You are on page 1of 19

UNIT II – THE INTERNET COMSCI 1200

THE INTERNET?
• What is Internet?
– a globally connected network system that uses TCP/IP to
transmit data via various types of media
– a network of global exchanges – including private, public,
business, academic and government networks – connected by
guided, wireless and fiber-optic technologies
– simply called “The Net”
THE INTERNET
• Internet vs internet
• Internet
– is the world wide network comprising of all other networks
interconnected and communicating on the open Web
• internet
– is a series of networks owned by two or more organizations
(Microsoft and Google, for example) and set up to communicate
with each other
THE INTERNET
• History of Internet
1960: Paul Baran(employee of RAND Corporation) wanted to design a
network for DoD which the Pentagon approved of but AT&T rejected his idea.
1967: Larry Roberts, program manager of Advanced Research Projects
Agency coordinated with Wesley Clark in creating a packet-switched subnet-
ARPANET
1969: The initial Arpanet was deployed with 4 nodes: UCLA, UCSB, SRI, and
University of Utah. The ARPANET reach 213 nodes later on.
THE INTERNET
• History of Internet
1981: The US National Science Foundation created Computer Science
Network which allowed computer science departments and industrial
science lab to connect with ARPANET.
1986: The NFSNET was completed. The regional networks are
connected to the backbone which allowed nodes to communicate with
each other and access the supercomputers of NSF at Boulder,
Champaign, Ithaca, Pittsburgh and Princeton and San Diego
1990s: The ARPANET was shutdown, and with funding and control of
NFSNET, ANSNET was formed. Other countries also built their own
national research networks through ARPANET and NFSNET as models
THE INTERNET
• How to Google effectively
 Use the tabs in Google search
 Use quotes to minimize guesswork for Google search
 Use a hyphen to exclude words
 Use a colon to search specific sites
 Find a page that links to another page
THE INTERNET
• How to Google effectively
 Use the asterisk wildcard
 Find sites that are similar to other sites
 Use Google search to do math
 Search for multiple words at once
 Search a range of number
THE INTERNET
• How to Google effectively
 Keep it simple
 Gradually add search terms
 Use words that websites would use
 Use important words only
 Google search has shortcuts
THE INTERNET
• How to Google effectively
 Spelling doesn’t necessarily matter
 Use descriptive words
 Find a specific file
 Money and unit conversions
 Track your packages
THE INTERNET
• Uses of Internet
 Resource sharing
– the interconnection of devises allowed them to share physical
resources among each other such as disk drives, printers and scanners.
 Medium for communication
– alternative means of communication
 Electronic commerce (E-Commerce)
– can either be B2B, B2C, C2B, and C2C
THE INTERNET
• World Wide Web (WWW)
 Hypertext Transfer Protocol is the common protocol being
used in the web
 The domain name specifies the exact location of the host of
the webpage, it gets translated into its equivalent IP address
using the Domain Name System.
THE INTERNET
• Electronic Mail (E-mail)
– Email servers sends a request to the server that a new
message needs to be send that uses the Simple Mail Transfer
Protocol in processing emails
– An email has its own domain and handles a number of
users in domain
Examples: sender@yahoo.com user: sender name, yahoo.com
is the domain name
THE INTERNET
• Computer Security and Privacy
 Computer security is the protection of resources that are considered
as valuable asset in a computer system.
 Confidentiality is ensuring that a resource can only be accessed by an
authorized user.
 Availability is when an authorized person should be able to access a
resource anytime.
 Integrity is preserved by allowing modifications of an authorized
person only.
 Privacy is the protection of one’s personal info against unathourized
access.
THE INTERNET
• Threats to Security and Privacy
• Vulnerability is a weakness in the system which maybe in its
design structure or operation.
•Threats:
 Botnet – collection of computers controlled by a group of
malicious users
 Distributed Denial of Service – when a system fails to respond
to the requests of legitimate users
 Phising – use of email to collect personal info from a recipient
THE INTERNET
• Threats to Security and Privacy
 Rootkit – a program that gives a user a root privilege of infected system
 Spam – unsolicited emails with advertisements sent to a large number of
people
 Trojan Horse – malicious code that hides itself in an expectedly harmless
program
 Virus – piece of code or program that performs malicious operations in
a computer
 Worm – can propagate in a machine or whole network even without
action of the user
THE INTERNET
• Types of Penetrators
 Crackers: people that only want to cause damage or harm into a
system
 Cybercriminals: computer fraud practicers
 Cyber terrorists: most dangerous!
 Hackers: to test their skills, they break into information systems.
Less technically skilled hackers are called script kiddies
THE INTERNET
• Types of Penetrators
 Hacktivitists: uses computer resources to promote their ideologies
 Industrial spies: targets trade secrets which are info with
economic value to a certain organization which cannot be divulged
to the public
 Malicious insiders: hard to discover, people working inside the
company use its resources to engage in fraudulent activities
THE INTERNET
• Laws on Cybercrime
 The Computer Fraud and Abuse Act of 1984
 National Information Infrastructure Protection Act of 1996
 Economic Espionage Act
 Communications Assistance for Law Enforcement Act
 Electronic Communications Privacy Act
* The first cybercrime law in our country was the Cybercrime
Prevention Act of 2012 signed in September 12, 2012 that aims to
punish computer related crimes
THE INTERNET
• World Wide Web (WWW)
– a collection of interlinked documents called webpages
written usually in Hypertext Markup Language (HTML) that
can be accessed over the internet using a browser that
allows us to enter the Uniform Resource Locator (URL) of the
webpage we want to access

You might also like