You are on page 1of 21

INTERNET CONCEPTS

LESSO N 02 - B R O WSING T H E WEB


Browsing the Web
• Quick look at the Basics
• Different browser options
• Search engines
• Using Windows Edge to Browse the Internet
• Not included in slide but will be part of the online class example and walkthrough of the software

• Using Microsoft Outlook from the Office 365 Suite as an Email Client
• Not included in slide but will be part of the online class example and walkthrough of the software

• Cookies
• Firewalls
• Encryption
A quick look at the Basics of the Web
Understanding the Internet Naming conventions
• www.windsorcareercollege.ca is an example of a website URL
address
• URL stands for Universal Resource Locator and is the name associated with a
web resource being accessed on the internet through our browsers
• www is the hostname of the server in the windsorcareercollege.ca domain where
the website is stored
• Windsorcareercollege.ca is the domain name owned by Windsor Career College
• .ca is the Top level domain owned and managed by Internet Registrars
• In order to own a domain like Windsorcareercollege.ca you must register that
name with a registrar responsible for the .ca domain
A quick look at the Basics of the Web
Understanding the Internet Naming conventions
Top Level Domain List
A quick look at the Basics of the Web
• We should remember that the web is made of networks
which are connected together by devices called routers
which route traffic from its source to destination on the
internet
Browser Options
• Microsoft Edge
• Included with Windows 10 and Microsoft recommended for browsing
• Mozilla Firefox
• A 3rd Party software you must install and is not included in Windows
• Opera
• A 3rd Party software you must install and is not included in Windows
• TorBrowser
(Note that TorBrowser is the browser used to access the dark web, and the
key feature to this browser is its ability to mask the identity and location of
the user.)
Search Engines
• GOOGLE
• Also a portal with access to news, email/gmail, google talk and google meeting
• BING
• Also a portal with access to news, email, skype etc .
• Uses SSO – Single Sign on that integrates Windows 10

• DUCKDUCKGO
• A search engine that keeps your searches private, helping mask the identity of
the user doing the search
• Note that duckduckgo uses similar search algorithms to google so results are
similar
What are cookies
• The allow a website to store information about you in a file
on your computer
• Pro: When you revisit a website you do not need to retype
much of the information in forms
• Con: Can store personal information including credit card
info which can lead to data being stolen from sites you visit
with malicious intent. Some of these malicious sites will
steal the data stored in those cookies
Getting a little more Technical
Understanding How the Internet Works
• Data on a computer system that needs to be transmitted over a network
must me formatted to do so. The suite of protocols responsible for this is
TCIP/IP
What is TCP/IP (Definition)
• Is the suite of protocols responsible for converting data into packets which
are then transmitted over the network
• TCP stands for Transmission Control Protocol and IP stands for Internet Protocol
• Each packet contains information about the sender, receiver, the data. Some of the
basic information you should know about data packets are in the figure below.
Getting a little more Technical
Understanding How the Internet Works
IP Addresses
• There are two types of IP addressing schemas available on the internet today IPv4
and IPv6 which is the latest standard

IPv4 addresses are 32bit


• An IP v4 address looks like 192.168.4.10 – notice that the number is made of up 4
sections separated by a period, these sections are called octets
• IPv4 addresses have 4 octets 11110001.00011111.10101100.11101110
• Was not designed with security in mind
• Not enough IP addresses to run the internet as it is today

IPv6 addresses are 128 bit


• Provide more IP addresses than IPv4
• Provides better security than IPv4
Firewalls
• What is a firewall
• A security barrier that controls the flow of information between the internet and private networks
• Prevents outsiders from accessing and enterprise’s internal network
• In the network diagram on the next slide notice that the firewall sits between the internet and all
internal networks.
• Rules can be created that allow or deny communication between the between the internal networks
• Rules can be created to allow traffic initiated from the internet and direct it to a server that we want to
be accessible from the internet such as a web server in the DMZ
• Since packets flowing in and out of a firewall contain a source ip addresses and port, destination IP
address and port, firewalls use this information in the packet to make decisions on whether to allow or
deny connections
Firewalls
Encryption
• What is Encryption
• Encryption is the process of making something readable only to the
intended recipients.
• Encryption can occur at both the network Level and the document level
• Network level encryption means that data being transmitted over the
network can be encrypted
• File/document level encryption can be used to encrypt a document so
that it can only be read by the intended recipient
Encryption
• Algorithms used to provide Encryption
• Data Encryption Standard or (DES)
• RSA
• MD5
• 3 Categories of Encryption
• Symmetric Encryption, AKA Private-Key Cryptography
• Asymmetric Encryption, AKA Public-Key Cryptography
• Hash Encryption
Virus’s and Prevention
What is a Virus:
• A malicious program that replicated itself on computers systems usually through and executable file.
• Use Antivirus programs to scan and monitor your computer
• Windows 10 ships with Windows Defender Antivirus but there are also 3rd Party Applications for this
such as Norton Antivirus and McCafee Antivirus
Types of Virus Threats
• Trojan
• A program disguised as a directory, archive or game that when downloaded to a system has an alternative
damaging effect
• Dictionary Attack
• Is used to discover passwords using a large file filled dictionary words or combination
• Ways to prevent a dictionary attack.
• Password Complexity – Use complex password. A good rule of thumb is to use at least 8 characters, at
least 1 capitol , a number and a symbol.
• Set and Account Lockout – Most mobile devices and computers have a feature to lock a computer
when an incorrect password is entered more than the number of times you allow. Setting a lockout of
3 attempts means that if a user attempts the password 3 times and fails the system will be locked out
Virus’s and Prevention
• Ransomware
• Doesn’t damage the file or infrastructure but locks out administrator and users until they
pay a fee at which time, they are given the password to access the information again.

• DoS
• An attack from a single system aimed a crashing a target system or rendering it unresponsive

• DDoS
• An attack waged from multiple systems aimed at rendering the target unresponsive
Security Services
Authentication
• The process of proving your identity
Access Control
• Determines what system resources a user or service may use
Data Confidentiality
• Protects data from unauthorized disclosure
Data Integrity
• Protects against active threats by maintaining the consistency of
the data
Sarbanes-Oxley Initiative (SOX)
The act was passed by the US government in 2002 in response to
several major corporate and accounting scandals, like Enron, Tyco,
WorldCom, which took place between 2000-2002.
Describes specific mandates and requirements for financial reporting,
and establishes new or enhanced standards for all US public company
boards, management and public accounting firms
Consists of 11 sections that are designed to improve the accuracy and
reliability of corporate disclosure to reinforce investment confidence
and protect investors
Protecting Login Credentials
To protect login credentials on the internet
• 2 Step verification and one time password
• One time passwords can be configured in a Authenticator App, 2 of those Apps are Microsoft
Authenticator and Google Authenticator.

• The process of logging in using 2 step verification happens differently depending on how you
set it up.
• The first step in the process would ask you for you regular username and password
• Once you click login the website or application will check if you have logged in from this device before
and if you have not it will ask you for a 1 time password.
• The one time password can be sent to your phone as a text message at the time login. You can enter this
code in the provided field in the application or website and once verified you will be logged in.
• The one time password can also be generated using Windows Authenticator and Google Authenticator as
an app on your mobile device. If you are asked for the one password, look to the app on our mobile
device for the randomly generated by the app
Disaster Prevention and Recovery
Although we take steps to protect our network resources by using things like firewalls,
encryption and Antivirus we still need to plan for disasters when they occur.

If and when an infection occurs it will be necessary to quickly recover damaged files or systems.
• Files can be back up using online storage such as google drive or one drive, for larger business clients you may want
to purchase large amounts of off-site storage instead of using the free service
• Take full backups of Windows 10 using the Windows 10 backup tool, if you need to recover your computer, you can
do so in a few clicks and choose the last working backup you have
Safer Private Internet Browsing using VPN
• Virtual Private Networks
• Provide a secure connection between a client and the VPN server using a username,
password and encrypting the data being sent and received.
• The source address seen on the internet by the public will be that of the VPN server
not you.
• The VPN server will remember to send data to you as the source, but this information
is not revealed to the public.

You might also like