Lesson 2
Connecting and
Communicating online
The Internet
► The Internet is a
worldwide collection
of networks that
connects millions of
businesses,
government agencies,
educational
institutions, and
individuals
2
Connecting to the Internet
Wired Wireless
• Cable Internet • Wi-Fi (wireless
service fidelity)
• DSL (digital • Mobile broadband
subscriber line) • Fixed wireless
• Fiber to the • Satellite Internet
Premises (FTTP) Service
3
Connecting to the Internet
►A hot spot is a wireless network that provides
Internet connections to mobile computers and
devices
4
Connecting to the Internet
► An Internet service provider (ISP) is a business that provides individuals and
organizations access to the Internet free or for a fee
► Bandwidth represents the amount of data that travels over a network
► Megabyte (MB)
► Gigabyte (GB)
5
Connecting to the Internet
6
Connecting to the Internet
► AnIP address is a sequence of numbers that
uniquely identifies each computer or device
connected to the Internet
►A domain name is a text-based name that
corresponds to the IP address
►A DNS server translates the domain name into its
associated IP address
7
Connecting to the Internet
8
The World Wide Web
► The World Wide Web (WWW), or web, consists of a worldwide collection of
electronic documents (webpages)
► A website is a collection of related webpages and associated items
► A web server is a computer that delivers requested webpages to your computer
► Web 2.0 refers to websites that provide a means for users to share personal
information, allow users to modify website content, and provide applications
through a browser
9
The World Wide Web
► A browser is an
application that enables
users with an Internet
connection to access
and view webpages on a
computer or mobile
device
► A home page is the first
page that a website
displays
► Current browsers
typically support tabbed
10
browsing
The World Wide Web
► A webpage has a unique address, called a web address or URL
11
The World Wide Web
► A web app is an application stored on a web server that you access through a
browser
► Web app hosts usually provide storage for users’ data and information on their
servers, known as cloud storage
12
Types of Websites
► Web publishing is the creation and maintenance of websites
Design Create Maintain
Plan the Host the
the the the
website website
website website website
13
Digital Media on the Web
► Multimedia refers to any application that combines text with media
Graphics Animation Audio
Virtual
Video
Reality
14
Digital Media on the Web
►A graphic is a visual
representation of
nontext information
► Graphicformats
include BMP, GIF,
JPEG, PNG, and TIFF
15
Digital Media on the Web
► Aninfographic is a
visual representation
of data and
information, designed
to communicate
quickly, simplify
complex concepts, or
present patterns or
trends
16
Digital Media on the Web
► Animation is the appearance of motion created by displaying a series of still
images in sequence
17
Digital Media on the Web
► Audio includes music, speech, or any other sound
► Compressed to reduce file size
► Youlisten to audio on your computer using a media
player
18
Digital Media on the Web
► Video consists of images displayed in motion
► Virtualreality (VR) is the use of computers to
simulate a real or imagined environment that
appears as a three-dimensional space
19
Digital Media on the Web
A plug-in, or add-on,
is a program that
extends the capability
of a browser
20
Other Internet Services
► Email is the
transmission of
messages and files
via a computer
network
► An email program
allows you to create,
send, receive,
forward, store, print,
and delete email
messages
21
Other Internet Services
► An
email list is a group of email addresses used for
mass distribution of a message
22
Other Internet Services
► Instant messaging services notify you when one or more of your established
contacts are online and then allows you to exchange messages or files or join a
private chat room with them
23
Other Internet Services
► A chat is a real-time
typed conversation
that takes place on a
computer or mobile
device with many other
online users
► A chat room is a
website or application
that permits users to
chat with others who
are online at the same
time
24
Other Internet Services
► VoIP(Voice over IP) enables users to speak to
other users via their Internet connection
25
Other Internet Services
► FTP (File Transfer Protocol) is an Internet standard that permits file uploading
and downloading to and from other computers on the Internet
► Many operating systems include FTP capabilities
► An FTP server is a computer that allows users to upload and/or download files
using FTP
26
Digital Security Risks
►A digital security risk is any event or action that
could cause a loss of or damage to a computer or
mobile device hardware, software, data,
information, or processing capability
► Anyillegal act involving the use of a computer or
related devices generally is referred to as a
computer crime
►A cybercrime is an online or Internet-based illegal
act
27
Digital Security Risks
28
Digital Security Risks
Hacker Cracker Script kiddie
Unethical
Corporate spies Cyberextortionist
employees
Cyberterrorist
29
Internet and Network Attacks
► Information transmitted
over networks has a
higher degree of security
risk than information
kept on an organization’s
premises
► Malware, short for
malicious software,
consists of programs that
act without a user’s
knowledge and
deliberately alter the
operations of computers
and mobile devices
30
Internet and Network Attacks
31
Internet and Network Attacks
► A botnet is a group of compromised computers or mobile
devices connected to a network
► A compromised computer or device is known as a zombie
► A denial of service attack (DoS attack) disrupts computer
access to an Internet service
► Distributed DoS attack (DDoS attack)
► A back door is a program or set of instructions in a program
that allow users to bypass security controls
► Spoofing is a technique intruders use to make their network
or Internet transmission appear legitimate
32
Internet and Network Attacks
► A firewall is hardware and/or software that protects a network’s resources from
intrusion
33
Unauthorized Access and Use
Unauthorized use is
Unauthorized access is
the use of a computer
the use of a computer
or its data for
or network without
unapproved or possibly
permission
illegal activities
34
Unauthorized Access and Use
► Organizationstake
several measures to
help prevent
unauthorized access
and use
► Acceptable use policy
► Disable file and
printer sharing
35
Unauthorized Access and Use
► Access controls define who can access a computer, device, or network; when
they can access it; and what actions they can take while accessing it
► The computer, device, or network should maintain an audit trail that records in
a file both successful and unsuccessful access attempts
► User name
► Password
36
Unauthorized Access and Use
► A passphrase is a private combination of words, often
containing mixed capitalization and punctuation, associated
with a user name that allows access to certain computer
resources
► A PIN (personal identification number), sometimes called a
passcode, is a numeric password, either assigned by a
company or selected by a user
► A possessed object is any item that you must possess, or
carry with you, in order to gain access to a computer or
computer facility
► A biometric device authenticates a person’s identity by
translating a personal characteristic into a digital code that
is compared with a digital code in a computer or mobile 37
Unauthorized Access and Use
Face
Fingerprint
recognition
reader
system
Hand Voice
geometry verification
system system
Signature Iris
verification recognition
system system
38
Unauthorized Access and Use
► Two-step verification uses two separate methods, one after the next, to verify
the identity of a user
39
Unauthorized Access and Use
► Digital forensics is the discovery, collection, and analysis of evidence found on
computers and networks
► Many areas use digital forensics
Law Criminal Military
enforcement prosecutors intelligence
Information
Insurance
security
agencies
departments
40
Software Theft
► Software theft occurs when someone:
Steals software Intentionally
media erases programs
Illegally
registers and/or Illegally copies
activates a a program
program
41
Software Theft
► Many manufacturers incorporate an activation process into their programs to
ensure the software is not installed on more computers than legally licensed
► During the product activation, which is conducted either online or by phone,
users provide the software product’s identification number to associate the
software with the computer or mobile device on which the software is installed
42
Software Theft
►A license agreement is the right to use software
43
Information Theft
► Information theft occurs when someone steals personal or confidential
information
► Encryption is a process of converting data that is readable by humans into
encoded characters to prevent unauthorized access
44
Information Theft
45
Information Theft
► A digital signature is an encrypted code that a person, website, or organization
attaches to an electronic message to verify the identity of the message sender
► Often used to ensure that an impostor is not participating in an Internet transaction
► A digital certificate is a notice that guarantees a user or a website is legitimate
► A website that uses encryption techniques to secure its data is known as a
secure site
46
Information Theft
47
Hardware Theft, Vandalism,
and Failure
Hardware vandalism
Hardware theft is is the act of
the act of stealing defacing or
digital equipment destroying digital
equipment
48
Hardware Theft, Vandalism,
and Failure
49
Backing Up – The Ultimate
►
Safeguard
A backup is a duplicate of a file, program, or media that can be used if the
original is lost, damaged, or destroyed
► To back up a file means to make a copy of it
► Off-site backups are stored in a location separate from the computer or mobile
device site
Cloud
Storage
50
Backing Up – The Ultimate
Safeguard
► Categories of ► Three-generation
backups: backup policy
► Full Grandpare
nt
► Differential
► Incremental
► Selective Parent
► Continuous data
protection
► Cloud Child
51
Backing Up – The Ultimate
Safeguard
52
Wireless Security
► Wireless access poses
additional security risks
► Some perpetrators
connect to other’s
wireless networks to gain
free Internet access or
confidential data
► Others connect to a
network through an
unsecured wireless
access point (WAP) or
combination router/WAP
53
Ethics and Society
► Technology ethics are
the moral guidelines
that govern the use of
computers, mobile
devices, information
systems, and related
technologies
► Information accuracy is
a concern
► Notall information on
the Internet is correct
54
Ethics and Society
► Intellectual property refers to unique and original works such as ideas,
inventions, art, writings, processes, company and product names, and logos
► Intellectual property rights are the rights to which creators are entitled to their
work
► A copyright protects any tangible form of expression
► Digital rights management (DRM) is a strategy designed to prevent illegal
distribution of movies, music, and other digital content
55
Ethics and Society
► A code of conduct is a written guideline that helps determine whether a
specification is ethical/unethical or allowed/not allowed
56
Ethics and Society
► Green computing involves reducing the electricity and environmental waste
while using computers, mobile devices, and related technologies
57
Information Privacy
► Information privacy refers to the right of individuals and companies to deny or
restrict the collection, use, and dissemination of information about them
► Huge databases store data online
► Websites often collect data about you, so that they can customize
advertisements and send you personalized email messages
► Some employers monitor your computer usage and email messages
58
Information Privacy
59
Information Privacy
► Information about
you can be stored in
a database when you:
► Fillout a printed or
online form
► Create a profile on an
online social network
► Registera product
warranty
60
Information Privacy
►A cookie is a small text file that a web server
stores on your computer
► Websites use cookies for a variety of reasons:
Store user Assist with
Allow for
names and/or online
personalization
passwords shopping
Track how
Target
often users
advertisements
visit a site
61
Information Privacy
62
Information Privacy
► Phishing is a scam in which a perpetrator sends an official looking email
message that attempts to obtain your personal and/or financial information
► With clickjacking, an object that can be tapped or clicked on a website contains
a malicious program
63
Information Privacy
► Spyware is a program placed on a computer or mobile device without the user’s
knowledge that secretly collects information about the user and then
communicates the information it collects to some outside source while the user
is online
► Adware is a program that displays an online advertisement in a banner or pop-
up window on webpages, email messages, or other Internet services
64
Information Privacy
► Social engineering is defined as gaining unauthorized access to or obtaining
confidential information by taking advantage of the trusting human nature of
some victims and the naivety of others
65
Information Privacy
► The concern about privacy has led to the enactment of federal and state laws
regarding the storage and disclosure of personal data
► See Table 5-3 on page 246 for a listing of major U.S. government laws concerning
privacy
66
Information Privacy
Employee monitoring involves the use of computers,
mobile devices, or cameras to observe, record, and review
an employee’s use of a technology, including
communications such as email messages, keyboard activity
(used to measure productivity), and websites visited
Many programs exist that easily allow employers to
monitor employees. Further, it is legal for employers to
use these programs
67
Information Privacy
► Content filtering is
the process of
restricting access to
certain material
► Many businesses use
content filtering
► Web filtering
software restricts
access to specified
websites
68