0% found this document useful (0 votes)
8 views

Unit 4 Internet & Security

The document provides an overview of internet security issues, the history of the internet, and various internet services and connection types. It discusses the evolution of the internet from ARPANET to modern-day services like email and online shopping, as well as the importance of security measures against threats like hackers and malware. Additionally, it highlights the role of the internet in business and the various ways individuals can earn money online.

Uploaded by

shewaledipa2210
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Unit 4 Internet & Security

The document provides an overview of internet security issues, the history of the internet, and various internet services and connection types. It discusses the evolution of the internet from ARPANET to modern-day services like email and online shopping, as well as the importance of security measures against threats like hackers and malware. Additionally, it highlights the role of the internet in business and the various ways individuals can earn money online.

Uploaded by

shewaledipa2210
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 40

INTERNET SECURITY

ISSUES
Internet is a worldwide network that connects millions of
computers allowing them to share information with each
other. Today, you can use the internet to send and
receive messages, chat with friends, pay bills, book
tickets, buy and sell goods, play games, listen to music
and watch videos. The biggest advantage of using the
internet is that you can access the services and
information on it from anywhere in the world at any time
of the day.
HISTORY OF INTERNET

ARPANET was created in 1969 and provided the foundation


for what came to be known as the Internet. The term Internet
became widely used to describe the concept of a worldwide
network or connected networks in 1982. E-mail systems date
back to the mid-1960s and predate ARPANET and the
Internet.
This year saw the first connection between computers at
Stanford and UCLA. ARPANET was a computer network that
brought together the best ideas from teams at the
Massachusetts Institute of Technology (MIT), the National
Physics Laboratory (NPL) and the Rand Corporation (RC).
 CONNECTING TO THE INTERNET
The internet services listed above can be used only when your computer
is connected to the internet. There are various companies called Internet
Service Providers (ISPs) that provide us an internet connection for a
fee. BSNL, Airtel, TATA and Jio are some of the popular Internet Service
Providers. They provide us access to the internet through telephone lines,
cables or using radio frequency bands (wireless). There are many ways
to connect to the internet. Some of these are explained below.
 Dial-up Connection
This connection uses a telephone line to connect a
computer to the internet. It requires a device
called a modem to work as an interface between
the computer and the telephone line. The
modem converts anlog signals transmitted
through the phone line into digital signals and vice
versa. The dial-up connection is a slow connection
and most people are now moving on to a
broadband connection.
 BROADBAND
This type of connection is the most used form of internet connection
because of its high speed. A broadband connection is available in different
forms such as DSL (Digital Subscriber Line), broadband cable
connection, using fiber-optic cables and satellite connection. A
broadband connection allows us to use internet services that require high
speed, such as playing online games or watching online videos. With a
broadband connection, we can be constantly connected to the internet.
 WIRELESS
Wireless connection uses radio frequency bands for
connecting to the internet. It offers high speeds and can be
used for mobile devices, such as tablets and smart phones.
It is a broadband connection without using wires or cables. It
uses either the Wi-Fi or Bluetooth technology. Wi-Fi can be
found in homes, café’s, airports and other public spots.
 INTERNET SERVICES

The internet provides us with tools for performing a number of useful tasks
or activities. Some of these activities are listed below.

 Sending and receiving mails


The electronic mail or email enables us to communicate with
people connected to the internet, wherever they are in the
world. We can also share resources, such as images, videos
and other files with them. Gmail, Yahoo! Mail, Zoho Mail are
some of the free email service providers on the internet.
 Searching for
information
We can use the World Wide Web to look for
specific information. We can do this by
using search engines that make the
information available in seconds. Google,
Bing, Yahoo! and Ask. com are a few examples
of search engines.

 Talking to friends and family


through video chatting
applications
Video chatting applications allow us to
communicate with other internet users face
to face using a computer or other mobile
devices. Some popular video chatting
applications include Skype, Facetime, Google
Hangouts and WhatsApp.
 BUYING PRODUCTS FROM ONLINE STORES
We can buy a variety of products
using online shopping stores, from
clothes to groceries, sitting at home.
Amazon, Flipkart and Snapdeal are
some of the popular online stores.

 Listening to online music


and watching online movies
Internet has a number of resources
available for listening to music and
watching movies and other videos. Free
Music Archive and Internet Archive are
two sites where you can look for free
music and movies.
 PLAYING ONLINE GAMES

There are many games available on


the internet that you can play
individually and also with others who
are online. Example: Candy Crush
and Farmville.

 Booking tickets for travel


and movies
You can use the internet to book
tickets for travelling by train or flight.
You can also book cabs, movie
tickets and make hotel reservation
online.
 COMMUNICATION USING EMAIL
E-mail or email stands for electronic mail. It is a facility on the internet to
send and receive messages from one user to another. It is the fastest
and most popular medium of communication. You can also send
images, audio and video through emails. In order to send and receive
emails, you need to register with an email service provider that provides
you with a username and a secret code or password for logging in to
your account. There are many websites that allow you to create your
email account free of cost. Gmail, Yahoo and Hotmail are some of the
popular email service providers.
 Email address
When you create an email account, you are
provided with a unique email address using which
people can send you mails. An email address is
made up of two parts, the first part is the
username that you choose, and the second part is
the domain name of the email service provider.
 COMPONENTS OF AN EMAIL ADDRESS
 Username: A username is the unique identification
given to the user when he/she creates an account
with an email service provider.
 @: It is a symbol used to separate the username
from the domain name. It is read aloud as ‘at’ sign.
 Domain Name: The domain name is the name of the
email service provider.
 CREATING AN EMAIL ACCOUNT

The following steps provide instructions


to create a Gmail account.
Step 1: Open a web browser such as
Internet Explorer or Google Chrome.
Step 2: Type the address
‘www.gmail.com’ in the address bar. The
Gmail home page will appear.
Step 3: Click the ‘Create account’
button at the bottom to fill up the
registration form and signup for a new
account.
Step 4: The registration form appears; fill
up all necessary details in the given text
boxes.
(Note: The entries marked with a * sign are compulsory and
you cannot proceed without filling those entries.)
Step 5: Review Google’s Terms of Service and then click on the I
AGREE button.
Once an email account is created, you can login anytime using the
username and password. After logging in, you are taken to the Inbox
where you can see your mails.
 COMPOSING AN EMAIL
The compose option is used to type an email. Let us see the different
components of the Compose window.
To: This is used to type the email address of the person to whom you want to send
an email. You can send the same mail to more than one person by typing their
email addresses here separated by commas.
Cc: This stands for Carbon Copy. It is used to add the email addresses of
recipients who should receive a copy of the mail. The email addresses mentioned in
Cc are visible to all the recipients.
Bcc: This stands for Blind Carbon Copy. It is also used to add the email
addresses of the recipients who will receive a copy of the mail. However, the email
addresses of other recipients mentioned in this field are not visible to the receiver.
Subject: This field can be used to give a brief idea to the recipient about the
content of the email. The content of the subject is displayed in the inbox and thus
it can be used to get an idea about the content of the mail before opening the mail
for reading.
Text in the email body: You can type the actual content of the email in this field
that may include the greeting, paragraphs and closing by your name. To apply a
different formatting to the text you can select the Text formatting option.
 REPLYING TO AN EMAIL
You can reply to a received mail by
using the Reply option. To reply to
all the email addresses mentioned in
the mail, use the Reply to all
option.

 Forwarding an email

You can send a received mail to


another person by using the Forward
option.
 DELETING A MAIL
You can delete a mail, either
after opening it or without
opening it.

 Attaching a file
We can also send files along with our mail. These files can be
pictures, audio, video, or any other format. They need to be
attached to the mail.
Step 1: Click on the Paperclip icon from the toolbar at the
bottom of the Compose window.
Step 2: A window appears from where you can select files for
attaching from your computer. You can attach multiple files to
your email.
 SIGNING OUT OR LOGGING OUT

It is important to sign out of your account after you have


completed using it to protect your privacy. You should make
sure to do this especially while using public computers. If you
don’t sign out, others who may use the same computer could
gain access to your mail box and private data.

To sign out, click the round icon at the top-right corner and
click on the Sign Out button.
 EMAIL ETIQUETTES
Email is a formal way of communication. Therefore, you need to follow some
rules or etiquettes while sending an email. Follow the given guidelines for
composing effective emails.
z Begin by thinking about the subject. It should convey the topic of the
email. In case this is not done, the receiver may not open or read the email.
z Greeting others in an email is as important as doing so in person. Include
a ‘Hi’, ‘Good morning’ or ‘Dear’ before the recipient’s name.
Take time to construct the mail body. Check if you are using correct
grammar and punctuation.
Do not use all lower case or all caps. It will fail to convey a good impression
about you.
Close the message with a courteous line or phrase such as ‘Thank you 'or
‘Regards followed by your name.
z Try to keep your email short and to the point.
WEB BROWSERS:

A web browser is an application for accessing websites. When a user requests a web page
from a particular website, the browser retrieves its files from a web server and then
displays the page on the user's screen. Browsers are used on a range of devices,
including desktops, laptops, tablets, and smartphones. By 2020, an estimated 4.9 billion
people had used a browser.[1] The most-used browser is Google Chrome, with a 64%
global market share on all devices, followed by Safari with 19%.
SEARCH ENGINE:
A search engine is a software system that provides hyperlinks to
web pages and other relevant information on the Web in response to a
user's query. The user inputs a query within a web browser or a
mobile app, and the search results are often a list of hyperlinks,
accompanied by textual summaries and images. Users also have the
option of limiting the search to a specific type of results, such as images,
videos, or news.
W W W(WORLD WIDE WEB)
The World Wide Web -- also known as the web, WWW or W3 -- refers to all the
public websites or pages that users can access on their local computers and
other devices through the internet. These pages and documents are
interconnected by means of hyperlinks that users click on for information. This
information can be in different formats, including text, images, audio and video.

The term World Wide Web isn't synonymous with the internet. Rather, the
World Wide Web is part of the internet.
MESSAGING GROUPS:
Like the name implies, group messaging is an ongoing SMS
conversation between three or more recipients at the same time.
SOCIAL NETWORKING:
Social networking uses internet-based social media sites to stay
connected with friends, family, colleagues, or customers. Social
networking can have a social purpose, a business purpose, or
both through sites like Facebook, X, Instagram, and Pinterest.
INTERNET IN BUSINESS
The internet provides
access to information
on products/services,
market requirements,
demand from various
geographies for a
product, competitor's
business data, and
other market-related
data. These data will
be useful in market
research and
Today, millions of people
are making money
online, but millions more
wait in the wings
because they only
believe a few ways exist
to create an income
stream on the Internet.

The good news is that


this is far from being the
truth. There are many
different ways to earn
money on the Internet
today and many different
types of online
businesses to leverage
 Safety Measures while Using the
SecurityInternet
Issues
Although Internet led to many benefits, it also poses a greater potential for security threats. Below
are a number of common Internet security issues.
Hacker
Hacker – refers to a person who can gain unauthorized access to (break into) a computer or a
network to commit crimes.
Some things a skilled hacker can do to your computer:
•Hijack your usernames and passwords;
•Gain access to the personal information (credit card numbers, bank account, Social Insurance
Number, etc.);
•Steal, change, exploit, sell, or destroy data;
•Damage or bring down the system;
•Hold the system hostage to collect ransom;
Malware
Malware (short for malicious software) – a software that is designed to damage, disrupt, or
infect computers.
•Malware is a single term that refers to all the different types of threats to your computer safety
such as virus, Trojan horse, worm, spyware, etc.
•Malware can gain unauthorized access to a computer and continuously run in the background
without the owner’s knowledge.
Computer virus
Computer virus – a specific type of malware that is designed to replicate (copy) and spread
from one computer to another.
•A virus can make a copy of itself over and over again.
•A virus can spread from one computer to another through email attachments, removable
storage devices, networks (Internet messaging services, download infected files …), etc.
•A virus can damage your computer by corrupting system files, sending spam, stealing data and
personal information from your computer, destroying data, deleting everything on your hard
drive, etc.
Trojan horse
Trojan horse (or Trojan) – a type of malware that looks harmless but can cause harm to a
computer system.
•A Trojan misleads users of its true intent.
•A Trojan may claim to get rid of your computer viruses but instead introduce viruses onto your
computer.
•A Trojan can take the form of innocent-looking email attachments, downloads, etc.
Worm
Worm – it is similar to a virus (a sub-class of a virus). It is designed to quickly self-replicate
and spread copies of itself from one computer to another.
•The key difference between a worm and a virus is that a worm does not require any human
action to replicate while a virus does. A virus only spreads when a user opens an affected file
whereas a worm spreads without the use of a host file.
Phishing
Phishing – a scammer uses deceptive emails or websites and tries to obtain valuable personal
information (i.e., username, password, account number, etc.).
•Phishing is a common online scam used by cyber criminals.
•A scammer may use a deceptive email or website appearing to represent a legitimate firm.
Spyware
Spyware – a software that secretly monitors (spies) user’s online behaviour and gets sensitive
information about a person or organization without the user’s knowledge.
•A spyware can record a user’s Web browsing habits, email messages, keystrokes on online
advertisements, personal information, etc., and forward it to a third party.
•Advertisers can use spyware to target specific advertisements to your tastes.
•Criminal organizations can use spyware to collect financial information (banking accounts,
credit card information, password, etc.).

You might also like