You are on page 1of 15

IT 101: IT

Application
Tools in
Business
MODULE 3
UNIT 6:

THE INTERNET & THE WORLD WIDE WEB: EXPLORING CYBERSPACE

UNIT 6A: The Internet & the Web


• The Internet began in 1969 as ARPANET.
• The Internet was text-only. In the early 1990s, multimedia became available on the Internet, and
the World Wide Web (web) was born.
• To connect to the Internet you need
1. An access device (computer with modem)
2. A means of connection (phone line, cable hookup, or wireless)
3. An Internet access provider

6.1 CONNECTING TO THE INTERNET (Narrowband, Broadband, & Access Providers


However you connect to the Internet, the bandwidth will determine the speed of your connection.
• Bandwidth: Expresses how much data can be sent through a communications channel in a given
amount of time.
• Baseband: Slow type of connection that allows only one signal to be transmitted at a time.
• Broadband: High-speed connections.
• Physical connection to Internet—wired or wireless?
• Telephone [dial-up] modem
• High-speed phone line—DSL, T1/T3
• Cable modem
• Wireless—satellite and other through-the-air links

HIGH-SPEED PHONE LINES


• More expensive but available in cities & most towns
• DSL line
• Uses regular phone lines, DSL modem
• Receives data at 7 ̶ 105Mbps; sends at about 384 Kbps – 1 Mbps
• Is always on
• Need to live no farther than 4.5 miles from phone company switching office
• Not always available in rural areas
• T1 line—very expensive
• Traditional trunk line, fiber optic or copper; carries 24 normal telephone circuits
• Transmission rate of 1.5 ̶ 6 Mbps (T3 = 6 – 47 Mbps)
• The “last mile” can still be a problem
• Generally used by large organizations
• Cable modem
• TV cable system with Internet connection; company usually supplies cable modem
• Is always on
• Receives data at up to 100 Mbps; sends at about 2-8 Mbps

SATELLITE WIRELESS CONNECTIONS


• Transmits data between satellite dish and satellite orbiting earth
• Connection is always on
• Requires Internet access provider with 2-way satellite transmission
• User needs to buy or lease satellite dish and modem and have them connected

1
OTHER WIRELESS: WI-FI, 3G, & 4G
• Wi-Fi—stands for “wireless fidelity”
• Name for a set of wireless standards (802.11) set by IEEE
• Transmits data wirelessly up to 54 Mbps for 300 – 500 feet from access point (hotspot)
• Typically used with laptops and tablets that have Wi-Fi hardware
• 3G = “third generation”; uses existing cellphone system; handles voice, email, multimedia
• 4G = “fourth generation”; faster than 3G; built specifically for Internet traffic – but not standard
yet
• Both 3G and 4G used mostly in smartphones

INTERNET ACCESS PROVIDERS (ISPS)


• ISP: Local, regional, or national organization that provides access to the Internet for a fee — e.g.,
Comcast, Charter, AT&T.
• Wireless Internet Service Provider (WISP) — e.g., AT&T, T-Mobile, Verizon Wireless, Sprint,
Credo
• Enables wireless-equipped laptop/tablet and smartphone users to access Internet

6.2 HOW DOES THE INTERNET WORK?


• The Internet is basically a huge network that connects hundreds of thousands of smaller
networks.
• Central to this arrangement are client/server networks
• Client: computer requesting data or services
• Server or host computer: central computer supplying data or services requested of it

INTERNET COMMUNICATIONS: PROTOCOLS, PACKETS, & IP ADDRESSES


• Handshaking & Authentication: Connecting to your ISP’s point of presence (POP)
• Handshaking—fastest transmission speed established
• Authentication—correct password & user name
• Protocols
• The set of rules a computer follows to electronically transmit data.
• TCP/IP (Transmission Control Protocol/Internet Protocol) is the Internet protocol
• Developed in 1978 by ARPA; used for all Internet transactions
• Packets
• Fixed-length blocks of data for transmission, determined by TCP/IP
• Data transmissions are broken up into packets and re-assembled at destination (the IP—
Internet Protocol— address)

IP (INTERNET PROTOCOL) ADDRESSES


• Every device connected to the Internet has an address
• Each IP address uniquely identifies that device
• The address is four sets of numbers separated by periods (e.g., 1.160.10.240)
• Each number is between 0 and 255
• Dynamic IP addresses change with every use; individual computer users
are assigned static IP addresses when they log on
• Static IP addresses don’t change(established organizations – including
ISPs – and companies have static IP addresses, which they pay for)

2
WHO RUNS THE INTERNET?
• Basically, no one owns the Internet
• The board of trustees of the Internet Society (ISOC) oversees the standards
• Internet Corporation for Assigned Names and Numbers (ICANN) regulates domain
names (such as .com, edu., .net) that overlie IP addresses; ICANN does not
control content

6.3 THE WORLD WIDE WEB


• The Face of the Web: Browsers, Websites, & Web Pages
The World Wide Web brought multimedia to the Internet.
• The web and the Internet are not the same; the web is multimedia-based, and the Internet is
not. The Internet is the infrastructure that supports the web.
• A browser is software that gets you to websites and their individual web pages and displays
the content in such a way that the content appears mostly the same regardless of the
computer, operating system, and display monitor.
Examples = Internet Explorer
Mozilla FireFox
Apple Macintosh’s Safari
Google’s Chrome
Microsoft’s Bing
• Website
• The location on a particular computer (server) that has a unique address; example =
www.barnesandnoble.com, www.mcgraw-hill.com
• The website (server) could be anywhere — not necessarily at company headquarters
• Web Page
• A document on the web that can include text, pictures, sound, and video
• The first page on a website is the Home page
• The Home page contains links to other pages on the website (and often other websites)
• Uniform Resource Locator (URL): address for a web page
• A character string that points to a specific piece of information anywhere on the web
• A website’s unique address
• It consists of
• The web protocol, http://
• The domain name of the web server
• The directory name or folder on that server
• The file within the directory, including optional extension
• TCP/IP— As explained, general Internet Protocol
• HTTP—Protocol Used to Access World Wide Web
• Hypertext Markup Language (HTML)
• The “markup” language used in writing and publishing web pages
• Set of instructions used to specify document structure, formatting, and links to other
documents on the web
• Hypertext links connect one web document to another
• Web browsers interpret HTML and allow you to move around the Internet and the web
• Come preinstalled on most PCs, but you can download others
• 5 basic elements
• URL (address)bar
• Menu bar

3
• Toolbar
• Workspace
• Status bar (displays current status of the
web age; 100% = fully loaded)
• Browser’s Home Page
• The page you see when you open your web browser
• You can change the Home Page on your browser
• Back, Forward, Home
• Use the browser’s icons to move from one page to another
(these icons can appear on
different bars in different browsers)
• Navigation
• History List
• A list of websites you visited since you opened up your browser for this session
• Allows you to easily return to a particular site
• Bookmark
• Allows you to store the URL from a site on your computer so you can find it
again in another browser session
• To save the URL for a site, click on “Favorites” in Internet Explorer, “Bookmarks”
in Mozilla Firefox, or the star icon in the URL address bar in Chrome
• Interactivity with a web page
• Click on hyperlinks to transfer to another page
• Click on a radio button to choose an option
• Type text in a text box and then hit Enter
• Click on scroll arrows to move up and down, or side to side, on a page
• Click on different frames (separate controllable sections of a web page)
• Web portals: Starting points for finding information
• A portal is gateway website that offers a broad array of resources and services, online
shopping malls, email support, community forums, stock quotes, travel info, and links to
other categories
• Examples: Yahoo!, Google, Bing, Lycos, and AOL
• Most require you to log in, so you can
• Check the Home page for general
information
• Use the subject guide to find a topic you want
• Use a keyword to search for a topic

SEARCH SERVICES & SEARCH ENGINES


• Organizations that maintain databases accessible through websites to help you find information
on the internet
• Examples: portals like Yahoo! and Bing, plus Google, Ask.com, Gigablast
• Search services maintain search engines—programs that users can use to ask questions
or use keywords to find information
• Databases of search engines are compiled using software programs called spiders
(crawler, bots, agents)
• Spiders crawl through the World Wide Web
• Follow links from one page to another
• Index the words on that site

4
• A search never covers the entire web
• Search engines differ in what they cover
FOUR WEB SEARCH TOOLS
1. Individual Search Engines
• Compile their own searchable databases on the web
• You search by typing keywords and receiving “hits”
• Examples are Ask, Bing, Google, and Yahoo!
2. Subject Directories
• Created and maintained by human editors, not electronic spiders
• Allow you to search for information by selecting lists of categories or topics
• Example sites are Beaucoup!, LookSmart, Open Directory Project, and Yahoo!
Directory
3. Metasearch Engines
 Allows you to search several search engines simultaneously
 Examples are Yippy!, Dogpile, Mamma, MetaCrawler, and Webcrawler
4. Specialized Search Engines
 Help locate specialized subject matter, such as info on movies, health, jobs
 Examples are Career.com. WebMD, Expedia, U.S. Census Bureau

SMART SEARCHING: THREE GENERAL STRATEGIES


• If you’re just browsing . . .
• Try a subject directory
• Next try a metasearch engine
• If you’re looking for specific information . . .
• Try a Answers.com “one-click” search
• Or go to a general search engine, then a specialized one
• If you’re looking for everything on a subject . . .
• Try the same search on several search engines

WIKIS & WIKIPEDIA


• A wiki is a simple piece of software that can be downloaded for free and used to make a
website (also called a wiki) that can be corrected or added to by anyone.
• Wikipedia is a free online encyclopedia that anyone around the world can contribute to or
edit. It has more than 25 million articles in more than 285 languages; over 4.1 million
articles appear in the English Wikipedia alone. However, Wikipedia is not considered reliable
or authoritative by many academics and librarians.

MULTIMEDIA SEARCH TOOLS


• Still images—e.g., Google Image Search, Bing Images, Fagan Finder
• Audio—e.g., Yahoo! Music, Lycos MP3 Search
• Video—e.g., AlltheWeb, AOL.video
• Scholarly—e.g., Google Scholar

TAGGING
• Tags: Do-it-yourself labels that people can put on anything found on the Internet, from articles
to photos to videos, that help them to find their favorite sites again and to link them.
• Can be shared easily with other people

5
• Tags are commonly used on blogs and YouTube – word listed at the bottom. Essentially
tags are keywords used to classify content. (The # is a hash symbol; thus the Twitter
term hashtag. )
• Tag managing is available through delicious.com and BlinkList, among other companies.

UNIT 6B: The Riches & Risks of Internet Use

6.4 EMAIL, INSTANT MESSAGING, & OTHER WAYS OF COMMUNICATING OVER THE NET
EMAIL
• Outgoing mail: sent from your computer to a Simple Mail Transfer Protocol (SMTP) server run
by your ISP
• Incoming mail: Email sent to your computer: uses Post Office Protocol version 3 (POP3)

 Two ways to send & receive email:


1. Email Program
• Enables you to send email by running email software on your computer that interacts
with an email server at your Internet access provider
• Incoming mail is stored on the server in an electronic mailbox
• Upon access (your ID and password), mail is sent to your software’s inbox
• Examples: Microsoft Outlook, Apple Mail
2. Web-Based Email
• You send and receive messages by interacting via a browser with a website
• Advantage: You can easily send and receive messages while traveling, using any
computer or equipped mobile device
• Examples: Yahoo! Mail and Gmail (Google)
• Disadvantages are ads and email hacking

 Using email
Get an email address from your ISP, following this format:

 Tips for Using Email


1. Use the address-book feature to store email addresses
2. Use folders to organize email
3. Be careful with attachments
4. Be aware of email netiquette
• Email Attachments
• A copy of a file or document that you send attached to an email to one or more people
• Recipients must have compatible software to open the attachment; for example, if they
don’t have Excel, they probably can’t read the spreadsheet you sent them.
• Be careful about opening attachments:
• Many viruses hide in them; scan them with antivirus software
• Know who has sent the attachment before you open it

NETIQUETTE: APPROPRIATE ONLINE BEHAVIOR


• Don’t waste people’s time.
• Don’t write anything that you would not say to a person’s face.
• Include helpful subject and signature lines.
• Be clear and concise.

6
• Avoid spelling and grammatical errors.
• Avoid SHOUTING and flaming.
Also:
• Be careful with jokes.
• Avoid sloppiness, but avoid criticizing other’s sloppiness.
• Don’t send huge file attachments unless requested.
• When replying, quote only the relevant portion.
• Don’t overforward (don’t copy emails to everyone you know).

INSTANT MESSAGING
• Instant messaging enables you to communicate by email with
specified other users (“buddies”) in real time.
• Any user on a given email system can send a message and have it pop up instantly on the screen
of anyone logged into that system.
• To get IM: Download IM software from a supplier
• Examples: AOL/AIM, Google Chat, Windows Messenger, Yahoo! Messenger
• Done on computers; is not the same as texting.

DISCUSSION GROUPS
• Mailing Lists:
• One-way (to make announcements) or two-way (for discussions) email subscription lists
• Email discussion groups on special-interest topics, in which all subscribers receive email
messages sent to the group’s email address
• Newsgroups:
• Giant electronic bulletin board for written discussions about specific subjects
• To participate you need a newsreader program
• Message Boards:
• Special-interest discussion groups without newsreaders
• Accessed through a web browser
• A collection of messages on a particular topic is called a thread

FTP (FILE TRANSFER PROTOCOL)


• Software standard for transferring large files between computers, including those with
different operating systems
• You can also transfer files from an FTP site on the Internet to your PC
• FTP sites offer many free files
• FTP sites may be either public or proprietary
• You can download using your web browser or FTP client programs, such as Fetch, Cute, FileZilla,
and SmartFTP

6.5 THE ONLINE GOLD MINE (Telephony, Multimedia, Webcasting, Blogs, E-Commerce, & Social
Networking)

TELEPHONY: THE INTERNET TELEPHONE


• Uses the Internet to make phone calls via VoIP (Voice over Internet Protocol)
• Long-distance calls are either very inexpensive or free
• With no PC, dial a special phone number to packetize your call for a standard telephone

7
• Use with a PC that has a sound card, microphone, Internet connection with modem & ISP, and
internet telephone software such as Skype and Vonage
• Also allows videoconferencing

MULTIMEDIA ON THE WEB


• Allows you to get images, sound, video, and animation
• May require a plug-in, player, or viewer
• A downloadable program that adds a specific feature to a browser so it can view certain
files
• Examples: Flash, RealPlayer, QuickTime
• Multimedia Applets
• Small programs that can be quickly downloaded and run by most browsers
• Java is the most common Applet language
• Text & Images: great variety available
• Example: Google Earth
• Animation
• The rapid sequencing of still images to create the appearance of motion
• Used in video games and web images that seem to move, such as banners
• Video & Audio
• Downloaded completely before the file can be played, or
• Downloaded as streaming video/audio
• Examples: RealVideo and RealAudio

THE WEB AUTOMATICALLY COMES TO YOU


• Push technology: Software that automatically downloads information to personal computers.
• Webcasting: Sending users customized text, video, audio on regular basis.
• RSS newsreaders (RSS aggregators): Programs that scour the web, sometimes hourly,
sometimes more frequently, and pull together in one place “feeds” from several websites. RSS is
based on XML, or extensible markup language, a web-document tagging and formatting
language that is an advance over HTML and that two computers can use to exchange
information.
• XML and RSS have led to blogs and blogosphere.
• Blogs (weblogs) are frequently updated sites on the web intended for public consumption that
contain a writer’s observations, opinions, images, and links to other websites.
• Podcasting: Internet radio or similar Internet audio program delivered via RSS feed to a
subscriber to be played back on computer or digital audio device.

E-COMMERCE: B2B, B2C, & C2C


• E-Commerce (electronic commerce): conducting business activities online
• E-commerce has led to showrooming, the phenomenon in which shoppers browse for products
in stores, only to buy them from an online rival, frequently at a lower price.
• B2B is business-to-business e-commerce.
• Business-to-consumer commerce, or B2C, is the electronic sale or exchange of goods
and services from the companies directly to the public, or end users (e.g., online
banking, online shopping, online stock trading).
• Consumer-to-consumer commerce, or C2C, is the electronic sale or exchange of goods
and services between individuals (e.g., auctions).

8
WEB 2.0: THE SOCIAL WEB
• Web 2.0 refers to the web viewed as a medium in which interactive experience, in the form of
blogs, wikis, forums, social networking, and so on, plays a more important role than simply
accessing information.
• The move toward a more social, collaborative, interactive, and responsive web; has led
to the “social web,” giving rise to:
• Social networking sites: Online communities that allow members to keep track
of friends and share photos, videos, music, stories, and ideas (e.g., Facebook,
LinkedIn).
• Media-sharing sites: Online social networks in which members share media
such as photos, videos, music, ideas (e.g., YouTube, Flicker, Shutterfly).
• Social-network aggregators: Collect content from all of a user’s various social network
profiles into one place, then allow him or her to track friends and share other social
network activities (e.g., Mugshot, Readr).

WEB 3.0: COMPUTER-GENERATED INFORMATION


• In Web 3.0, information will be computer-generated with less human interaction required to
discover and integrate that information.
• Two ideas might form the basis for Web 3.0— semantic markup and a personal browser.
• Semantic markup: Data interchange formats that will allow machines to understand the
meaning—or “semantics”—of information on the web.
• The Web 3.0 browser will probably act as a personal assistant because every user will
have a unique Internet profile based on his or her browsing history. The more you use
the Web, the more your browser learns about you and the less specific you'll need to be
with your questions.

6.6 THE INTRUSIVE INTERNET (Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, &
Malware)
• Snooping
• Email is not private
• Corporate management has the right to view employees’ email.
• Friends can send email anywhere.
• Not all ISPs protect their customers’ privacy.
• Deleted emails can be retrieved from a hard disk.
• Spam: Electronic Junk Mail
• Unsolicited email that takes up your time.
• Delete it without opening the message.
• Never reply to a spam message.
• Do not click on “unsubscribe” at the bottom of an email.
• When you sign up for something, don’t give your email address.
• Use spam filters.
• Fight back by reporting new spammers to www.abuse.net or www.spamhaus.org.
• Spoofing
• Using fake email sender names so the message appears to be from a different source,
so you will trust it.
• If you don’t know the sender, don’t open it.
• Phishing
• Sending forged email directing recipient to fake website.

9
• Purpose: to entice people to share personal or financial data.
• Fake website looks like real website, such as a bank’s.
• Pharming
• Implanting malicious software on a victim’s computer that redirects the user to an
impostor web page even when the individual types the correct address into his or her
browser.
• Use websites with URLs that begin with “https://
• Some spyware removal programs can correct the corruption.

 Cookies
 Little text files left on your hard disk by some websites you visit.
• Can include your log-in name, password, browser preferences, and credit card
information.
• Every time you load a particular website, the browser sends the cookie back to the
server to notify the website of your previous activity.
• Can make visiting these websites next time more convenient and faster.
• But cookies can be used to gather information about you and your browsing habits and
history; this information can be used without your consent.
• A first-party cookie is a cookie from a website that you have visited. Third-party cookies
are placed by trusted partners of the websites you visit. (Third-party cookies are
frequently placed by ad networks.)

 Spyware
• Spyware is software surreptitiously installed on your computer via the web.
• Spyware hides on your PC/device and captures information about what is on the it, such
as keystrokes and passwords
• Adware, or pop-up generator, is a kind of spyware that tracks web or online buying so that
marketers can send you targeted and unsolicited pop-up and other ads.
• Browser hijackers change settings in your browser without your knowledge, often changing
your browser’s home page and replacing it with another web page.
• Search hijackers intercept your legitimate search requests made to real search engines and
return results from phony search services designed to send you to sites they run.
• Key loggers, or keystroke loggers, can record each character you type and transmit that
information to someone else on the Internet, making it possible for strangers to learn your
passwords and other information.

MALWARE
• There are many forms of malicious software—so-called malware—that can harm a computer
system, a common danger being viruses.
• A virus is a rogue program that migrates through the Internet or via operating systems and
attaches itself to different programs that spread from one computer to another, leaving
infections.
• The principal defense is to install antivirus software, which scans a computer to detect viruses
and, sometimes, to destroy them.

10
How to Reduce Malware Risks
• Download virus protection software, such as McAfee VirusScan ( www.mcafee.com ) or Norton
AntiVirus ( www.symantec.com/nav ); then follow instructions for installing it on your machine.
(Don’t use antivirus software from companies you know nothing about.)
• Scan your entire system with antivirus software the first time it’s installed; then scan it regularly
after that. Also scan any new CDs and drives before using them.
• Don’t open, download, or execute any files, email messages, or email attachments if the source
is unknown or if the subject line of an email is questionable or unexpected.
• Delete all spam and email messages from strangers. Don’t open, forward, or reply to such
messages.
• Use webmail sparingly, since viruses can hide in the HTML coding of the email. Even
• the simple act of previewing the message in your email program can activate the virus
• and infect your computer.
• Don’t start your computer with a flash drive, USB thumb drive, or CD/DVD in place.
• Back up your data files regularly, and keep at least one backup device in a location separate
from your computer or use an online (cloud) backup service.
• If you discover you have a virus, ask McAfee or Norton to scan your computer online; then
follow its directions for cleaning or deleting the virus. (A computer tech person can do this, too.)

Passwords
• Never choose a real word or variations of your or your family’s name, address, phone number,
Social Security number, license plate, or birthdate.
• Don’t use passwords that can be easily guessed, such as “12345” or “password.”
• Avoid any word that appears in a dictionary. Instead, mix letters, numbers, and punctuation
marks in an oddball sequence of no fewer than eight characters, such as 2b/orNOT2b% and
Alfred!E!Newman7. Or choose a password that is memorable but shift the position of your
fingers on the keyboard, so that, for instance, TIMBERWOLVES becomes YO,NRTEP;BRD when
you move your fingers one position right. For sensitive sites, such as financial accounts, create
long passwords, such as 15-character passwords.
• Don’t use the same password for multiple sites, so that if someone obtains the password to one
account, that person won’t have access to your entire online life.
• Don’t write passwords on sticky notes or in a notebook or tape them under your keyboard.
Don’t carry the passwords in your wallet. If you have to write down all your passwords, find a
safe place to put the paper, or use a software password manager, such as Kaspersky Password
Manager, RoboForm Everywhere, or Last Pass Premium.

6.7 CYBERATTACKS & MALWARE


• Networks and computer systems are susceptible to attacks by all kinds of malware.
• Some common cyberthreats are denial-of-service attacks; viruses; worms; Trojan horses;
rootkits and backdoors; blended threats; zombies; ransomware; and time, logic, and email
bombs.

CYBERTHREATS
• Denial of Service Attack
• Consists of making repeated requests of a computer or network device, thereby
overloading it and denying access to legitimate users.
• Used to target particular companies or individuals.
• Virus

11
• Deviant program that hides in a file or a program on a disk, flash memory drive, in an e-
mail, or in a web link and that causes unexpected effects such as destroying or
corrupting data.
• Usually attached to an executable file that you must run or open (to activate the virus).
• Worms
• A program that copies itself repeatedly into a computer’s memory or disk drive.
• May copy itself so much it crashes the infected computer.
• Trojan Horses
• Programs that pretend to be a useful program such as a free game or a screensaver but
that carry viruses or malicious instructions that damage your computer or install a
backdoor or spyware.
• Backdoors and spyware allow others to access your computer without your knowledge.
• Rootkits
• In many computer operating systems, the “root” is an account for system
administration. A “kit” is the malware secretly introduced into the computer. A rootkit
gives an attacker “super powers” over computers—for example, the ability to steal
sensitive personal information.
• Blended Threats
• A blended threat is a more sophisticated attack that bundles some of the worst aspects
of viruses, worms, Trojan horses, and other malware into one single threat. Blended
threats can use server and Internet vulnerabilities to initiate, then transmit and also
spread an attack. Blended threats are designed to use multiple modes of transport—
email, flash drives, networks, and so on.
• Zombies & Bots
• A botmaster uses malware to hijack hundreds to many thousands of computers and is
able to remotely control them all, including the ability to update the malware and to
introduce other programs such as spyware. Hijacked computers are called zombies.
• A botnet (robot network) is a network of computers in which each computer has been
implanted with instructions to wait for commands from the person controlling the
botnet.
• Ransomeware
• A botnet may be used to install ransomeware, which holds the data on a computer or
the use of the computer hostage until a payment is made. Ransomware encrypts the
target’s files, and the attacker tells the victim to make a payment of a specified amount
to a special account to receive the decryption key.
• Time, Logic, & Email Bombs:
• A time bomb is malware programmed to “go off” at a particular time or date. A logic
bomb is “detonated” when a specific event occurs—for example, all personnel records
are erased when an electronic notation is made that a particular person was fired. Email
bombs overwhelm a person’s email account by surreptitiously subscribing it to dozens
or even hundreds of mailing lists.
• Phone Malware:
• Worms and viruses and other malware are attacking smartphones. The most common
type of cellphone infection occurs when a cellphone downloads an infected file from a
PC or the Internet, but phone-to-phone viruses are also on the rise.
• Infected files usually show up disguised as applications such as games, security patches,
add-on functionalities, and free stuff. Future possibilities include cellphone spyware—so
someone can see every number you call and listen to your conversations—and viruses

12
that steal financial information, which will become more serious as smartphones are
used as common payment devices.
• Cellphone Malware
• Spread via Internet downloads, MMS attachments, and Bluetooth transfers
• Usually show up disguised as applications such as games, security patches, add-on
functionalities, erotica, and free programs
• Protect your phone:
• Turn off Bluetooth discoverable mode
• Check security updates to learn about filenames to watch out for
• Install security software
• How they spread
• Via e-mail attachments
• By infected disks and flash drives
• By clicking on infiltrated websites
• By downloading infected files from websites
• Through infiltrated Wi-Fi hotspots
• From one infected PC on a LAN to another
• What can you do about it?
• Install antivirus and firewall software and subscribe to the manufacturer’s automatic
antivirus update service
• Online Safety
• Use antivirus software, and keep it current
• Install a firewall to monitor network traffic and filter out undesirable types of traffic and
undesirable sites
• Don’t use the same password for multiple sites
• Don’t give out any password information
• Use robust passwords:
• Minimum 8 characters with letters, numbers, characters
• 4cats is not a good password; f0UrK@tTz is safer
• Use biometric identification
• Use encryption
• Install antispyware software
• Encrypt financial and personal records so only you can read them
• Back up your data, so if your PC is attacked and must be reformatted, you can restore
your data
• Never download from a website you don’t trust
• Consider biometric authentication
• Encryption
• Process of altering readable data into unreadable form to prevent unauthorized
access
• Uses powerful mathematical ciphers to create coded messages that are
difficult to break
• Unencrypted messages are known as plain text
• Encrypted text is known as cybertext
• You use an encryption key to encrypt and decrypt coded messages

13
6.8 CYBERINTRUDERS (Trolls, Spies, Hackers, & Thieves)
• Trolls aren’t necessarily destructive, but they can be disruptive on online comment boards. A
troll is a person who posts intentionally offensive, incendiary, or off-topic comments online, to
upset people.
• Many companies have extensive data-collection efforts that constantly track (spy on) our
personal activities.
• Malicious hackers break into computers for malicious purposes.
• Script kiddies are technically unsophisticated teenagers who use downloadable software for
perform break-ins.
• Hacktivists are hacker activists who break into systems for a political or a socially motivated
purpose.
• Black-hat hackers break into computers to steal or destroy information or to use it for illegal
profit.
• Cyberterrorists attack computer systems so as to bring physical, political or financial harm to
groups, companies, or nations.
• Benign hackers (thrill-seeker hackers) illegally access computer systems simply for the challenge
of it, not to damage or steal anything; their reward is the achievement of breaking in.
• Benevolent hackers (ethical hackers or white-hat hackers) are usually computer professionals
who break into computer systems and networks with the knowledge of their owners to expose
security flaws that can then be fixed.
• Thieves may be a company’s employees or suppliers or professionals.
• Employees
• Outside partners & suppliers
• Hardware thieves
• Con artists, scammers, & counterfeiters

6.9 CONCERNS ABOUT PRIVACY & IDENTITY THEFT


• The proliferation of networks and databases have put privacy under great pressure.
• Privacy is the right of people not to reveal information about themselves.
• Some threats to privacy:
• Name migration
• Résumé rustling & online snooping
• Government prying & spying
• Identity (ID) theft, or theft of identity (TOI), is a crime in which thieves hijack your name and
identity and use your information and credit rating to get cash or buy things.
• Wallet or purse theft
• Mail theft
• Mining the trash
• Telephone solicitation
• Insider access to database
• Outsider access to database
• If ID theft happens, contact:
• Credit card companies
• Your bank
• Department of Automotive Vehicles
• Utility companies
• Phone companies
• Local police
• Federal Trade Commission
• Other organizations you belong to

14

You might also like