You are on page 1of 33

ANALYTICAL ABILITY AND DIGITAL AWARENESS

MODULE 4: PART 1
Web Surfing and Cyber
Security
• Part 1 Web Surfing: An Overview: working of Internet, Browsing the Internet, E-Mail,
Components of E-Mail, Address Book, Troubleshooting in E-Mail, Browsers: Netscape Navigator,
Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Tor, Search Engines like Google,
DuckDuckGo etc., Visiting web sites: Downloading.

• Part 2 Cyber Security: Introduction to Information System, Type of information system, CIA
model of Information Characteristics, Introduction to Information Security, Need of Information
Security, Cyber Security, phishing, spamming, fake news, general issues related to cyber security,
Business need, Ethical and Professional issues of security.
INTERNET
A global system of interconnected computers,
using a standardised Internet Protocol suite for
communication and sharing information is
called the Internet. The term Internet is
derived from the words ‘interconnection’ and
‘networks’. A network is a collection of two or
more computers, which are connected
together to share information and resources.
History of Internet
• Given below are a few important points which played an extremely important role in the
development of the Internet and making it one of the most widely used resources across the world. 
• The first development was observed in 1969 when U.S. Defence Department sponsered an agency
called Advanced Research Projects Agency (ARPA) and the network developed by this agency was
called ARPANET
• In mid 80’s the National science Foundation(NSF) created a new network NSFNET which was more
capable than ARPANET.
• With the introduction of personal computers, the demand for commercial Internet usage increased.
This was the time when Ethernet and other Local Area Networks came in the foreground
• In 1993, the web browser was introduced.
• The late 1990s thousands of Internet Service Providers arrived.
• And then the 21st century brought in an amalgamation of technology and wireless Internet
accessibility for its users. Wherein, wireless broadband services came in as a boon for Internet users.
WORKING OF INTERNET

• The internet is a worldwide computer network that transmits a variety of data and media
across interconnected devices.
• All computers on the Internet, communicate with one another using TCPand IP, which are
basic protocol (i.e. set of rules) of the Internet.
• TCP/IP (Transmission Control Protocol/Internet Protocol) manages the transmission of
data/file/document on the Internet by breaking the data/file/document into small pieces or
parts called packets or datagrams.
• Each packet contains actual data and address part.
• TCP It breaks message into smaller packets that are transmitted over the Internet and also
reassembles these smaller packets into the original message that are received from the
Internet.
• IP It handles the address part of each packet, so that the data is sent to the correct address.
E-Mail

• Electronic Mail- Email is a service which


allows us to send the message in electronic
mode over the internet. Each user of email is
assigned a unique name for his email
account. This name is known as E-mail
address.  
Advantage of E-MAIL

• provides faster and easy means of communication.


• It is effective and cheap means of communication.
• E-mail is not just only for textual message. One can send any kind of
multimedia within mail.
• E-mail can be send at any hour of day, thus ensures timeliness of message.
• It is secure and reliable method.
• To write an e-mail there is no need of any kind of paper, thus it is
environment friendly.
DISADVANTAGE OF E-MAIL
• It is source of viruses.
• It can be source of various spams.
• To use facility of e-mail, user must have an access to internet.
• Sometimes, e-mails becomes misunderstood as it is not capable
of expressing emotions.
Components/ Parts of an E-mail
1. Subject Line The Subject field indicates the purpose of e-mail. It should be
precise and to the point
2. The From field indicates the sender’s address i.e. who sent the e-mail.
3. The To field indicates the recipient’s address i.e. to whom the e-mail is sent.
4. Carbon Copy (CC) – people who receive the email for their own information,
but who are not expected to reply.
5. Blind Carbon Copy (BCC) – people who receive the email but are not listed as
recipients. Senders use the BCC section if they don’t want recipients to know
who else has received the email.
6. Date- The Date field indicates the date and time when the e-mail was sent.
• 7. Salutation -After the subject line is your email salutation, or greeting. For
Example Respected /Dear Sir
• 8. Email Body- The email body contains the actual message of the email. Effective
emails keep their email short and add more extensive information to the
attachments.
• 9. Closing- Email shall end with Formal closings like “Sincerely” and “Thank you
• 10. Signature- E-mail systems allow you to enter a signature that will appear
automatically at the bottom of every message you send. This feature is optional
and is mostly used for business e mails.
• 11. Attachments- An email might include an attachment that provides more
information. The attachment could be a document for review, a picture to share or
any other file type.
E-Mail Address

• E-Mail Address
• Each user of email is assigned a unique name for his email account. This
name is known as E-mail address. Different users can send and receive
messages according to the e-mail address.
• E-mail is generally of the form username@domainname. For example,
webmaster@tutorialspoint.com is an e-mail address where webmaster is
username and tutorialspoint.com is domain name.
• The username and the domain name are separated by @ (at) symbol.
• E-mail addresses are not case sensitive.
• Spaces are not allowed in e-mail address
Parts of an E-Mail address
1. Username
The username is the first part of an email address. Back in the early days of the Internet, people chose fun usernames like
“musicfan156” or “blueeyes563” that described their hobbies or personalities. But now that email is so prominent in the
professional world, usernames tend to include the person’s real name or initials. For example, Javier Martinez is more likely to be
taken seriously as “jmartinez” than as “heavymetallover42628.”
2. @ Symbol
The @ symbol, which means “at,” separates the username from the rest of the email address. It means that the username belongs
to the domain on the other side of the @ symbol. A server receiving the email uses the @ symbol to determine into which mail
server it should sort the incoming message.

Domain name The mail server and top-level domain (TLD) combine to make a user’s Domain name

3. Mail Server
The name of the person’s mail server is on the right side of the @ symbol. It indicates the organization that hosts the server where
their emails go. Many companies create their own domain names for their employees to use, while other domains are available for
personal use (for example: Gmail, Yahoo, Outlook).
4. Top-Level Domain
The top-level domain tells users what type of organization they are emailing. There are six common top-level domains:
.com – company, .edu – educational institution, .gov – government institution, .org – organization, .net – network, .mil – military
Troubleshooting

Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system. It is a logical, systematic search for the source of a problem in order to solve it,
and make the product or process operational again.

• Troubleshooting is a systematic approach to problem-solving that is often used to find and correct
issues with complex machines, electronics, computers and software systems.

Reasons for problems related to an E-mail


• Incorrect email infos (typos)
• Anti-spam rules, firewalls, blacklists, etc.
• Server settings, configuration, and software
• Rules/scripts/filters set up by hosting companies
• Interference from other scripts and plugins
• Interference from the theme template
• Software misconfiguration
• Network issues
INTERNET INTRANET

1. Public Network Private Network

2. Anyone can access the internet Only members of University,


company can access the intranet

3. Unlimited Users Limited Users

4. It is a huge network consisting: LAN,MAN,WAN. It mostly depends upon LAN

5. No owner Some owner


There are two main types of computer networks

• Local Area Network (LAN): A LAN is two or more connected computers sharing certain resources in
a relatively small geographic location, often in the same building. Examples include home networks
and office networks.
• Wide Area Network (also known as WAN): is a large network of information that is not tied to a
single location. WANs can facilitate communication, the sharing of information and much more
between devices from around the world through a WAN provider.
Web Browsers
 A web browser is a software program that allows a user to locate, access, and display web
pages.
Web browsers were first introduced in 1990, but they've evolved significantly since then. The
first web browser was called WorldWideWeb; later, it changed its name to Nexus.

 Web browsers are used primarily for displaying and accessing websites on the internet, as well
as other content created using languages such as Hypertext Markup Language (HTML) and
Extensible Markup Language (XML).
 Browsers translate web pages and websites delivered using Hypertext Transfer Protocol (HTTP)
into human-readable content. They also have the ability to display other protocols and prefixes,
such as secure HTTP (HTTPS), File Transfer Protocol (FTP), email handling (mailto:), and files
(file:).
 In addition, most browsers also support external plug-ins required to display active content,
such as in-page video, audio and game content.
Address Bar
• Browsers have an address bar that shows the web address
(also called a URL) of the page you are on. To go to a different
page, you can type an address in the address bar and then
press Enter (or Return).
Links
Most of the time, you will get to a different page by clicking on a
link. A link can be text or an image, and it's usually formatted to
stand out so you know to click on it. Many text links are blue, and
they may also be underlined. For example, this is a link. It will
open a web page in a new window, and you can close it to come
back to this page.
 Web Browsers:
1. Netscape Navigator
2. Microsoft Internet Explorer
3. Google Chrome
4. Mozilla Firefox
5. Tor
Netscape Navigator
• Netscape Navigator was the first commercially successful Web browser. It was based off the Mosaic browser and was
created by a team led by Marc Andreessen.  Netscape Navigator helped influence the development of the Web into a
graphical user experience rather than a purely text-based one.
• In the 1990s, Netscape Navigator was on the leading edge of innovations in Web browsing.
Among the many features that became standard after Navigator pioneered them are:
1. Displaying a Web page as it loads
2. Using Javascript to create forms and interactive content
3. Using cookies to store session information

• Netscape helped make the Web graphical rather than a text-only experience. Many browsing features became
standard after Netscape introduced them. Netscape could display a webpage while loading, used JavaScript for
forms and interactive content, and stored session information in cookies.
• It had an advanced licensing scheme and allowed free usage for non-commercial purposes
• Despite Netscape's technical advantages and initial dominance, by the late 1990s Internet Explorer swiftly overtook
Netscape in market share.
Microsoft Internet Explorer
• Often abbreviated as IE or MSIE, Microsoft Internet Explorer is an
Internet browser that allows users to view web pages on the Internet.
Users can also utilize Internet Explorer to listen to and watch streaming
content, access online banking, make purchases over the Internet, and
much more.
• Internet Explorer was first introduced on August 16, 1995, by Microsoft as
version 1.0 and it came with Microsoft Windows 95.
• It was included in the Microsoft Windows operating system
• In 2015, it was replaced with “Microsoft Edge”, as it became the default
browser on Windows 10.
Google Chrome
• Chrome is a free Internet browser officially released by Google on December 11, 2008.
• Chrome works quite well with Google sites and services such as YouTube and Gmail. It also manages
its system resources differently than other browsers.
• Its features include synchronization with Google services and accounts, tabbed browsing, and
automatic translation and spell check of web pages. It also features an integrated address
bar/search bar, called the omnibox.
• It is a cross-platform web browser
• Multiple features from old browsers were amalgamated to form better and newer features.
• To save computers from malware, Google developed the ad-blocking feature to keep the user data
safe and secure
• Incognito mode is provided where private searching is available where no cookies or history is saved
• Till date, it has the best user interface.
Mozilla Firefox
• Mozilla Firefox is a Web Bowser, with which one can access the internet. The web browser
lets one access information in form of text, audio, images, and videos from all around the
world.
• It is used to get information using the internet from different servers available all around
the world.
• Firefox was introduced around 2002 but was fully released around 2004 and since then it
has got a lot of popularity. Firefox consumes more memory but highly efficient and safer
over the other browsers.
• Firefox overtook the usage share from Internet Explorer and became the dominant
browser during 2003-04
• Location-aware browsing was made available with Firefox
• This browser was also made available for mobile phones, tablets, etc.
Tor
• Tor (short for “The Onion Router”) is a completely free, open-source
browser that helps you surf the internet anonymously. It erases your browsing
history automatically with every session, and encrypts all your traffic.
• The Tor Browser is a web broswer that anonymizes your web traffic using the Tor
network, making it easy to protect your identity online. Tor is undoubtedly the
most secure browser. However, it’s not easy to use Tor. It operates slowly and
has many limitations. But on the plus side, it doesn’t store history and it changes
your IP as well. 
• Tor aims to improve your online privacy and, up to a point, your security. The
browser makes use of Tor’s vast and worldwide server network to hide your IP
and secure your connection.
Search Engines
• A search engine is an online software program that is designed to
search for websites on the internet based on the user’s search
query.
• When a user enters a search term, the search engine looks at the
website page titles, contents and keywords it has indexed and
uses algorithms (step-by-step operations) to produce a list of sites
—with the most relevant websites at the top of the list.
• It looks for the results in its own database, sorts them and makes
an ordered list of these results using unique search algorithms.
Difference between a browser and a search engine

• Web browser (e.g. Chrome, Firefox, Microsoft Edge, etc.) is a


software application that is installed on the computer or a
smartphone. The purpose of the browser is to provide a user-
friendly interface to display the webpages.
• Search engine (e.g. Google, Bing, Yahoo!, etc.) is an online tool
available on the website that can be accessed through a web
browser. The purpose of a search engine is to provide answers
to users’ queries in the form of relevant webpages.
 Search engine 
1. Google
2. Microsoft Bing
3. DuckDuckGo (DDG)
4. Yahoo!
Google
• Google is the biggest and most popular search engine in the world.
• With all its features that include sophisticated algorithms, effective crawling,
indexing, and ranking, Google provides excellent search results not only within its
own search engine, it powers some other search engines as well (e.g. ask.com).
• Reasons why is Google the most widely used search engine.
• It was one of the diversified search engines
• It offers relevant results
• It is fast
• It is constantly improved
• It is connected to several free services
Microsoft Bing
•  Microsoft Bing
• Bing is a search engine. It was launched in 2009 and it’s owned by
Microsoft.
• Microsoft Bing is in many ways similar to Google, providing search
result types like images, videos, places, maps or news.
• Although Bing uses the fundamental principles of search engines
(crawling, indexing, ranking) it also uses a special algorithm
called Space Partition Tree And Graph which is based on the vectors for
categorization of information and for answering the search queries.
DuckDuckGo (DDG)
• DuckDuckGo (DDG) is an Internet search engine that emphasizes protecting searchers' privacy
and avoiding the filter bubble of personalized search results. DuckDuckGo distinguishes itself
from other search engines by not profiling its users and by showing all users the same search
results for a given search term, and emphasizes returning the best results
• DuckDuckGo is a search engine that prioritizes user privacy and does not manipulate search
results according to a user’s data. Other search engines like Google and Bing collect data
about a user’s behavior and search history to tailor the ads it displays for a more targeted
result. DuckDuckGo, on the other hand, does not collect personal data or log user information
and instead displays advertisements (using Microsoft’s ad network) based on the keyword
being searched.
• DuckDuckGo was founded in 2008 by tech entrepreneur Gabriel Weinberg.
• The Tor Project, Inc made DuckDuckGo the default search engine for Tor Browser 6.0.
Yahoo!

• Yahoo is a search engine that was very popular in past years. In addition to a
searching platform, it also provided other services to its users, such as Yahoo mail,
etc. When Google entered the market, it gained more popularity than Yahoo.
• It incorporates a search engine and a directory of World Wide Web sites organized
in a hierarchy of topic categories. As a directory, it provides both new and
seasoned Web users the reassurance of a structured view of hundreds of
thousands of Web sites and millions of Web pages.
• It was first launched in 1990's. Yahoo provides several other facilities to its users
other than search engines platform. Yahoo offers Yahoo Mail, Yahoo News, Yahoo
Dictionary, Yahoo Maps, and many more services.
• The acronym of Yahoo is - "Yet Another Hierarchical Officious Oracle".

You might also like