Professional Documents
Culture Documents
• Using Microsoft Outlook from the Office 365 Suite as an Email Client
• Not included in slide but will be part of the online class example and walkthrough of the software
• Cookies
• Firewalls
• Encryption
A quick look at the Basics of the Web
Understanding the Internet Naming conventions
• www.windsorcareercollege.ca is an example of a website URL
address
• URL stands for Universal Resource Locator and is the name associated with a
web resource being accessed on the internet through our browsers
• www is the hostname of the server in the windsorcareercollege.ca domain where
the website is stored
• Windsorcareercollege.ca is the domain name owned by Windsor Career College
• .ca is the Top level domain owned and managed by Internet Registrars
• In order to own a domain like Windsorcareercollege.ca you must register that
name with a registrar responsible for the .ca domain
A quick look at the Basics of the Web
Understanding the Internet Naming conventions
Top Level Domain List
A quick look at the Basics of the Web
• We should remember that the web is made of networks
which are connected together by devices called routers
which route traffic from its source to destination on the
internet
Browser Options
• Microsoft Edge
• Included with Windows 10 and Microsoft recommended for browsing
• Mozilla Firefox
• A 3rd Party software you must install and is not included in Windows
• Opera
• A 3rd Party software you must install and is not included in Windows
• TorBrowser
(Note that TorBrowser is the browser used to access the dark web, and the
key feature to this browser is its ability to mask the identity and location of
the user.)
Search Engines
• GOOGLE
• Also a portal with access to news, email/gmail, google talk and google meeting
• BING
• Also a portal with access to news, email, skype etc .
• Uses SSO – Single Sign on that integrates Windows 10
• DUCKDUCKGO
• A search engine that keeps your searches private, helping mask the identity of
the user doing the search
• Note that duckduckgo uses similar search algorithms to google so results are
similar
What are cookies
• The allow a website to store information about you in a file
on your computer
• Pro: When you revisit a website you do not need to retype
much of the information in forms
• Con: Can store personal information including credit card
info which can lead to data being stolen from sites you visit
with malicious intent. Some of these malicious sites will
steal the data stored in those cookies
Getting a little more Technical
Understanding How the Internet Works
• Data on a computer system that needs to be transmitted over a network
must me formatted to do so. The suite of protocols responsible for this is
TCIP/IP
What is TCP/IP (Definition)
• Is the suite of protocols responsible for converting data into packets which
are then transmitted over the network
• TCP stands for Transmission Control Protocol and IP stands for Internet Protocol
• Each packet contains information about the sender, receiver, the data. Some of the
basic information you should know about data packets are in the figure below.
Getting a little more Technical
Understanding How the Internet Works
IP Addresses
• There are two types of IP addressing schemas available on the internet today IPv4
and IPv6 which is the latest standard
• DoS
• An attack from a single system aimed a crashing a target system or rendering it unresponsive
• DDoS
• An attack waged from multiple systems aimed at rendering the target unresponsive
Security Services
Authentication
• The process of proving your identity
Access Control
• Determines what system resources a user or service may use
Data Confidentiality
• Protects data from unauthorized disclosure
Data Integrity
• Protects against active threats by maintaining the consistency of
the data
Sarbanes-Oxley Initiative (SOX)
The act was passed by the US government in 2002 in response to
several major corporate and accounting scandals, like Enron, Tyco,
WorldCom, which took place between 2000-2002.
Describes specific mandates and requirements for financial reporting,
and establishes new or enhanced standards for all US public company
boards, management and public accounting firms
Consists of 11 sections that are designed to improve the accuracy and
reliability of corporate disclosure to reinforce investment confidence
and protect investors
Protecting Login Credentials
To protect login credentials on the internet
• 2 Step verification and one time password
• One time passwords can be configured in a Authenticator App, 2 of those Apps are Microsoft
Authenticator and Google Authenticator.
• The process of logging in using 2 step verification happens differently depending on how you
set it up.
• The first step in the process would ask you for you regular username and password
• Once you click login the website or application will check if you have logged in from this device before
and if you have not it will ask you for a 1 time password.
• The one time password can be sent to your phone as a text message at the time login. You can enter this
code in the provided field in the application or website and once verified you will be logged in.
• The one time password can also be generated using Windows Authenticator and Google Authenticator as
an app on your mobile device. If you are asked for the one password, look to the app on our mobile
device for the randomly generated by the app
Disaster Prevention and Recovery
Although we take steps to protect our network resources by using things like firewalls,
encryption and Antivirus we still need to plan for disasters when they occur.
If and when an infection occurs it will be necessary to quickly recover damaged files or systems.
• Files can be back up using online storage such as google drive or one drive, for larger business clients you may want
to purchase large amounts of off-site storage instead of using the free service
• Take full backups of Windows 10 using the Windows 10 backup tool, if you need to recover your computer, you can
do so in a few clicks and choose the last working backup you have
Safer Private Internet Browsing using VPN
• Virtual Private Networks
• Provide a secure connection between a client and the VPN server using a username,
password and encrypting the data being sent and received.
• The source address seen on the internet by the public will be that of the VPN server
not you.
• The VPN server will remember to send data to you as the source, but this information
is not revealed to the public.