different wires within and the RJ 45 jack allows all 8 wires to be
used for the connection.
Repeater

A repeater is an electronic device that receives a signal and retransmits it after


amplifying its strength. Repeaters are used to extend transmissions so that the signal
can cover longer distances or be received on the other side of an obstruction.

A repeater in an ethernet setup is used at every 100 meters in the LAN wire connection.

Repeater

Repeaters are used in a variety of applications, including:

● Extending the range of wireless networks, such as Wi-Fi and cellular networks
● Amplifying radio signals in two-way radios and walkie-talkies
● Boosting the signal of television and radio broadcasts
● Transmitting data over long distances, such as between two remote offices

Repeaters work by receiving the signal and then rebroadcasting it at a higher power
level. This allows the signal to travel further or to be received on the other side of an
obstruction.
Hub

A hub is a networking device that connects multiple devices together. It is a Layer 1


device in the OSI model, meaning that it operates at the physical layer. Hubs work by
broadcasting all data packets to all connected devices. This means that all devices on
the network can see all data packets, even if they are not intended for them.

Hubs are typically used in small networks, such as home and office networks. They are
relatively inexpensive and easy to set up. However, hubs can cause performance
problems in larger networks due to the amount of broadcast traffic that they generate.

Network hub

Here are some of the advantages and disadvantages of using hubs:

Advantages:

● Inexpensive
● Easy to set up
● Compatible with all Ethernet devices

Disadvantages:

● Can cause performance problems in larger networks due to broadcast traffic


● Does not support full-duplex communication
● Can be a security risk, as all data packets are broadcast to all connected devices

Hubs have been largely replaced by switches in recent years. Switches are more
expensive than hubs, but they offer better performance and security.

Here are some examples of where hubs might be used:


● In a small office or home network to connect a few computers and printers
● In a school computer lab to connect all of the computers to the network
● In a retail store to connect all of the cash registers to the network

Switch

A switch is a networking device that connects multiple devices together. It is a Layer 2


device in the OSI model, meaning that it operates at the data link layer. Switches work
by forwarding data packets to the intended destination device. This means that only the
intended device receives the data packet, unlike a hub, which broadcasts all data
packets to all connected devices.

Network switch

Switches are typically used in small, medium, and large networks. They offer better
performance and security than hubs. Switches also support full-duplex communication,
which means that devices can transmit and receive data at the same time.

Here are some of the advantages and disadvantages of using switches:

Advantages:

● Better performance than hubs, especially in larger networks


● Supports full-duplex communication
● More secure than hubs, as data packets are only forwarded to the intended
destination device
● Can be used to segment a network into different VLANs

Disadvantages:
● More expensive than hubs
● More complex to set up and manage

Here are some examples of where switches might be used:

● In a small office or home network to connect multiple computers, printers, and


other devices
● In a school or business network to connect all of the devices to the network
● In a data center to connect all of the servers and other devices

If you are unsure whether to use a hub or a switch for your network, it is best to consult
with a networking professional.

Router

A router is a networking device that connects two or more computer networks. It is a


Layer 3 device in the OSI model, meaning that it operates at the network layer. Routers
work by forwarding data packets to the intended network. This means that only the
intended network receives the data packet, unlike a hub or switch, which broadcast or
forward data packets to all connected devices.

Network router

Routers are typically used to connect home and business networks to the internet. They
can also be used to connect multiple networks together, such as a company's network
to its branch offices.

Here are some of the advantages and disadvantages of using routers:


Advantages:

● Better performance than hubs and switches, especially in larger networks


● Supports full-duplex communication
● More secure than hubs and switches, as data packets are only forwarded to the
intended network
● Can be used to segment a network into different subnets
● Can be used to connect multiple networks together

Disadvantages:

● More expensive than hubs and switches


● More complex to set up and manage

Here are some examples of where routers might be used:

● In a small office or home network to connect multiple devices to the internet


● In a school or business network to connect all of the devices to the internet and
to each other
● In a data center to connect all of the servers and other devices to the internet and
to each other

------------------------------------------------------------------------------------------------------------

Gateways

A gateway is a networking device that connects two or more networks with different
communication protocols. It acts as a translator between the different protocols,
allowing devices on the different networks to communicate with each other.

Gateways are often used to connect home and business networks to the internet. The
internet uses a different communication protocol than most local area networks (LANs),
so a gateway is required to translate between the two.

Gateways can also be used to connect different types of networks together, such as a
LAN to a wide area network (WAN) or a LAN to a wireless network.

Here are some examples of gateways:

● Internet routers: Internet routers are the most common type of gateway. They
connect home and business networks to the internet.
● Firewalls: Firewalls are gateways that also provide security features. They can be
used to protect networks from unauthorized access and malicious attacks.
● VPN gateways: VPN gateways allow users to create secure tunnels between
their devices and remote networks. This allows them to access resources on the
remote networks as if they were connected directly.
● Application gateways: Application gateways are gateways that are designed to
handle specific types of traffic, such as web traffic or email traffic. They can be
used to improve the performance and security of applications.

Gateways are an essential part of many networks. They allow devices on different
networks to communicate with each other and to access resources on the internet.

Here are some of the benefits of using gateways:

● Gateways allow devices on different networks to communicate with each other.


● Gateways can be used to improve the performance and security of networks.
● Gateways can be used to connect different types of networks together.

However, there are also some potential drawbacks to using gateways:

● Gateways can be complex to set up and manage.


● Gateways can be a single point of failure. If the gateway goes down, it can
disrupt communication on the network.

Overall, gateways are an essential part of many networks and offer a number of
benefits. However, it is important to be aware of the potential drawbacks before
deploying a gateway on your network.

Identification of Nodes in a Network Communication

There are a number of ways to identify nodes in a network communication. Some of the
most common methods include:

● IP address: Every device on a TCP/IP network has a unique IP address. This


address is used to identify the device on the network and to direct traffic to it.
● MAC address: Every network interface controller (NIC) has a unique MAC
address. This address is burned into the NIC's hardware during manufacturing.
MAC addresses are often used to identify devices on a network for security
purposes.
● Hostname: A hostname is a unique name that is assigned to a device on a
network. Hostnames are typically used to make it easier for users to identify
devices on the network.
● Port number: Port numbers are used to identify specific applications on a device.
For example, port 80 is typically used for web traffic and port 25 is typically used
for email traffic.

In addition to these methods, there are a number of other ways to identify nodes in a
network communication. For example, network administrators may use tools to identify
devices based on their operating system, vendor, or other criteria.

Here are some specific examples of how nodes in a network communication can be
identified:

● When a web browser sends a request to a web server, the request will include
the IP address of the web browser. This allows the web server to identify the web
browser and send the response back to it.
● When a firewall filters traffic, it may use the MAC address of the source and
destination devices to determine whether to allow the traffic to pass.
● When a network administrator is troubleshooting a network problem, they may
use a tool to scan the network for all active devices. This tool will typically display
the IP address, MAC address, and hostname of each device.

Overall, there are a number of ways to identify nodes in a network communication. The
specific method used will depend on the application and the network environment.

Internet
The internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is a
network of networks that consists of millions of private, public, academic, business, and
government networks, of local to global scope, linked by a broad array of electronic,
wireless, and optical networking technologies. The Internet carries an extensive range
of information resources and services, such as the inter-linked hypertext documents and
applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing.

The Internet has revolutionized the way people live, work, and communicate. It has
enabled access to information and resources from anywhere in the world, at any time. It
has also created new opportunities for business, education, and entertainment.

Here are some of the key features of the internet:

● It is a decentralized network, meaning that there is no single authority that


controls it.
● It is a packet-switching network, meaning that data is transmitted in small
packets that can be routed through different networks.
● It is a self-organizing network, meaning that it can adapt to changes in topology
and traffic patterns.
● It is a scalable network, meaning that it can grow to accommodate more users
and devices.

The internet has had a profound impact on society. It has changed the way we
communicate, learn, and work. It has also created new opportunities for businesses and
individuals.

Here are some examples of how the internet is used today:

● To communicate with friends and family through email, social media, and video
chat.
● To learn new things by taking online courses, watching educational videos, and
reading articles.
● To work remotely by connecting to company networks and accessing files and
applications.
● To shop online for goods and services.
● To entertain ourselves by watching movies and TV shows, playing games, and
listening to music.

The internet is a powerful tool that can be used for many different purposes. It is
important to use the internet responsibly and ethically.

Web

The World Wide Web (WWW), commonly known as the Web, is a system of
interconnected hypertext documents and applications accessed via the Internet. A
hypertext document is a text document that contains links to other documents. When
you click on a link, you are taken to the document that the link points to.

The Web was invented by Tim Berners-Lee in 1989. He was working at the European
Organization for Nuclear Research (CERN) at the time, and he needed a way to share
information with other scientists around the world.

The Web is based on three key technologies:

● Hypertext Markup Language (HTML): HTML is a language that is used to create


web pages. HTML tags are used to define the structure and content of a web
page.
● Hypertext Transfer Protocol (HTTP): HTTP is a protocol that is used to transfer
web pages between a web server and a web browser.
● Uniform Resource Locator (URL): A URL is a unique identifier for a web page. It
is used to specify the location of a web page on the Internet.

The Web has changed the way we communicate, learn, and work. It has enabled
access to information and resources from anywhere in the world, at any time. It has also
created new opportunities for business, education, and entertainment.

Here are some examples of how the Web is used today:

● To search for information on any topic imaginable.


● To read news articles, watch videos, and listen to music.
● To shop online for goods and services.
● To communicate with friends and family through email, social media, and video
chat.
● To learn new things by taking online courses, watching educational videos, and
reading articles.
● To work remotely by connecting to company networks and accessing files and
applications.

The Web is a powerful tool that can be used for many different purposes. It is important
to use the Web responsibly and ethically.

Here are some tips for using the Web responsibly and ethically:

● Be careful about the information you share online.


● Be respectful of other people's privacy.
● Be aware of the dangers of online scams and phishing attacks.
● Use the Web to learn and grow.
● Use the Web to connect with others and make a positive difference in the world.

Difference between the internet and the web


The internet is a global network of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is a
network of networks that consists of millions of private, public, academic, business, and
government networks, of local to global scope, linked by a broad array of electronic,
wireless, and optical networking technologies. The Internet carries an extensive range
of information resources and services, such as the inter-linked hypertext documents and
applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing.

The World Wide Web (WWW), commonly known as the Web, is a system of
interconnected hypertext documents and applications accessed via the Internet. A
hypertext document is a text document that contains links to other documents. When
you click on a link, you are taken to the document that the link points to.
The main difference between the internet and the web is that the internet is the
infrastructure, while the web is one of the services that runs on top of the internet. The
internet is made up of the hardware and software that connects computers together,
while the web is the software that allows you to view web pages and use web
applications.

Here is a table that summarizes the key differences between the internet and the web:

Feature Internet Web

Definition A global network of A system of interconnected


interconnected computer hypertext documents and
networks applications accessed via the
Internet

Purpose To connect computers and To provide access to information


devices together and allow and resources on the internet
them to communicate

Examples Email, file sharing, instant World Wide Web, online


messaging, voice over IP shopping, social media, streaming
(VoIP) video

Another way to think about the difference between the internet and the web is to
imagine the internet as a highway system. The highways are the physical infrastructure
that connects different cities and towns. The web is like the traffic that travels on the
highways.

The internet and the web are both essential parts of the modern world. The internet
provides the infrastructure that allows us to connect to each other and access
information and resources. The web is the software that allows us to use the internet in
a variety of ways, such as browsing the web, shopping online, and communicating with
others.

the Internet of Things

The Internet of Things (IoT) is a network of physical objects that are embedded with
sensors, software, and other technologies for the purpose of connecting and
exchanging data with other devices and systems over the internet. These objects can
include anything from simple everyday devices like thermostats and light bulbs to
sophisticated industrial machines and transportation systems.

The IoT has the potential to revolutionize many industries and aspects of our lives. For
example, IoT-enabled devices can be used to:

● Monitor and control environmental conditions, such as temperature, humidity,


and air quality, in homes, businesses, and other environments.
● Improve the efficiency and productivity of industrial processes.
● Track and manage inventory in real time.
● Develop new smart products and services, such as self-driving cars and smart
homes.

The IoT is still in its early stages of development, but it is already having a significant
impact on the world around us. As the technology continues to develop and mature, we
can expect to see even more innovative and transformative applications of the IoT in the
years to come.

Here are some examples of IoT devices and applications:

● Smart thermostats that can learn your heating and cooling preferences and
adjust the temperature accordingly to save energy.
● Smart light bulbs that can be turned on and off remotely, or even scheduled to
turn on and off automatically.
● Smart home security systems that can monitor your home for intruders and send
you alerts if anything goes wrong.
● Wearable devices, such as smartwatches and fitness trackers, that can track
your activity levels, heart rate, and other health data.
● Industrial sensors that can monitor the condition of equipment and predict when
maintenance is needed.
● Smart city applications, such as traffic lights that can adjust their timing to reduce
congestion, and parking sensors that can help drivers find a spot quickly.

The IoT has the potential to make our lives easier, more efficient, and more sustainable.
However, it is important to be aware of the potential privacy and security risks
associated with IoT devices. It is important to choose devices from reputable
manufacturers and to keep them up to date with the latest security patches.

Domain Name Systems


The Domain Name System (DNS) is a hierarchical and distributed naming system for
computers, services, and other resources in the Internet or other Internet Protocol (IP)
networks. It associates various information with domain names assigned to each of the
associated entities. Most prominently, it translates domain names meaningful to humans
into the numerical IP addresses needed for locating and identifying computer devices
and services with the underlying network protocols. By providing a worldwide,
distributed directory service, the Domain Name System has been an essential
component of the functionality of the Internet since 1985.

The Domain Name System is decentralized, meaning that there is no single authority
that controls it. Instead, the DNS is managed by a network of DNS servers that are
distributed all over the world.

When you enter a domain name into your web browser, your browser sends a query to
a DNS server. The DNS server then looks up the IP address for the domain name and
returns it to your browser. Your browser can then use the IP address to connect to the
web server that hosts the website.

The DNS is an essential part of the internet infrastructure. It allows us to use domain
names instead of IP addresses, which makes the internet much easier to use.

Here are some of the benefits of using the DNS:

● It makes the internet easier to use by allowing us to use domain names instead
of IP addresses.
● It is reliable and scalable.
● It is decentralized, meaning that there is no single authority that controls it.
● It is secure.

The DNS is a critical part of the internet infrastructure, and it is important to understand
how it works. By understanding the DNS, you can troubleshoot problems with your
internet connection and improve your overall internet experience.

Security Aspects
Threats and Prevention
Security Aspects

The internet is a powerful tool, but it is also a dangerous place. There are many threats
to our security online, including:

● Malware: Malware is malicious software that can damage your computer or steal
your data. Examples of malware include viruses, worms, Trojans, and spyware.
● Phishing: Phishing is a type of social engineering attack in which attackers try to
trick you into revealing your personal information, such as your passwords or
credit card numbers.
● Botnets: Botnets are networks of computers that have been infected with
malware and are under the control of attackers. Botnets can be used to launch a
variety of attacks, such as denial-of-service attacks and spam campaigns.
● Man-in-the-middle attacks: Man-in-the-middle attacks occur when an attacker
intercepts communication between two parties and impersonates one of them.
This can allow the attacker to steal data or redirect traffic to malicious websites.

Prevention

There are a number of things you can do to protect yourself from online threats, such
as:

● Use strong passwords and enable multi-factor authentication (MFA): Strong


passwords are at least 12 characters long and include a mix of upper and
lowercase letters, numbers, and symbols. MFA adds an extra layer of security by
requiring you to enter a code from your phone in addition to your password.
● Keep your software up to date: Software updates often include security patches
that can help protect you from known vulnerabilities.
● Be careful about what links you click on and what attachments you open:
Phishing attacks often rely on trickery to get you to click on a malicious link or
open a malicious attachment. If you are not sure if something is safe, it is best to
err on the side of caution and not click on it.
● Use a firewall and antivirus software: A firewall can help protect your computer
from unauthorized access, while antivirus software can help detect and remove
malware.

Malware - virus, Worms, Ransomware, Trojan, spyware, adware, key loggers


Malware is malicious software that can damage your computer or steal your data. There
are many different types of malware, including:

● Virus: A virus is a type of malware that can replicate itself and spread to other
computers. Viruses can damage your computer files, steal your data, or even
disable your computer altogether.
● Worm: A worm is a type of malware that can replicate itself and spread to other
computers without the need for human intervention. Worms can use up your
network bandwidth, slow down your computer, or even crash it.
● Ransomware: Ransomware is a type of malware that encrypts your files and
demands a ransom payment in exchange for the decryption key. If you don't pay
the ransom, you will not be able to access your files.
● Trojan: A Trojan is a type of malware that disguises itself as a legitimate program
in order to trick you into installing it. Once installed, a Trojan can steal your data,
install other malware, or even give the attacker complete control over your
computer.
● Spyware: Spyware is a type of malware that monitors your computer activity and
collects your personal information, such as your passwords, credit card numbers,
and browsing history.
● Adware: Adware is a type of malware that displays unwanted ads on your
computer. Adware can be annoying, but it is usually not as harmful as other types
of malware.
● Keyloggers: Keyloggers are a type of malware that records all of the keystrokes
that you type on your computer. This information can then be used to steal your
passwords, credit card numbers, and other sensitive information.

How to protect yourself from malware

There are a number of things you can do to protect yourself from malware, such as:

● Use strong passwords and enable multi-factor authentication (MFA): Strong


passwords are at least 12 characters long and include a mix of upper and
lowercase letters, numbers, and symbols. MFA adds an extra layer of security by
requiring you to enter a code from your phone in addition to your password.
● Keep your software up to date: Software updates often include security patches
that can help protect you from known vulnerabilities.
● Be careful about what links you click on and what attachments you open:
Phishing attacks often rely on trickery to get you to click on a malicious link or
open a malicious attachment. If you are not sure if something is safe, it is best to
err on the side of caution and not click on it.
● Use a firewall and antivirus software: A firewall can help protect your computer
from unauthorized access, while antivirus software can help detect and remove
malware.

Modes of Malware distribution


Malware can be distributed in a variety of ways, including:

● Email: Phishing emails are a common way to distribute malware. Phishing emails
are designed to trick you into clicking on a malicious link or opening a malicious
attachment.
● Websites: Malware can be distributed through malicious websites or
compromised legitimate websites. When you visit a malicious website, it can
automatically download malware to your computer.
● Removable media: Malware can be spread through removable media such as
USB drives and external hard drives. If you insert an infected removable media
device into your computer, the malware can spread to your computer.
● Software downloads: Malware can be distributed through software downloads,
especially from untrusted sources. When you download software from an
untrusted source, it may contain malware.
● Social engineering: Social engineering is a type of attack that relies on human
error or manipulation to trick victims into revealing confidential information or
performing actions that compromise information security. For example, an
attacker might pose as a customer support representative and convince a victim
to install malware on their computer.

It is important to be aware of the different ways that malware can be distributed so that
you can take steps to protect yourself.

Antivirus
Antivirus software is a type of software that protects your computer from malware, such
as viruses, worms, Trojans, and spyware. Antivirus software works by scanning your
computer for malware and removing any infections that it finds.

Antivirus software is an essential part of any computer security system. It can help to
protect your computer from a variety of threats, including:

● Data theft: Antivirus software can help to protect your data from being stolen by
malware.
● Identity theft: Antivirus software can help to protect your identity from being
stolen by malware.
● Financial loss: Antivirus software can help to protect you from financial loss
caused by malware, such as ransomware.
● System damage: Antivirus software can help to protect your computer from
damage caused by malware, such as viruses and worms.

There are a variety of different antivirus software programs available, both free and
paid. It is important to choose a program that is right for your needs. When choosing an
antivirus software program, you should consider the following factors:

● Compatibility: Make sure that the program is compatible with your computer's
operating system and hardware.
● Protection: Make sure that the program provides protection against a wide range
of malware threats.
● Performance: Make sure that the program does not slow down your computer's
performance.
● Ease of use: Make sure that the program is easy to use and configure.

Once you have chosen an antivirus software program, you should install it on your
computer and keep it up to date. Antivirus software programs regularly release updates
to protect against new malware threats.
HTTP vs HTTPS
HTTP and HTTPS are both protocols used to transfer data over the internet. The main
difference between the two is that HTTPS is a secure version of HTTP.

HTTP stands for Hypertext Transfer Protocol. It is the protocol that is used to transfer
web pages and other resources between a web server and a web browser. HTTP is a
plaintext protocol, which means that the data that is transferred is not encrypted. This
means that anyone who is able to intercept the data can read it.

HTTPS stands for Hypertext Transfer Protocol Secure. It is a secure version of HTTP
that uses Transport Layer Security (TLS) to encrypt the data that is transferred. TLS is
the same encryption protocol that is used by HTTPS websites.

HTTPS is more secure than HTTP because it encrypts the data that is transferred. This
means that anyone who is able to intercept the data will not be able to read it.

HTTPS is also more secure than HTTP because it uses digital certificates to verify the
identity of the website that you are visiting. This helps to protect you from phishing
attacks, where attackers create fake websites that look like real websites in order to
steal your personal information.

All major websites now use HTTPS. If you are visiting a website that is not using
HTTPS, you should be cautious about entering any personal information.

Here are some of the benefits of using HTTPS:

● It encrypts the data that is transferred, which protects it from being intercepted by
third parties.
● It verifies the identity of the website that you are visiting, which protects you from
phishing attacks.
● It can improve your website's SEO ranking.
● It can increase user trust and confidence in your website.

If you have a website, you should make sure that it is using HTTPS. You can do this by
purchasing an SSL certificate from a trusted certificate authority.

Firewall
A firewall is a network security device that monitors and controls incoming and outgoing
network traffic based on predetermined security rules. A firewall typically establishes a
barrier between a trusted network and an untrusted network, such as the Internet. A
firewall can be hardware, software, or a combination of both.

Opens in a new window


howstuffworks.com
Firewall

Firewalls are used to protect networks from a variety of threats, including:

● Unauthorized access: Firewalls can prevent unauthorized users from accessing a


network.
● Malware: Firewalls can block malware from entering or leaving a network.
● Denial-of-service attacks: Firewalls can protect networks from denial-of-service
attacks, which are attempts to overwhelm a network with traffic and make it
unavailable to legitimate users.

Firewalls can also be used to control network access and bandwidth usage. For
example, a firewall can be used to block certain websites or applications, or to limit the
amount of bandwidth that users can consume.

Firewalls are an essential part of any network security strategy. By monitoring and
controlling network traffic, firewalls can help to protect networks from a variety of
threats.

Here are some of the benefits of using a firewall:

● Protects your network from unauthorized access and malware.


● Controls network access and bandwidth usage.
● Improves network performance and reliability.
● Reduces the risk of data breaches.
● Complies with industry regulations.
There are a variety of different firewalls available, both free and paid. It is important to
choose a firewall that is right for your needs. When choosing a firewall, you should
consider the following factors:

● Size of your network: Make sure that the firewall can handle the amount of traffic
that your network generates.
● Types of threats you want to protect against: Make sure that the firewall can
protect you from the types of threats that you are most concerned about.
● Features: Make sure that the firewall has the features that you need, such as
content filtering and intrusion detection.
● Budget: Firewalls can range in price from free to several thousand dollars.
Choose a firewall that fits your budget.

Once you have chosen a firewall, you should install it on your network and configure it
according to your needs. Firewalls can be complex to configure, so it is important to
read the documentation carefully and seek professional help if needed.

Cookies
Cookies are small text files that are stored on your computer or mobile device when you
visit a website. They contain information about your browsing activity and preferences,
which can be used to improve your user experience and make the website more
relevant to you.

Cookies can be used for a variety of purposes, including:

● Remembering your login information and preferences


● Keeping track of items in your shopping cart
● Tracking your browsing activity to provide more relevant content
● Measuring website traffic and performance
● Targeting advertising

There are two main types of cookies:

● Session cookies: Session cookies are deleted when you close your browser.
They are used to keep track of information such as items in your shopping cart or
your login status.
● Persistent cookies: Persistent cookies are stored on your computer or mobile
device until they expire or are deleted by you. They are used to remember your
preferences and settings for future visits to the website.

Most web browsers allow you to control how cookies are used on your device. You can
choose to block all cookies, allow only certain cookies, or be prompted each time a
website wants to set a cookie.
Here are some of the benefits of using cookies:

● Improve your user experience: Cookies can remember your login information and
preferences, so you don't have to enter them every time you visit a website. They
can also keep track of items in your shopping cart, so you don't have to start over
from scratch each time you want to purchase something.
● Make the website more relevant to you: Cookies can track your browsing activity
to provide you with more relevant content. For example, if you visit a website that
sells books, the website may use cookies to recommend books that you are likely
to be interested in.
● Measure website traffic and performance: Cookies can be used to measure
website traffic and performance. This information can be used to improve the
website and make it more user-friendly.
● Target advertising: Cookies can be used to target advertising to your interests.
For example, if you visit a website that sells clothes, the website may use
cookies to show you ads for clothes that you are likely to be interested in.

However, there are also some potential drawbacks to using cookies:

● Privacy concerns: Cookies can be used to track your browsing activity across
different websites. This information can be used to create a detailed profile of
your interests and online activity. Some people may be concerned about the
privacy implications of this.
● Security risks: Cookies can be used to steal your personal information or install
malware on your computer. It is important to only allow cookies from trusted
websites.

Overall, cookies are a useful tool for improving the user experience and making
websites more relevant to users. However, it is important to be aware of the potential
privacy and security risks associated with cookies and to take steps to protect yourself.

Here are some tips for using cookies safely:

● Enable cookies from trusted websites only.


● Block third-party cookies from websites that you do not trust.
● Clear your cookies regularly.

Hackers and Crackers


Hackers and crackers are both people who use their technical skills to gain
unauthorized access to computer systems and networks. However, there is a key
difference between the two.

Hackers are typically motivated by curiosity, a desire to learn, or a challenge. They may
hack into systems to test their skills, learn how they work, or find vulnerabilities that can
be fixed. Hackers may also hack into systems to expose security flaws or to raise
awareness of important issues.

Crackers, on the other hand, are typically motivated by malicious intent. They may hack
into systems to steal data, damage systems, or commit other crimes. Crackers may also
hack into systems to disrupt operations or to gain an advantage over their competitors.

Here is a table that summarizes the key differences between hackers and crackers:

Feature Hacker Cracker

Motivatio Curiosity, learning, challenge Malicious intent


n

Goals Test skills, learn, find Steal data, damage systems,


vulnerabilities, expose security commit crimes, disrupt
flaws, raise awareness operations, gain an advantage

It is important to note that not all hackers are malicious. There are many ethical hackers
who use their skills to help improve the security of computer systems and networks.
However, it is also important to be aware of the potential dangers of hackers and
crackers, and to take steps to protect yourself and your systems.

Here are some tips for protecting yourself from hackers and crackers:

● Use strong passwords and enable multi-factor authentication (MFA).


● Keep your software up to date.
● Be careful about what links you click on and what attachments you open.
● Use a firewall and antivirus software.
● Be careful about what information you share online.

There are many different types of hackers, each with their own unique skills and
motivations. Here are some of the most common types of hackers:

● Black hat hackers: Black hat hackers are malicious hackers who use their skills
to steal data, damage systems, or commit other crimes.
● White hat hackers: White hat hackers are ethical hackers who use their skills to
help improve the security of computer systems and networks.
● Gray hat hackers: Gray hat hackers fall somewhere in between black hat and
white hat hackers. They may hack into systems to find vulnerabilities, but they
may also exploit those vulnerabilities for personal gain.
● Script kiddies: Script kiddies are unskilled hackers who use scripts or tools
created by others to hack into systems.
● Green hat hackers: Green hat hackers are new to hacking and are still learning
the ropes. They may be motivated by curiosity or a desire to learn, but they may
also be motivated by malicious intent.
● State-sponsored hackers: State-sponsored hackers are hackers who are
employed by governments to hack into other governments or organizations.
● Hacktivists: Hacktivists are hackers who use their skills to promote a political or
social cause.

In addition to these general categories, there are also many different types of hackers
who specialize in particular areas, such as:

● Web hackers: Web hackers specialize in hacking into websites and web servers.
● Network hackers: Network hackers specialize in hacking into computer networks.
● System hackers: System hackers specialize in hacking into computer systems.
● Database hackers: Database hackers specialize in hacking into databases.
● Mobile hackers: Mobile hackers specialize in hacking into mobile devices and
mobile apps.
● Cloud hackers: Cloud hackers specialize in hacking into cloud computing
platforms.

It is important to be aware of the different types of hackers and their motivations so that
you can take steps to protect yourself and your systems.

You might also like