0% found this document useful (0 votes)
26 views15 pages

The Internet

The Internet is a global network of interconnected computer networks that allows users to access and share information using various technologies. It offers advantages such as speed, convenience, and access to a wide range of services, but also poses risks like misinformation, security threats, and privacy issues. Key components include the World Wide Web, email, FTP, and various security measures to combat threats like viruses, phishing, and unauthorized access.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views15 pages

The Internet

The Internet is a global network of interconnected computer networks that allows users to access and share information using various technologies. It offers advantages such as speed, convenience, and access to a wide range of services, but also poses risks like misinformation, security threats, and privacy issues. Key components include the World Wide Web, email, FTP, and various security measures to combat threats like viruses, phishing, and unauthorized access.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

What is Internet:

The Internet, sometimes called simply "the Net," is a worldwide system of


computer networks - a network of networks linked by a broad array of electronic,
wireless, and optical networking technologies. Users at any one computer can get
information from any other computer and sometimes talk directly to users at other
computers. The Internet uses the Internet protocol suite (TCP/IP) to link devices
worldwide. It consists of private, public, academic, business, and government networks.
It was developed by the Advanced Research Projects Agency (ARPA) of the U.S.
government in 1969 and was first known as the ARPANet. The original aim was to create
a network that would allow users of a research computer at one university to "talk to"
research computers at other universities.
The Internet carries an extensive range of information resources and services, such as the
inter-linked hypertext documents, electronic mail, telephony, and peer-to-peer networks
for file sharing.

ADVANTAGES OF INTERNET
 It is “Fast”.
 It is “Cheap”.
 It is “Convenient”
 It is “Global”
 Shopping
 Entertainment
 Information of any topic
 Online Payments
 Banking
 Data Sharing
 So many tools are available on internet for different types of requirements.

DISADVANTAGES OF INTERNET
 It is not “Truthful” : There are certain and reliable things,people who does not
exist in real life.

 Acquire the wrong information: Existing too much wrong,uncertain knowledge as


information pollution

 Threat of Virus

 Data on your system is not secure always


 High installition cost: To make one click on internet,People must get
A computer (2000 TL)
A modem (39 TL)
A mouse(40 TL)
Electiricity line(5 tl )

The facilities of the Internet

The aim of this section is to describe briefly the main facilities of the Internet that are
used to support e-commerce and e-business systems.

1 The World Wide Web

The World Wide Web, or simply Web, is a way of accessing information over the
medium of the Internet. It is an information-sharing model that is built on top of the
Internet. The Web uses the HTTP protocol, only one of the languages spoken over the
Internet, to transmit data. The Web also utilizes browsers, such as Internet
Explorer or Firefox, to access Web documents called Web pages that are linked to each
other via hyperlinks. Web documents also contain graphics, sounds, text and video.

The Web is nothing more than a collection of files stored at locations throughout the
world. These files are written using a special language known as the Hypertext Markup
Language (HTML). A file written using this language will contain text which forms the
information content of the file, together with instructions which define how the text is to
be displayed; for example, HTML contains a facility whereby blocks of text are specified
to be displayed as bullet points.

A file which is downloaded into a browser is known as a Web page. The computer that
holds Web pages is known as a Web server. The collection of pages which are linked by
some theme - for example, they may be pages which all belong to the same retail
company - is known as a Web site.

Each page that is downloaded into a browser will have references to other pages
expressed as hyperlinks. For example, a page belonging to a book retailer will have
hyperlinks to the various sections of the site which deal with different types of books.
Hyperlinks can refer to pages within the same site or can refer to pages within another
site; for example, an online magazine might refer to other online magazines which are
part of the same publisher's stable. .

2 FTP

The acronym FTP stands for the File Transfer Protocol. It provides the facility whereby
files can be downloaded into a computer from another computer in the Internet.
FTP is the mainstay of commercial companies who sell electronic products; it is a simple
facility which has been found on the Internet since its inception in the 1980s.

3 E-mail

This is one of the technologies on the Internet and, along with the World Wide Web, is
the most used. When you write an e-mail you use a program known as a mailer. When
the e-mail is completed it is sent via a number of computers known as e-mail servers and
via a number of other intermediate computers before it reaches its destination where it is
read. In e-commerce applications e-mail is a subsidiary, but important technology. It is
used as the transport medium for mailing lists, for enabling customers to communicate
with a company, for sending documents and data to customers and for keeping customers
up to date about current products and services.

4 Newsgroups

A newsgroup is a collection of Internet users who are interested in a particular topic. The
topic may be a technical one, for example the LINUX operating system, or a recreational
one such as fly fishing. Members of a newsgroup send messages associated with a
particular issue. Each message - known as a posting - will contain the user's thoughts on
the topic.

Newsgroups can be moderated or unmoderated. If a newsgroup is moderated a member


will examine each posting and determine whether it should be posted. There are a number
of reasons why postings are rejected: one major reason is that it is not relevant to the area
that a newsgroup covers; another reason is that the posting is abusive to another user.

There are no restrictions on posting to unmoderated newsgroups.

Newsgroups are accessed by using a special purpose software utility known as a


newsreader; although there is an excellent search site known as Deja.com which allows
access to newsgroups.

5 Mailing lists

Mailing lists are groups of users who have some interest in common, for example they
may all be network professionals. Such a list is used by organizations or individuals to
inform the members of topics of interest to them. For example, my local cinema has a
mailing list of cinema goers who have bought season tickets. It e-mails everyone on the
list with the titles of those films which are to be shown in the coming week and notifies
them of any special ticket offers.

6. Remote Login:
A client-server program and protocol that provides an interactive command line
interface to a remote computer, using a protocol over a computer network, simulating a
locally attached terminal.

7. Chat Group:

a set of people who communicate regularly via the Internet, either in real time of by e-
mail, about a particular topic

Differences between Client-side and Server-side

Client-side Environment

The client-side environment used to run scripts is usually a browser. The processing takes
place on the end users computer. The source code is transferred from the web server to
the users computer over the internet and run directly in the browser.
The scripting language needs to be enabled on the client computer. Sometimes if a user
is conscious of security risks they may switch the scripting facility off. When this is the
case a message usually pops up to alert the user when script is attempting to run.

Server-side Environment

The server-side environment that runs a scripting language is a web server. A user's
request is fulfilled by running a script directly on the web server to generate dynamic
HTML pages. This HTML is then sent to the client browser. It is usually used to provide
interactive web sites that interface to databases or other data stores on the server.

This is different from client-side scripting where scripts are run by the viewing web
browser, usually in JavaScript. The primary advantage to server-side scripting is the
ability to highly customize the response based on the user's requirements, access rights,
or queries into data stores.

Web Browsers:

A web browser (commonly referred to as a browser) is a software application for


retrieving, presenting and traversing information resources on the World Wide Web.
An information resource is identified by a Uniform Resource Identifier (URI/URL) that
may be a web page, image, video or other piece of content. Hyperlinks present in
resources enable users easily to navigate their browsers to related resources.

Although browsers are primarily intended to use the World Wide Web, they can also be
used to access information provided by web servers in private networks or files in file
systems.

The most popular web browsers are Google Chrome, Internet Explorer,
Opera and Firefox.
Function
The primary purpose of a web browser is to bring information resources to the user
("retrieval" or "fetching"), allowing them to view the information ("display", "rendering"),
and then access other information ("navigation", "following links").

This process begins when the user inputs a Uniform Resource Locator (URL), for
example http://en.wikipedia.org/, into the browser. The prefix of the URL, the Uniform
Resource Identifier or URI, determines how the URL will be interpreted. The most
commonly used kind of URI starts with http: and identifies a resource to be retrieved
over the Hypertext Transfer Protocol (HTTP).[17] Many browsers also support a variety of
other prefixes, such as https: for HTTPS, ftp: for the File Transfer Protocol,
and file: for local files. Prefixes that the web browser cannot directly handle are often
handed off to another application entirely. For example, mailto: URIs are usually passed
to the user's default e-mail application, and news: URIs are passed to the user's default
newsgroup reader.

Web Page:

A web page or webpage is a document commonly written in HyperText Markup


Language (HTML) that is accessible through the Internet or other network using an
Internet browser. A web page is accessed by entering a URL address and may contain
text, graphics, and hyperlinks to other web pages and files. The page you are reading now
is an example of a web page.

 How to open a web page

To view a web page requires a browser (e.g. Internet Explorer, Edge, Safari, Firefox,
or Chrome). For example, you are reading this web page using a browser. Once in a
browser, you can open a web page by entering the URL in the address bar. For example,
typing "http://www.computerhope.com/esd.htm" opens the Computer Hope ESD page. If
you don't know the URL of the website you want to visit, you can use a search engine to
find the web page or use the search on the website containing the web page.
 When was the first web page created?

The first web page was created at CERN by Tim Berners-Lee on August 6, 1991. You
can visit and browse the first website and first web page at the http://info.cern.ch/ address.

Network Security: Threats and Solutions

 With an increasing amount of people getting connected to networks, the security


threats that cause massive harm are increasing also.
 Network security is a major part of a network that needs to be maintained because
information is being passed between computers etc and is very vulnerable to
attack.
 Over the past five years people that manage network security have seen a massive
increase of hackers and criminals creating malicious threats that have been
pumped into networks across the world.

Security Threats

According to ITSecurity.com the following are ten of the biggest network threats:

1.Viruses and Worms

2.Trojan Horses

3.SPAM

4.Phishing

5.Packet Sniffers

6. Maliciously Coded Websites

7. Password Attacks

8.Hardware Loss and Residual Data Fragments

9. Shared Computers
10.Zombie Computers and Botnets

Viruses and Worms

 A Virus is a “program or piece of code that is loaded onto your computer without
your knowledge and runs against your wishes.
 Viruses can cause a huge amount of damage to computers.
 An example of a virus would be if you opened an email and a malicious piece of
code was downloaded onto your computer causing your computer to freeze.
 In relation to a network, if a virus is downloaded then all the computers in the
network would be affected because the virus would make copies of itself and
spread itself across networks
 A worm is similar to a virus but a worm can run itself whereas a virus needs a
host program to run.
 Solution: Install a security suite, such as Kaspersky Total Protection, that protects
the computer against threats such as viruses and worms.

Trojan Horses

 A Trojan Horse is “a program in which malicious or harmful code is contained


inside apparently harmless programming or data in such a way that it can get
control and do its chosen form of damage, such as ruining the file allocation table
on your hard disk.
 In a network if a Trojan Horse is installed on a computer and tampers with the
file allocation table it could cause a massive amount of damage to all computers
of that network.
 Solution: Security suites, such as Norton Internet Security, will prevent you from
downloading Trojan Horses.

SPAM

 SPAM is “flooding the Internet with many copies of the same message, in an
attempt to force the message on people who would not otherwise choose to
receive it.
 I believe that SPAM wouldn’t be the biggest risk to a network because even
though it may get annoying and plentiful it still doesn’t destroy any physical
elements of the network.
 Solution: SPAM filters are an effective way to stop SPAM, these filters come
with most of the e-mail providers online. Also you can buy a variety of SPAM
filters that work effectively.

Phishing

 Phishing is “an e-mail fraud method in which the perpetrator sends out legitimate-
looking emails in an attempt to gather personal and financial information from
recipients.
 In my opinion phishing is one of the worst security threats over a network because
a lot of people that use computers linked up to a network are amateurs and would
be very vulnerable to giving out information that could cause situations such as
theft of money or identity theft.
 Solution: Similar to SPAM use Phishing filters to filter out this unwanted mail
and to prevent threat.

Packet Sniffers

 “A packet sniffer is a device or program that allows eavesdropping on traffic


travelling between networked computers. The packet sniffer will capture data that
is addressed to other machines, saving it for later analysis.
 In a network a packet sniffer can filter out personal information and this can lead
to areas such as identity theft so this is a major security threat to a network.
 Solution: “When strong encryption is used, all packets are unreadable to any but
the destination address, making packet sniffers useless. So one solution is to
obtain strong encryption.

Maliciously Coded Websites

 Some websites across the net contain code that is malicious.


 Malicious code is “Programming code that is capable of causing harm to
availability, integrity of code or data, or confidentiality in a computer system
 Solution: Using a security suite, such as AVG, can detect infected sites and try to
prevent the user from entering the site.

Password Attacks
 Password attacks are attacks by hackers that are able to determine passwords or
find passwords to different protected electronic areas.
 Many systems on a network are password protected and hence it would be easy
for a hacker to hack into the systems and steal data.
 This may be the easiest way to obtain private information because you are able to
get software online that obtains the password for you.
 Solution: At present there is no software that prevents password attacks.

Hardware Loss and Residual Data Fragments

 Hardware loss and residual data fragments are a growing worry for companies,
governments etc.
 An example this is if a number of laptops get stolen from a bank that have client
details on them, this would enable the thief’s to get personal information from
clients and maybe steal the clients identities.
 This is a growing concern and as of present the only solution is to keep data and
hardware under strict surveillance.

Shared Computers

 Shared computers are always a threat.


 Shared computers involve sharing a computer with one or more people.
 The following are a series of tips to follow when sharing computers:

 “Do not check the “Remember my ID on this computer” box …


 Never leave a computer unattended while signed-in …
 Always sign out completely …
 Never save passwords
 change your password often.

Zombie Computers and Botnets

 “A zombie computer, or “drone” is a computer that has been secretly


compromised by hacking tools which allow a third party to control the computer
and its resources remotely.
 A hacker could hack into a computer and control the computer and obtain data.
 Solution: Antivirus software can help prevent zombie computers.
 A botnet “is a number of Internet computers that, although their owners are
unaware of it, have been set up to forward transmissions (including spam or
viruses) to other computers on the internet.
 This is a major security threat on a network because the network, unknown to
anyone, could be acting as a hub that forwards malicious files etc to other
computers.
 Solution: Network Intrusion Prevention (NIP) systems can help prevent botnets.

URL:

A URL (Uniform Resource Locator), as the name suggests, provides a way to


locate a resource on the web, the hypertext system that operates over the internet.
The URL contains the name of the protocol to be used to access the resource and
a resource name. The first part of a URL identifies what protocol to use. The
second part identifies the IP address or domain name where the resource is
located.

A URL is the most common type of Uniform Resource Identifier (URI). URIs are strings
of characters used to identify a resource over a network. URL protocols
include HTTP (Hypertext Transfer Protocol) and HTTPS (HTTP Secure) for web
resources, "mailto" for email addresses, "ftp" for files on a File Transfer Protocol
(FTP) server, and telnet for a session to access remote computers.

Absolute and Relative URLs


An absolute URL contains more information than a relative URL does. Relative URLs
are more convenient because they are shorter and often more portable. However, you can
use them only to reference links on the same server as the page that contains them.

An absolute URL uses the following format: scheme://server/path/resource

A relative URL typically consists only of the path, and optionally, the resource, but
no scheme or server.

scheme
Specifies how the resource is to be accessed.
server
Specifies the name of the computer where the resource is located.

path
Specifies the sequence of directories leading to the target. If resource is omitted, the
target is the last directory in path.

resource
If included, resource is the target, and is typically the name of a file. It may be a simple
file, containing a single binary stream of bytes, or a structured document, containing one
or more storages and binary streams of bytes.

Linking with absolute URLs


An absolute URL typically takes the following form:

protocol://domain/path

The protocol is usually http://, but can also be https://, ftp://, gopher://, or file://.
The domain is the name of the website. For example, the domain name of Indiana
University's central web server is www.indiana.edu. The path includes directory and file
information. You must use absolute URLs when referring to links on different servers.

Linking with relative URLs


Relative URLs can take a number of different forms. When referring to a file that occurs
in the same directory as the referring page, a URL can be as simple as the name of the file.
For example, if you want to create a link in your home page to the file foobar.html, which
is in the same directory as your home page, you would use:

<a href="foobar.html">The Wonderful World of Foobar!</a>

If the file you want to link to is in a subdirectory of the referring page's directory, you
need to enter only the directory information and the name of the file. So
if foobar.html were in the foobar subdirectory of your wwwdirectory, you could refer to it
from your home page by using:

<a href="foobar/foobar.html">The Wonderful World of Foobar!</a>


If the file you want to link to is in a higher directory than the referring page, use .., which
means to go up a directory. For example, to link from foobar.html to home.html, which is
in the directory above, you would use:

<a href="../home.html">Go back to my home page</a>

Fragment Url:

 A Fragment URL Specifies A Location Within A Page

Any URL that contains a # character is a fragment URL. The portion of the URL to the
left of the # identifies a resource that can be downloaded by a browser and the portion on
the right, known as the fragment identifier, specifies a location within the resource:

In HTML documents, the browser looks for an anchor tag <a> with a name attribute
matching the fragment. For example, in the URL shown above the browser finds a
matching tag in the Printing Support heading:

<h3><a name="print"></a>Printing Support</h3>

and scrolls the page to display that section:

 Fragments Are not Sent in HTTP Request Messages

 Anything After the First # is a Fragment Identifier

 Changing A Fragment ID Doesn’t Reload a Page but Does Create History


Types of URL Schemes:

HyperText Transfer Protocol (HTTP)

HTTP is the Internet protocol specifically designed for use with the World Wide Web,
and thus will be the most common scheme you are likely to use. Its syntax is:

http://<host>:<port>/<path>?<searchpart>

File Transfer Protocol (FTP)

FTP is a well-used means for transmitting files over the Internet. While there are many
advantages to using HTTP instead, many systems don't offer full support of HTTP and
clients are not as well developed as they are for FTP. Thus, many times files are
distributed via FTP. Its syntax is:

ftp://<user>:<password>@<host>:<port>/<cwd1>/<cwd2>/.../<cwdN>/<name>;type=<t
ypecode>

Gopher Protocol (Gopher)

The Gopher protocol syntax is very similar to FTP and HTTP:

gopher://<host>:<port>/<gopher-path>

Electronic Mail (Mailto)

The Mailto URL scheme is different from the previous three schemes, and it does not
identify a file available over the Internet, but rather the email address of someone that can
be reached via the Internet. The syntax is:

mailto:<account@site>

Usenet News (News)

The News URL scheme allows for the referencing of Usenet newsgroups or specific
articles. The syntax is either of the following:

news:<newsgroup-name>
news:<message-id>
Telnet to Remote Host (Telnet)

The Telnet URL designates an interactive session to a remote host on the Internet via the
Telnet protocol. Its syntax is:

telnet://<user>:<password>@<host>:<port>/

Host-Specific File Names (File)

The File URL scheme indicates a file which can be obtained by the client machine. In
many sources, this scheme is confused with the FTP scheme. FTP refers to a specific
protocol for file transmission, and while the File URL leaves the retrieval method up to
the client, which in some circumstances, might be via the FTP protocol. When the file is
intended to be obtained via FTP, I recommend designating that URL scheme. The syntax
for the File scheme is:

file://<host>/<path>

You might also like