Internet
Internet
INTERNET ACCESS
To gain access to the internet, the user has to register to any Internet Service
Provider (ISP). An internet service provider (or ISP) is a company that provides its
customers with access to the Internet. The largest internet service providers are
national companies and are referred to as national internet service providers.
National internet service providers provide internet access to smaller regional and
local ISPs, from whom homes and businesses can buy access to the Internet.
Cable
- Broadband – faster than dial-up and
DSL
- Use cable connection
- Always on
- Only available where cable is
available
Internet Requirement
- Computer with modem/router/network card
- Internet account with ISP
- Application software:
Web browser (Firefox, Chrome)
Email client (MS Outlook)
- Plugins software (Adobe Reader, Flash Player)
- Optional: Speaker, Printer, Webcam
INTERNET USAGES
- Communication
- Send and receive emails
- Download files
- Post your opinion to a news group
- Chatting
- Surf the world wide web
- Business
- Shopping
- Entertainment
https://www.bbc.co.uk/news/technology/index.html
There is a wide variety of top level domains (TLDs) available for use. While
.com is the most frequently used, TLDs like .org and .net are also common.
Domain Names
A domain name identifies an organisation or individual on the Internet. They
use alphanumeric characters which make them easy for humans to remember. A
fully qualified domain name (or FQDN) is a domain that specifies an exact resource
and can be interpreted in only one way. An FQDN will always include the server’s
host name .
FQDN ✗ https://bbc.co.uk/news/index.html
FQDN ✓ https://www. bbc.co.uk/news/index.html
Types of Website:
Static
- A static website is one that has webpages stored on the server in the format that
is sent to a client web browser. It is primarily coded in Hypertext Markup
Language (HTML)
Dynamic
- A dynamic website is one that changes or customizes itself frequently and
automatically, based on certain criteria.
Email Address
The email address has three parts:
– a user name
– an "at" sign (@)
– the address of the user's mail server
Example: [email protected]
Email Client
An email client is a computer program used to manage a user's email. Popular
email clients include Microsoft Outlook, Pegasus Mail, Mozilla's Thunderbird, and
Apple Inc.'s Mail.
Web-Based Mail
Is an e-mail service intended to be primarily accessed via a web browser. Some
very popular web mail providers:
– Gmail
– Yahoo!Mail
– Hotmail
o FILE TRANSFER PROTOCOL (FTP)
- The protocol for exchanging files over the Internet.
- Used for moving files between two hosts on a TCP/IP network.
- FTP is most commonly used to download a file from a server using the
Internet or to upload a file to a server.
- To do FTP, a user invokes one of two commands:
get - the command for transferring a file from another server to your
own computer.
put – the command for moving a file from your computer to another
one.
o SEARCH ENGINE
- A search engine is designed to search for
information on the internet.
- Search engine presents the search results in the
form of a search results list.
- The search results can be webpages, images,
videos, and other type of files.
Example:
Google
Bing
o CHATTING
- Chatting is the other method for Internet
conversation.
- It enables people connected anywhere on the
Internet to join in live discussions.
- Chat sessions allow many users to join in the
same free-form conversation, usually centered
around a discussion topic.
Examples:
MSNMessenger
YahooMessenger
IRC
Pidgin
o VIDEO CONFERENCING
- A video conference is a set of
interactive telecommunication
technologies which allow two or more
locations to interact via two-way video
and audio transmissions
simultaneously.
- The other components required for a
videoconferencing system include:
Video Input and Output
Audio input and output
Data transfer
Computer
o E-COMMERCE
- Electronic commerce or E-Commerce consists of the buying and selling of
products or services over electronic systems such as the Internet and other
computer networks.
- It includes the entire online process of developing, marketing, selling,
delivering, servicing and paying for products and services
- Some common applications related to electronic commerce are the following:
Domestic and international payment systems
Group buying
Automated online assistants
Online shopping and order tracking
Online banking
Shopping cart software
Electronic tickets
INTERNET SECURITY
Firewalls
A firewall sits between a device and the Internet and regulates the
packets that pass through it. Firewalls can be either software or hardware and
work as a proxy server which can perform both packet filtering and stateful
inspection.
Packet Filtering
Firewalls use packet filtering to accept and block packets based on
their source IP address or the protocol that they are using (determined by
their port number). A network’s administrator can specify particular IP
addresses or protocols to block or use automatic filtering software that can
block suspicious packets.
Stateful Inspection
Stateful inspection actually examines the contents of a packet before
deciding whether to allow it through the firewall. Some firewalls keep a
record of current connections in a network, allowing them to filter out packets
that aren’t related to activity on the network.
Proxy Server
A server that sits between a public network and a private network is
called a proxy server. These devices manage every packet that passes
between the two networks. Firewalls can be said to act as proxy servers when
they control the movement of packets between public and private networks.
PREVENTING MALWARE
Although it is difficult to avoid malware completely, there are a number of
precautions that can be taken in order to protect computers from malicious software.
Malware often exploit bugs in code that enable them to take hold of a
computer system. Good code quality is an important factor in preventing malware
and small oversights by developers can have devastating consequences. Other
vulnerabilities that malware exploit include a lack of antivirus software, out-of-date
software and poor security.
One general rule for preventing malware is to install antivirus software.
Antivirus programs are specialist pieces of software that scan the files on a computer
and remove any suspicious files . Many modern operating systems come with some
level of antivirus installed as a default.
In organisations, employees can be trained about the risks of opening
suspicious email attachments in order to reduce the risk posed by malware.