0% found this document useful (0 votes)
13 views28 pages

HTMLs

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views28 pages

HTMLs

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

HTML </>

By Abishek MA
CONTENTS

Introduction to Applications of
HTML using HTML

HTML HTML and


Elements and Web Security
Types
01.Introduction to HTML

>> HTML - H y p e r Te x t M a r k u p L a n g u a g e

HTML is the standard markup language for


c r e a t i n g We b p a g e s . H T M L d e s c r i b e s t h e
s t r u c t u r e o f a We b P a g e
2 Tim Berners-Lee- Architect of the World Wide Web
World’s first web browser: --->
zs

Tim Berners-Lee

Berners-Lee developed the first web browser, called WorldWideWeb (later


renamed Nexus), and the first web server. These innovations laid the
groundwork for the birth of HTML (HyperText Markup Language), the
language used to structure content on the web.
HTML 5 is the latest standard of HyperText Markup Language
3 Evolution of HTML Versions
|
|
|

1995 2012
1991
1999
HTML 2.0 HTML 5
HTML
HTML
4.01
HTML 3.2
HTML+

1993 1997
02.HTML Elements and Types
Basic HTML Tags:
HTML Elements and Types Introduction

 HTML elements are the building blocks of a webpage

Syntax: Attributes: Hierarchy:

Placing one block inside another, forming a


An HTML element consists of an Elements can have attributes that provide hierarchy that defines the layout and organization o

opening tab, content, and a closing tab. additional information or modify their a web page

behavior

<h1> Hello World </h1> <h1 style=“font-size: 48px;”>Hello World</h1>


03. Applications of HTML

Web Development Android Email Marketing eBooks and


Development Digital Publishing
Web Development using HTML

Basic language used for Web Dev:

CSS (Cascading Style


Sheets

HTML

JavaScript
HTML Code: Practical Example of a Web Output
Android Dev using HTML

Progressive Web Apps (PWAs):


While not native Android apps, PWAs are web applications that use
modern web technologies to provide a native app-like experience. Users
can add them to their home screens, and they can work offline. PWAs are
built using HTML, CSS, and JavaScript.

Example:

Twitter Lite Pinterest Uber


Email Marketing using HTML

HTML in email marketing, marketers can


create visually engaging and personalized
campaigns that effectively communicate their
message to people.
Ebooks and Digital Publishing using HTML

HTML servers as the


backbone for structuring
and presenting content in
digital publishing and
eBooks
4 HTML and Web Security
Security is vital in web development, ensuring trust, data integrity,
and a website's reputation. It's crucial for user trust, and developers
must protect data to prevent incidents impacting reputation and
legal compliance. Robust security prevents unauthorized access,
maintaining web service availability and enhancing user
experience. Prioritizing security is a strategic advantage, setting
businesses apart and demonstrating a commitment to ethical digital
practices. Ultimately, security is not optional; it's fundamental in
responsible web development.
Cyber Attacks

HTML Injection
Session Hijacking
The malicious act of tacking control of a user’s web session
DDOS Attack (Distributed Denial of Service)

(DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish
this by flooding the target with traffic, or sending it information that triggers a crash.
SQL Injection
SQL injection is a code injection technique that might destroy your database
SQL Code:

Login Page

The code at the server will create a valid SQL statement like this:

The SQL statement

The SQL above is valid and will return all rows from the
"Users" table, since OR ""="" is always TRUE.

This can potentially lead to login bypass without


a valid password
Social Engineering
Social engineering is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal
personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive
information.
Clickjacking
The malicious practice of manipulating a website user’s activity by concealing
hyperlinks beneath the original link.
Protecting yourself from web attacks

Keep Software Updated Keep personal information private

Enable Two-factor Authentication Use Strong and Unique Passwords

Use HTTPS
Install and Update Security Software

Secure your wifi network Be Mindful of Social Engineering


FAQ

Am I completely safe on internet by following these steps?

• Following these steps greatly enhances your online security

• They significantly reduce the risk of falling victim to common cyber threats.

• However, absolute safety on the internet is challenging to guarantee

• New vulnerabilities, including zero-day exploits, may emerge despite best practices.

Zero-Day Exploits

A zero-day (0day) exploit is a cyber attack targeting a software


vulnerability which is unknown to the software vendor or to
antivirus vendors.
Beyond the Web: Exploring the High-Risk Realms of
Hacking

Stuxnet is a computer worm that was designed with the specific


purpose of sabotaging Iran's nuclear program. Stuxnet is
considered one of the most sophisticated and targeted cyber
weapons ever discovered

Ransomware is a type of malicious software designed to deny


access to a computer system or data until a sum of money, or
ransom, is paid by the victim.
Russia's cyberwarfare involves different tactics to influence and
disrupt. They use denial-of-service attacks to overwhelm
systems, hacker attacks to break into networks, and spread
disinformation and propaganda online. State-sponsored teams
may also participate in political blogs, keeping an eye on the
internet using surveillance technology
THANK YOU

You might also like