You are on page 1of 17

1

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING,


SHARDA SCHOOL OF ENGINEERING AND TECHNOLOGY,
SHARDA UNIVERSITY, GREATER NOIDA

“Internet Issue”

A report submitted
in partial fulfilment of the requirements for the degree of
Bachelor of Technology in Computer Science and Engineering

by
Aman Sharama (2022502699)
Arpit Yadav (2022496878)

Supervised by:
Dr. Kusum Lata
Assistant Professor

June, 2023

1
2

CERTIFICATE

This is to certify that the report entitled “EFFCTIVENESS OF SEO” submitted by


Mr. Aman Sharma (2022502699), Mr. Arpit Yadav (20224968798), first year
students of Sharda University, Department of Computer Science and
Engineering and Technology, has worked under by supervision and has
completed the same on Design and Creativity

Signature of Supervisor

Name: Dr. Kusum Lata


Designation: SSET Assistant Professor
Subject: Design and Creativity Lab (CSP116)

Place: Sharda University

Date:

Signature of Examiner

Date:

2
3

ACKNOWLEDGEMENT

A major project is a golden opportunity for learning and self-development.


We consider our self very lucky and honoured to have so many wonderful
people lead us through in completion of this project.

My grateful thanks to Dr. Kusumlata for her guidance in our project work
and took time out to hear, guide and keep us on the correct path.

Name and signature of Students :-

Aman Sharma (2022502699)

Arpit Yadav (2022496878)

Abstract

3
4

The internet has revolutionized the way we communicate, access


information, and conduct various activities. However, its widespread
adoption and increasing dependency have also given rise to
numerous challenges and issues. This project aims to delve into the
multifaceted landscape of internet issues, examining their impacts
on individuals, businesses, and society as a whole.

The project begins by exploring the issue of online privacy and data
security, shedding light on the vulnerabilities that arise from digital
transactions, social media usage, and cloud storage practices. It
investigates the ethical concerns related to the collection, storage,
and use of personal data by internet companies, as well as the
potential consequences of data breaches and cyber attacks.

4
5

TABLE OF CONTENTS:

• INTRODUCTION................................................................................6
• RELIABILITY OF INFORMATION ........................................................7
• UNDESIRABLE INFORMATION..........................................................9
• SECURITY OF DATA TRANSFER USING INTERNET ..........................11
• PHISING..........................................................................................13
• PHARMING.....................................................................................14
• CONCLUSION..................................................................................15
• References......................................................................................17

5
6

1. INTRODUCTION
The Internet links are computer networks all over the world so that users can
share resources and communicate with each other. The Internet is an inherently
participative medium. Anybody can publish information or create new services
that´s why it is a fantastic resource for finding and sharing information. The Web
contains literally billions of web pages containing information about every topic
imaginable. However we need to take care when using the Internet to look for
information, or to send Information

2. RELIABILITY OF INFORMATION

The Internet and Web are not regulated - there is no organisation that controls who can
create web pages or what those pages can contain.

So... how do you which web pages to believe, which information to trust

 Stick to websites that belong to trusted organisations. If the website address ends
in .gov.uk it is more likely to be reliable than one that ends in .com
 Look at the spelling and grammar used.
 Who is the author or sponsor of the page?
 Are there obvious reasons for bias
 Is there a copyright symbol on the page?
 If so, who holds the copyright?
 Is this page a "zombie," or one considered "walking dead" because the person who
posted it no longer maintains or updates it?
 What is the purpose of the page? Why is this information being posted--as
information, as a public service, as a news source, as a research tool for academics,
as a personal ax to grind, or as a way to gain attention?
 How well organized is the page? Is the page easy to navigate? Is it complete?
When was the page last updated? Is the information on it current? How credible
are the links it provides?

 Can you verify the information on the Web page some other way?

6
1

Section 1: Online Privacy and Data Security

1.1 The Importance of Online Privacy


1.2 Vulnerabilities and Risks in Digital Transactions
1.3 Ethical Considerations of Personal Data Collection
1.4 1.4 Consequences of Data Breaches and Cyber Attacks

Section 2: The Digital Divide

2.1 Understanding the Digital Divide

2.2 Disparities in Internet Access and Connectivity

2.3 Implications on Education, Economic Opportunities, and Social


Inclusion

2.4 Strategies to Bridge the Digital Divide

Section 3: Internet Addiction

3.1 The Addictive Nature of the Internet

3.2 Social Media Addiction and its Impact

3.3 Online Gaming and its Effects on Mental Health

3.4 Intervention and Prevention of Internet Addiction

Section 4: Misinformation and Fake News

4.1 The Proliferation of Misinformation on the Internet

4.2 Implications for Public Opinion and Societal Harmony

4.3 Verifying Information Sources and Promoting Media Literacy

4.4 Combating the Spread of Misinformation

Section 5: Regulatory Frameworks and Policies

5.1 The Role of Governments in Internet Regulation


1
2

\ 5.2 International Efforts and Organizations

5.3 Balancing Privacy, Cybersecurity, and Digital Rights

5.4 The Need for Adaptive Regulatory Approaches

2
1

UNDESIRABLE INFORMATION
 In addition to the Web being full of websites with inaccurate information, there
are also a huge number of websites that contain highly offensive, or illegal
material.

 Avoiding this type of material can be tricky. Many organisations and also many
parents, make use of web page filtering software. This software attempts to
prevent offensive and illegal material being accessed. Even if filtering software is
not installed on a computer, you can still take steps to help you avoid these types
of sites: Use the 'safe search' feature on search engines such as Google.

 Don’t click the links that are shown in junk email (spam)

Think carefully about the keywords that you use to search with

SECURITY OF DATA TRANSFER USING INTERNET


 As has been discussed already, you should always consider encrypting any
sensitive or personal data that is sent or accessed over a public network such as
The Internet.

 Many websites, especially online shopping or online banking sites, require you to
enter personal information, such as credit card numbers, social security IDs, etc.

 To make sure your data is safe, these websites use encryption - they are called
secure websites.

 You should always make sure that a website is secure before giving personal
information... The website URL (address) should begin with https://... (normal,
unsecure sites have addresses that start with http://...) § Your web browser should
show a closed padlock icon

1
2

PHISING
 'Phishing' is the nickname given to the sending of fraudulent e- mails
that attempt to trick people into revealing details about their bank
accounts, or other online accounts (e.g. Amazon, eBay, etc.)
 The 'phishers' then use these bank details to login to the victim's bank
account and take their money. The e-mail looks very convincing. It even
has the bank's logo. And it sounds urgent and scary... If you were to click
the link, you would be taken to a fake bank website. Then if you were to
enter your login details, these would be recorded by the phishers and
used to empty your real bank account.

PHARMING

 'Pharming' is similar to phishing, but instead of deceiving you (as


phishing does), a pharming attack deceives your computer.
 In a pharming attack, when you type in a completely genuine URL (e.g.
for your online banking website), your computer is tricked into displaying
a fake website (often a very accurate copy).
 Then, when you try to login to the fake website, your username /
password are recorded and used to take money from your real bank

2
3

account. It is very difficult to spot pharming attacks, because to the user


everything seems to be normal.

HOW TO AVOID DATA THEIFT


1. Use secure passwords:-
Passwords can be easily cracked by hackers, particularly if you don't use
a strong password. A strong password is at least 12 characters or longer and
comprises a mix of upper- and lower-case letters plus symbols and numbers.
The shorter and less complex your password is, the easier it is for cybercriminals
to crack. You should avoid choosing something obvious – such as sequential

3
4

numbers (“1234”) or personal information that someone who knows you might
guess, such as your date of birth or a pet’s name.
To make your passwords more complex, you could consider creating a
'passphrase' instead. Passphrases involve picking a meaningful phrase that is
easy to remember and then making the first letter of every word the password.
2.Limit social media sharing:-
Familiarize yourself with each social networking platform’s security
settings and ensure these are set to a level you are comfortable with.
Avoid disclosing personal information like your address or date of birth in
your social media bios – criminals can use this data to build up a picture
about you
3.Monitor your accounts
Regularly check your bank or credit card statements, or other accounts, so
you can see if any unauthorized charges or other anomalies have taken
place. You may not receive a notification when a company you transact
with has a data breach, so it's advisable to stay vigilant yourself.

4
1

1.
Understanding Data Security:
2.
 Definition of data security and its key components.
 Types of data at risk: personal, financial, intellectual property, etc.
 Common threats and vulnerabilities to data security.
3.
Assessing Data Security Risks:
4.
 Conducting a comprehensive risk assessment.
 Identifying potential vulnerabilities and threats specific to the organization.
 Understanding the consequences of data breaches.
5.
Best Practices for Data Security:
6.
 Implementing strong access controls and authentication mechanisms.
 Encryption techniques for data protection in transit and at rest.
 Regular data backups and disaster recovery planning.
 Employee training on data security awareness and best practices.
7.
Network and Infrastructure Security:
8.
 Securing networks through firewalls, intrusion detection systems, and virtual
private networks.
 Implementing robust authentication mechanisms and secure remote access
protocols.
 Regular network monitoring and threat detection.
9.
Application Security:
10.
 Ensuring secure coding practices and regular software updates.
 Conducting vulnerability assessments and penetration testing.
 Implementing web application firewalls and secure development frameworks.
11.
Physical Security Measures:
12.
 Securing data centers and server rooms.

1
2

 Controlling physical access through ID cards, biometrics, and surveillance


systems.
 Proper disposal of physical media and equipment.
13.
Data Privacy and Compliance:
14.
 Understanding data protection regulations (e.g., GDPR, CCPA) and industry-
specific compliance requirements.
 Establishing privacy policies and procedures.
 Conducting privacy impact assessments.
15.
Incident Response and Recovery:
16.
 Developing an incident response plan.
 Establishing protocols for detecting, containing, and mitigating data breaches.
 Post-incident analysis and lessons learned.
17.
Emerging Technologies and Trends:
18.
 Exploring advancements in data security, such as blockchain and artificial
intelligence.
 Understanding the potential risks and benefits associated with emerging
technologies.

2
1

1
2

CONCLUSION

The conclusion summarizes the key findings of the project and


discusses the importance of addressing internet issues in a
responsible and proactive manner. It also highlights the potential
future developments in the field and the ongoing efforts to create a
safer and more inclusive internet ecosystem.

Please note that this content is a general guideline, and you can
expand and modify it according to your project's specific
requirements

2
1

REFERENCE

Please note that this reference assumes that the project is an unpublished
manuscript or a work in progress. If your project is based on a published source
or includes specific citations, please provide more details, such as the author(s),
publication title, year, and other relevant information, so that I can create a
more accurate reference for you.

You might also like