0% found this document useful (0 votes)
25 views

Configuring and Using Internetc2

The document discusses internet searches and security threats. It begins by defining search queries, paid and organic search results, and keywords. It then discusses popular search engines like Google and Yahoo. It covers location, tracking, identification and profiling privacy threats. Common security threats are discussed like botnets, DDoS attacks, mobile malware, phishing, and ransomware. The document concludes by discussing principles of netiquette, differences between search engines, composing effective search queries, and evaluating the authority, reliability, and authenticity of online information.

Uploaded by

m.tsedey2013
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Configuring and Using Internetc2

The document discusses internet searches and security threats. It begins by defining search queries, paid and organic search results, and keywords. It then discusses popular search engines like Google and Yahoo. It covers location, tracking, identification and profiling privacy threats. Common security threats are discussed like botnets, DDoS attacks, mobile malware, phishing, and ransomware. The document concludes by discussing principles of netiquette, differences between search engines, composing effective search queries, and evaluating the authority, reliability, and authenticity of online information.

Uploaded by

m.tsedey2013
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Unit Two:

Search internet
2.1. Introduction to search
• An internet search known as a search query, is an entry into a search engine
that yields both paid and organic results.
• The paid results are the ads that appear at the top and the bottom of the page,
and they are marked accordingly.
• The organic results are the unmarked results that appear in between the ads.
• At the core of an internet search is a keyword.
• Keyword is a word used to indicate the content of a document.
• keywords are at the hearts of search engine marketing (SEM) and search
engine optimization (SEO).
• A search engine is software, usually accessed on the Internet, that searches a
database of information according to the user's query.
Cont…
• some of the most popular search engines:
• Google is the most popular search engine in the world.
• It's so popular that the word "Googling" is often used in place of "searching the
web."
• Google also has special image and video search features that make it easy to find all
sorts of media.
• Yahoo used to be the largest search engine in the world.
2.2. Privacy and security threats on the internet
• The types of location privacy threats that arise from disclosed location
information are:
• Tracking Threat: the attacker can receive continuous updates of user location in real
time.
• Identification Threat: the attacker can receive sporadic updates of user location,
which can be used to identify the user’s frequently visited locations.
• Profiling Threat: the attacker may not have the required information to identify the
user but can use the locations to profile the user.
• For example, an attacker can identify which hospitals or religious places a user visits.
2.2.1. Top Computer Security Threats
• Hackers steal millions of dollars’ worth of data every day.
• Five common computer security threats
• Botnets: These guys are the ninjas (who moves and acts without being seen ) of
digital crime.
• If your computer’s infected with one, you won’t know it.
• Botnets are a collection of software robots that infect other computers, called zombies.
• The creator of the botnets can then control the zombies.
• DDOS Attacks: DDOS stands for distributed denial-of-service.
• Hackers use zombie computers to sabotage (deliberately damage) a server.
• For most online businesses, traffic is revenue. A server slows down, or worse, a shutdown, spells
catastrophe.
• Mobile Malware
• More and more people browse the Internet with their phones.
• They make phone friendly websites and mobile apps to buy.
• Using infected apps, hackers steal information with mobile malware.
Cont…
• Phishing
• Also known as spoofing, phishing is a common cyber scam(an illegal plan): easy to do
with effortless results.
• Hackers bait the hook with fake text messages, websites, and emails appearing
legitimate.
• They ask you to submit information or update an account.
• Ransomware
• One of the worst Internet threats is ransomware.
• It’s a type of malware designed to restrict access to your computer.
• Ransomware has two flavors: lock screen and encryption.
• Lock screen ransomware prevents you from accessing your computer.
• Encryption ransomware locks up your files on your hard drive, shared network, USB,
or the cloud.
2.3. Observing OHS and netiquette principles
• Netiquette refers to your Internet custom, or the way you behave online and on social
media.
• Because the majority of online communication is completely non-verbal, you cannot see or use facial
expressions or tone of voice to back what you are typing.
1. Never Send Spam: Before forwarding or posting something, verify the source as credible
2. Use Good Grammar: Use proper language whenever possible, and avoid casual abbreviations that
could be misunderstood or misinterpreted by some.
3. Consider your email address: The email address you use should be free of nicknames, slang, or
strange spellings.
4. Avoid the Temptation to Over Share: void posting personal information like off-topic information
about your day or questions about your course performance that would be better suited to a direct
email to your instructor.
5. Don’t Type in ALL CAPS: In online communication, ALL CAPS is considered yelling.
6. Return Messages Promptly: If someone sends you an email or an online message, send them a
response quickly.
7. Respect the Privacy and Rights of Others
Do not forward personal emails or share statuses without the original person’s permission.
8. Identify Yourself: Identify yourself in online communications, like email.
• Let the recipient know who you are.
Cont…
A poor netiquette causes:
• Cyberbullying and toxic social media behavior are two of the many forms
of poor online behavior that not only can ostracize(discriminate) you, but
also can have legal ramifications.
• issue that children may face if they aren’t taught to safely use social media.
• One toxic post or picture could make it tougher (Violent) for them to get into a school or land a
particular job.
2.3.1. Introduction to Search engines
• A search engine is a tool we use to find websites and information on the Internet.
2.3.2 Common search engines
• Google • AltaVista
• Yahoo • Netscape
• MSN • Ask
• Lycos
A. Differences between search engines
• There are a huge variety of search engines.
• Most search engines explore most of the computers connected to the Internet. However,
some ‘search engines’ are really a search of a particular site, or perhaps a group of sites.
• examples include:
• Explore — specialises in information related to international law
• Travelocity — specialises in information related to travel
• Hotwire —specialises in information related to computer and communications technology.
Cont…
B. Searching information on internet
1. Creating a search expression
• In order to use a search engine, you must first locate the search engine on the Internet.
• Usually, you can locate the search engine by typing in the URL of the search engine or
typing your expression into search bar.
• Alternatively, you might click on the Search button on the toolbar of your browser. This will
take you to a search engine screen to allow you to enter your search expression.
C. Composing a search expression
• Type question in a full English sentence.
• Use just the main keywords.
• Use synonyms for the keywords.
• Use acronyms.
• Use words to broaden your search like OR.
• Use words to narrow your search like AND, +, -, NOT.
• Add more keywords to narrow down (reduce) the number of hits.
Cont…
D. Narrowing or broadening a search
• To get good results from your search expressions, you can broaden or narrow
your search as required.
• For some topics, you will get millions of results , while for others you might
get none.
• You can:
• Use words to broaden your search like OR.
• Use words to narrow your search like AND, +, -, NOT.
2.3.3. Requirements of search parameters
• A search operator (sometimes referred to as a search parameter) is a character or string
of characters used in a search engine query to narrow the focus of the search.
• operators are characters or sequences of characters that represent an action or cause an
action to be performed.
2.3.4. Authority, reliability and authenticity of information
A. Authority of information (source of information)
• Information resources reflect their creators' expertise and credibility, and are evaluated
based on the information need.
• Authority is important in determining the credibility of a website because it establishes who
is in charge of the website, who wrote the information.
• Evaluating a source by authority means that you are asking:
 Does the author have expertise on the topic about which he/she is writing?
 Who is the author?
 Is he or she a subject expert on the topic?
 What are the author's credentials?
Cont…
B. Reliability of information (Trust of information)
• Data reliability means that data is complete and accurate.
• it is a crucial foundation for building data trust across the organization.
• Data reliability assessment, also referred to as trust assessment, is an important process that
can reveal problem areas about your data that you didn’t even know existed.
• The assessment will typically measure three different aspects of data reliability.
• validity: - is the data correctly formatted and stored in the right way?
• Completeness: - does the dataset include values for all the attributes required by your
system?
• Uniqueness: - is the data free from duplicates and dummy entries?
cont…
C. Authenticity of information (Truth or reality of information)
• In the dictionary “authentic” is described as "genuine; real; veritable; not false
or copied; sharing the sense of actuality and lack of falsehood or
misrepresentation" and "having the origin.
• If information has bias; therefore, authenticity is not limited to verifying
authorship and diplomatic of a document.
• it also includes attributes such as completeness, accuracy, trustworthiness, correctness,
validity, integrity, faithfulness, originality, meaningfulness, and suitability for an
intended purpose.
• The criteria are:
• Currency: Timeliness of the information.
• Relevance: Importance of the information for your needs.
• Authority: Source of the information.
• Accuracy: Truthfulness and correctness of the information.
• Purpose: Reason the information exists.
2.3.5. Download the required files
• Download refers to data that is brought 'down' from a network, the Web
(Or Cloud) to reside on a local drive / computer.
• Best download manager for windows
• Free Download Manager. • Internet Download Accelerator.
• Internet Download Manager. • EagleGet.
• Ninja Download Manager. • BitComet.
• JDownloader. • uGet
2.4. Save search results and presenting as a report
2.4.1. Introduction to online Data Storage
• Online data storage refers to the practice of storing electronic data with a third-party
service accessed via the internet.
• It’s an alternative to traditional local storage (such as disk or tape storages) and portable
storages (such as optical medias or flash drives).
• It can also be called” hosted storage” or “cloud storage”.
2.4.2. Benefits of online storage
• One of the biggest benefits is the ability to access data from anywhere.
• Important in Syncing or transferring data among devices.
• It also used for backup and disaster recovery situations.
2.5. Creating bookmarks for required web page and saved in folder
2.5.1. Export, Save and Import Chrome Bookmarks
• Bookmark is a saved shortcut that directs your browser to a specific webpage.
• Saving bookmarks allows you to easily access your favorite locations on the Web.
• Book mark stores the title, URL, and icon of the corresponding page.
• When you use a new computer using different browsers, Google Chrome makes it easy to
save all your bookmarks.
• Then you can export, save, and import Chrome bookmarks, so you can transfer then to
another computer or have a backup.
• To export and save your bookmarks: Menu > Bookmarks > Bookmark manager> click
on the icon with three vertical dots > Then click Export Bookmarks> Finally, choose a
name and destination and click Save.
• To Import Chrome Bookmarks : Menu > Bookmarks > Bookmark manager> Then click
the icon with three vertical dots next to the search bar> Then click Import Bookmarks>
Then click Import Bookmarks> Choose the HTML file you saved to import your Chrome
bookmarks> Finally, select the saved bookmarks HTML file and click Open.
2.6. Page setup options & print required information from web pages
• Use “Page Setup”
• In Internet Explorer if you want to make any changes to the way your page looks after it
prints.
• If you’re using Google Chrome, the option to make adjustments to the page will
automatically appear after you hit “Print.”
• Printing required information from web pages
• In Internet Explorer, the “Print Preview” option will allow you to see what your page
will look like before your print it out.
• Google Chrome will automatically show you a preview of the page to be printed after
you select “Print.”
2.7. Exiting browser windows
• Before you are going to shut down your browser first you should save all
the necessary information.

You might also like