0% found this document useful (0 votes)
50 views68 pages

Chapter 2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views68 pages

Chapter 2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 68

Lesson 2

Connecting and
Communicating online
The Internet
► The Internet is a
worldwide collection
of networks that
connects millions of
businesses,
government agencies,
educational
institutions, and
individuals

2
Connecting to the Internet

Wired Wireless

• Cable Internet • Wi-Fi (wireless


service fidelity)
• DSL (digital • Mobile broadband
subscriber line) • Fixed wireless
• Fiber to the • Satellite Internet
Premises (FTTP) Service

3
Connecting to the Internet
►A hot spot is a wireless network that provides
Internet connections to mobile computers and
devices

4
Connecting to the Internet
► An Internet service provider (ISP) is a business that provides individuals and
organizations access to the Internet free or for a fee
► Bandwidth represents the amount of data that travels over a network
► Megabyte (MB)
► Gigabyte (GB)

5
Connecting to the Internet

6
Connecting to the Internet
► AnIP address is a sequence of numbers that
uniquely identifies each computer or device
connected to the Internet
►A domain name is a text-based name that
corresponds to the IP address
►A DNS server translates the domain name into its
associated IP address

7
Connecting to the Internet

8
The World Wide Web
► The World Wide Web (WWW), or web, consists of a worldwide collection of
electronic documents (webpages)
► A website is a collection of related webpages and associated items
► A web server is a computer that delivers requested webpages to your computer
► Web 2.0 refers to websites that provide a means for users to share personal
information, allow users to modify website content, and provide applications
through a browser

9
The World Wide Web
► A browser is an
application that enables
users with an Internet
connection to access
and view webpages on a
computer or mobile
device
► A home page is the first
page that a website
displays
► Current browsers
typically support tabbed
10
browsing
The World Wide Web
► A webpage has a unique address, called a web address or URL

11
The World Wide Web
► A web app is an application stored on a web server that you access through a
browser
► Web app hosts usually provide storage for users’ data and information on their
servers, known as cloud storage

12
Types of Websites
► Web publishing is the creation and maintenance of websites

Design Create Maintain


Plan the Host the
the the the
website website
website website website

13
Digital Media on the Web
► Multimedia refers to any application that combines text with media

Graphics Animation Audio

Virtual
Video
Reality
14
Digital Media on the Web
►A graphic is a visual
representation of
nontext information
► Graphicformats
include BMP, GIF,
JPEG, PNG, and TIFF

15
Digital Media on the Web
► Aninfographic is a
visual representation
of data and
information, designed
to communicate
quickly, simplify
complex concepts, or
present patterns or
trends

16
Digital Media on the Web
► Animation is the appearance of motion created by displaying a series of still
images in sequence

17
Digital Media on the Web
► Audio includes music, speech, or any other sound
► Compressed to reduce file size
► Youlisten to audio on your computer using a media
player

18
Digital Media on the Web
► Video consists of images displayed in motion
► Virtualreality (VR) is the use of computers to
simulate a real or imagined environment that
appears as a three-dimensional space

19
Digital Media on the Web

A plug-in, or add-on,
is a program that
extends the capability
of a browser

20
Other Internet Services
► Email is the
transmission of
messages and files
via a computer
network
► An email program
allows you to create,
send, receive,
forward, store, print,
and delete email
messages
21
Other Internet Services
► An
email list is a group of email addresses used for
mass distribution of a message

22
Other Internet Services
► Instant messaging services notify you when one or more of your established
contacts are online and then allows you to exchange messages or files or join a
private chat room with them

23
Other Internet Services
► A chat is a real-time
typed conversation
that takes place on a
computer or mobile
device with many other
online users
► A chat room is a
website or application
that permits users to
chat with others who
are online at the same
time
24
Other Internet Services
► VoIP(Voice over IP) enables users to speak to
other users via their Internet connection

25
Other Internet Services
► FTP (File Transfer Protocol) is an Internet standard that permits file uploading
and downloading to and from other computers on the Internet
► Many operating systems include FTP capabilities
► An FTP server is a computer that allows users to upload and/or download files
using FTP

26
Digital Security Risks
►A digital security risk is any event or action that
could cause a loss of or damage to a computer or
mobile device hardware, software, data,
information, or processing capability
► Anyillegal act involving the use of a computer or
related devices generally is referred to as a
computer crime
►A cybercrime is an online or Internet-based illegal
act

27
Digital Security Risks

28
Digital Security Risks

Hacker Cracker Script kiddie

Unethical
Corporate spies Cyberextortionist
employees

Cyberterrorist

29
Internet and Network Attacks
► Information transmitted
over networks has a
higher degree of security
risk than information
kept on an organization’s
premises
► Malware, short for
malicious software,
consists of programs that
act without a user’s
knowledge and
deliberately alter the
operations of computers
and mobile devices

30
Internet and Network Attacks

31
Internet and Network Attacks
► A botnet is a group of compromised computers or mobile
devices connected to a network
► A compromised computer or device is known as a zombie
► A denial of service attack (DoS attack) disrupts computer
access to an Internet service
► Distributed DoS attack (DDoS attack)
► A back door is a program or set of instructions in a program
that allow users to bypass security controls
► Spoofing is a technique intruders use to make their network
or Internet transmission appear legitimate

32
Internet and Network Attacks
► A firewall is hardware and/or software that protects a network’s resources from
intrusion

33
Unauthorized Access and Use

Unauthorized use is
Unauthorized access is
the use of a computer
the use of a computer
or its data for
or network without
unapproved or possibly
permission
illegal activities

34
Unauthorized Access and Use
► Organizationstake
several measures to
help prevent
unauthorized access
and use
► Acceptable use policy
► Disable file and
printer sharing

35
Unauthorized Access and Use
► Access controls define who can access a computer, device, or network; when
they can access it; and what actions they can take while accessing it
► The computer, device, or network should maintain an audit trail that records in
a file both successful and unsuccessful access attempts
► User name
► Password

36
Unauthorized Access and Use
► A passphrase is a private combination of words, often
containing mixed capitalization and punctuation, associated
with a user name that allows access to certain computer
resources
► A PIN (personal identification number), sometimes called a
passcode, is a numeric password, either assigned by a
company or selected by a user
► A possessed object is any item that you must possess, or
carry with you, in order to gain access to a computer or
computer facility
► A biometric device authenticates a person’s identity by
translating a personal characteristic into a digital code that
is compared with a digital code in a computer or mobile 37
Unauthorized Access and Use

Face
Fingerprint
recognition
reader
system

Hand Voice
geometry verification
system system

Signature Iris
verification recognition
system system
38
Unauthorized Access and Use
► Two-step verification uses two separate methods, one after the next, to verify
the identity of a user

39
Unauthorized Access and Use
► Digital forensics is the discovery, collection, and analysis of evidence found on
computers and networks
► Many areas use digital forensics

Law Criminal Military


enforcement prosecutors intelligence

Information
Insurance
security
agencies
departments
40
Software Theft
► Software theft occurs when someone:

Steals software Intentionally


media erases programs

Illegally
registers and/or Illegally copies
activates a a program
program
41
Software Theft
► Many manufacturers incorporate an activation process into their programs to
ensure the software is not installed on more computers than legally licensed
► During the product activation, which is conducted either online or by phone,
users provide the software product’s identification number to associate the
software with the computer or mobile device on which the software is installed

42
Software Theft
►A license agreement is the right to use software

43
Information Theft
► Information theft occurs when someone steals personal or confidential
information
► Encryption is a process of converting data that is readable by humans into
encoded characters to prevent unauthorized access

44
Information Theft

45
Information Theft
► A digital signature is an encrypted code that a person, website, or organization
attaches to an electronic message to verify the identity of the message sender
► Often used to ensure that an impostor is not participating in an Internet transaction
► A digital certificate is a notice that guarantees a user or a website is legitimate
► A website that uses encryption techniques to secure its data is known as a
secure site

46
Information Theft

47
Hardware Theft, Vandalism,
and Failure

Hardware vandalism
Hardware theft is is the act of
the act of stealing defacing or
digital equipment destroying digital
equipment

48
Hardware Theft, Vandalism,
and Failure

49
Backing Up – The Ultimate

Safeguard
A backup is a duplicate of a file, program, or media that can be used if the
original is lost, damaged, or destroyed
► To back up a file means to make a copy of it
► Off-site backups are stored in a location separate from the computer or mobile
device site

Cloud
Storage

50
Backing Up – The Ultimate
Safeguard
► Categories of ► Three-generation
backups: backup policy
► Full Grandpare
nt
► Differential

► Incremental

► Selective Parent
► Continuous data
protection
► Cloud Child

51
Backing Up – The Ultimate
Safeguard

52
Wireless Security
► Wireless access poses
additional security risks
► Some perpetrators
connect to other’s
wireless networks to gain
free Internet access or
confidential data
► Others connect to a
network through an
unsecured wireless
access point (WAP) or
combination router/WAP

53
Ethics and Society
► Technology ethics are
the moral guidelines
that govern the use of
computers, mobile
devices, information
systems, and related
technologies
► Information accuracy is
a concern
► Notall information on
the Internet is correct

54
Ethics and Society
► Intellectual property refers to unique and original works such as ideas,
inventions, art, writings, processes, company and product names, and logos
► Intellectual property rights are the rights to which creators are entitled to their
work
► A copyright protects any tangible form of expression
► Digital rights management (DRM) is a strategy designed to prevent illegal
distribution of movies, music, and other digital content

55
Ethics and Society
► A code of conduct is a written guideline that helps determine whether a
specification is ethical/unethical or allowed/not allowed

56
Ethics and Society
► Green computing involves reducing the electricity and environmental waste
while using computers, mobile devices, and related technologies

57
Information Privacy
► Information privacy refers to the right of individuals and companies to deny or
restrict the collection, use, and dissemination of information about them
► Huge databases store data online
► Websites often collect data about you, so that they can customize
advertisements and send you personalized email messages
► Some employers monitor your computer usage and email messages

58
Information Privacy

59
Information Privacy
► Information about
you can be stored in
a database when you:
► Fillout a printed or
online form
► Create a profile on an
online social network
► Registera product
warranty

60
Information Privacy
►A cookie is a small text file that a web server
stores on your computer
► Websites use cookies for a variety of reasons:
Store user Assist with
Allow for
names and/or online
personalization
passwords shopping

Track how
Target
often users
advertisements
visit a site
61
Information Privacy

62
Information Privacy
► Phishing is a scam in which a perpetrator sends an official looking email
message that attempts to obtain your personal and/or financial information
► With clickjacking, an object that can be tapped or clicked on a website contains
a malicious program

63
Information Privacy
► Spyware is a program placed on a computer or mobile device without the user’s
knowledge that secretly collects information about the user and then
communicates the information it collects to some outside source while the user
is online
► Adware is a program that displays an online advertisement in a banner or pop-
up window on webpages, email messages, or other Internet services

64
Information Privacy
► Social engineering is defined as gaining unauthorized access to or obtaining
confidential information by taking advantage of the trusting human nature of
some victims and the naivety of others

65
Information Privacy
► The concern about privacy has led to the enactment of federal and state laws
regarding the storage and disclosure of personal data
► See Table 5-3 on page 246 for a listing of major U.S. government laws concerning
privacy

66
Information Privacy

Employee monitoring involves the use of computers,


mobile devices, or cameras to observe, record, and review
an employee’s use of a technology, including
communications such as email messages, keyboard activity
(used to measure productivity), and websites visited

Many programs exist that easily allow employers to


monitor employees. Further, it is legal for employers to
use these programs

67
Information Privacy
► Content filtering is
the process of
restricting access to
certain material
► Many businesses use
content filtering
► Web filtering
software restricts
access to specified
websites
68

You might also like