Professional Documents
Culture Documents
THE INTERNET?
• What is Internet?
– a globally connected network system that uses TCP/IP to
transmit data via various types of media
– a network of global exchanges – including private, public,
business, academic and government networks – connected by
guided, wireless and fiber-optic technologies
– simply called “The Net”
THE INTERNET
• Internet vs internet
• Internet
– is the world wide network comprising of all other networks
interconnected and communicating on the open Web
• internet
– is a series of networks owned by two or more organizations
(Microsoft and Google, for example) and set up to communicate
with each other
THE INTERNET
• History of Internet
1960: Paul Baran(employee of RAND Corporation) wanted to design a
network for DoD which the Pentagon approved of but AT&T rejected his idea.
1967: Larry Roberts, program manager of Advanced Research Projects
Agency coordinated with Wesley Clark in creating a packet-switched subnet-
ARPANET
1969: The initial Arpanet was deployed with 4 nodes: UCLA, UCSB, SRI, and
University of Utah. The ARPANET reach 213 nodes later on.
THE INTERNET
• History of Internet
1981: The US National Science Foundation created Computer Science
Network which allowed computer science departments and industrial
science lab to connect with ARPANET.
1986: The NFSNET was completed. The regional networks are
connected to the backbone which allowed nodes to communicate with
each other and access the supercomputers of NSF at Boulder,
Champaign, Ithaca, Pittsburgh and Princeton and San Diego
1990s: The ARPANET was shutdown, and with funding and control of
NFSNET, ANSNET was formed. Other countries also built their own
national research networks through ARPANET and NFSNET as models
THE INTERNET
• How to Google effectively
Use the tabs in Google search
Use quotes to minimize guesswork for Google search
Use a hyphen to exclude words
Use a colon to search specific sites
Find a page that links to another page
THE INTERNET
• How to Google effectively
Use the asterisk wildcard
Find sites that are similar to other sites
Use Google search to do math
Search for multiple words at once
Search a range of number
THE INTERNET
• How to Google effectively
Keep it simple
Gradually add search terms
Use words that websites would use
Use important words only
Google search has shortcuts
THE INTERNET
• How to Google effectively
Spelling doesn’t necessarily matter
Use descriptive words
Find a specific file
Money and unit conversions
Track your packages
THE INTERNET
• Uses of Internet
Resource sharing
– the interconnection of devises allowed them to share physical
resources among each other such as disk drives, printers and scanners.
Medium for communication
– alternative means of communication
Electronic commerce (E-Commerce)
– can either be B2B, B2C, C2B, and C2C
THE INTERNET
• World Wide Web (WWW)
Hypertext Transfer Protocol is the common protocol being
used in the web
The domain name specifies the exact location of the host of
the webpage, it gets translated into its equivalent IP address
using the Domain Name System.
THE INTERNET
• Electronic Mail (E-mail)
– Email servers sends a request to the server that a new
message needs to be send that uses the Simple Mail Transfer
Protocol in processing emails
– An email has its own domain and handles a number of
users in domain
Examples: sender@yahoo.com user: sender name, yahoo.com
is the domain name
THE INTERNET
• Computer Security and Privacy
Computer security is the protection of resources that are considered
as valuable asset in a computer system.
Confidentiality is ensuring that a resource can only be accessed by an
authorized user.
Availability is when an authorized person should be able to access a
resource anytime.
Integrity is preserved by allowing modifications of an authorized
person only.
Privacy is the protection of one’s personal info against unathourized
access.
THE INTERNET
• Threats to Security and Privacy
• Vulnerability is a weakness in the system which maybe in its
design structure or operation.
•Threats:
Botnet – collection of computers controlled by a group of
malicious users
Distributed Denial of Service – when a system fails to respond
to the requests of legitimate users
Phising – use of email to collect personal info from a recipient
THE INTERNET
• Threats to Security and Privacy
Rootkit – a program that gives a user a root privilege of infected system
Spam – unsolicited emails with advertisements sent to a large number of
people
Trojan Horse – malicious code that hides itself in an expectedly harmless
program
Virus – piece of code or program that performs malicious operations in
a computer
Worm – can propagate in a machine or whole network even without
action of the user
THE INTERNET
• Types of Penetrators
Crackers: people that only want to cause damage or harm into a
system
Cybercriminals: computer fraud practicers
Cyber terrorists: most dangerous!
Hackers: to test their skills, they break into information systems.
Less technically skilled hackers are called script kiddies
THE INTERNET
• Types of Penetrators
Hacktivitists: uses computer resources to promote their ideologies
Industrial spies: targets trade secrets which are info with
economic value to a certain organization which cannot be divulged
to the public
Malicious insiders: hard to discover, people working inside the
company use its resources to engage in fraudulent activities
THE INTERNET
• Laws on Cybercrime
The Computer Fraud and Abuse Act of 1984
National Information Infrastructure Protection Act of 1996
Economic Espionage Act
Communications Assistance for Law Enforcement Act
Electronic Communications Privacy Act
* The first cybercrime law in our country was the Cybercrime
Prevention Act of 2012 signed in September 12, 2012 that aims to
punish computer related crimes
THE INTERNET
• World Wide Web (WWW)
– a collection of interlinked documents called webpages
written usually in Hypertext Markup Language (HTML) that
can be accessed over the internet using a browser that
allows us to enter the Uniform Resource Locator (URL) of the
webpage we want to access