Infot Reviewer 2
Infot Reviewer 2
Email
The Internet is an increasingly important part of everyday life for people Short for electronic mail, email is a way to send and receive messages across
around the world. the Internet. Almost everyone who uses the Internet has their own email
account, usually called an email address. This is because you'll need an email
What is the Internet? address to do just about anything online, from online banking to creating a
The Internet is a global network of billions of computers and other electronic Facebook account.
devices. With the Internet, it's possible to access almost any information,
communicate with anyone else in the world, and do much more. Social networking
You can do all of this by connecting a computer to the Internet, which is also Social networking websites are another way to connect and share with your
called going online. When someone says a computer is online, it's just another family and friends online. Rather than sharing with just a few people over
way of saying it's connected to the Internet. email, social networks make it easier to connect and share with many people
at the same time. Facebook is the world's largest social networking site, with
What is the Web? more than 1 billion users worldwide.
The World Wide Web—usually called the Web for short—is a collection of
different websites you can access through the Internet. A website is made up Chat and instant messaging
of related text, images, and other resources. Websites can resemble other Chat and instant messaging (IM) are short messages sent and read in real time,
forms of media—like newspaper articles or television programs—or they can allowing you to converse more quickly and easily than email. These are
be interactive in a way that's unique to computers. generally used when both (or all) people are online, so your message can be
The purpose of a website can be almost anything: a news platform, an read immediately. By comparison, emails won't be seen until recipients check
advertisement, an online library, a forum for sharing images, or an educational their inboxes.
site like us!
Screenshot of chat
How does the Internet work? Examples of instant messaging applications include Yahoo Messenger and
It's important to realize that the Internet is a global network of physical cables, Google Hangouts. Some sites, like Gmail and Facebook, even allow you to
which can include copper telephone wires, TV cables, and fiber optic cables. chat within your web browser.
Even wireless connections like Wi-Fi and 3G/4G rely on these physical cables
to access the Internet. Online media
There are many sites that allow you to watch videos and listen to music. For
When you visit a website, your computer sends a request over these wires to a example, you can watch millions of videos on YouTube or listen to Internet
server. A server is where websites are stored, and it works a lot like your radio on Pandora. Other services, like Netflix and Hulu, allow you to watch
computer's hard drive. Once the request arrives, the server retrieves the movies and TV shows. And if you have a set-top streaming box, you can even
website and sends the correct data back to your computer. watch them directly on your television instead of a computer screen.
You don't necessarily need to buy a router to connect to the Internet. It's What is a web app?
possible to connect your computer directly to your modem using an Ethernet Web applications—or web apps—that run in the cloud and do not need to be
cable. Also, many modems include a built-in router, so you have the option installed on your computer. Many of the most popular sites on the Internet are
of creating a Wi-Fi network without buying extra hardware. actually web apps.
Facebook: Facebook lets you create an online profile and interact with your Avoid using words that can be found in the dictionary. For example,
friends. Profiles and conversations can be updated at any time, so Facebook swimming1 would be a weak password.
uses web app technologies to keep the information up to date. Random passwords are the strongest. If you're having trouble creating one,
you can use a password generator instead.
Pixlr: Pixlr is an image editing application that runs in your web browser.
Much like Adobe Photoshop, it includes many advanced features, like color Your browser's security features
correction and sharpening tools. Your computer faces different threats whenever you browse the Web,
including viruses, malware, and spyware. The good news is your web browser
Google Docs: Google Docs is an office suite that runs in your browser. Much has a lot of built-in security features to help protect your computer.
like Microsoft Office, you can use it to create documents, spreadsheets,
presentations, and more. And because the files are stored in the cloud, it's easy Check the web address
to share them with others. Malicious websites often use deceptive web addresses to trick users. For
example, www.wellfargo.com looks similar to www.wellsfargo.com, but it's
missing the s in the middle.
INTERNET SAFETY
Double-checking the domain name is a good way to ensure you're going to the
Introduction to Internet safety real, trusted site—not a phony site with a similar web address. Some web
There's almost no limit to what you can do online. Unfortunately, the Internet browsers will even try to make the domain name easier to read. In the example
is also home to certain risks, such as malware, spam, and phishing. If you below, you can see that wellsfargo.com uses a darker color in the address bar.
want to stay safe online, you'll need to understand these risks and learn how to
avoid them. Look at the security symbol
Some websites will display a lock symbol in the address bar. This is most
Adopting a safer mindset commonly seen with certain types of websites, like online stores and banking
Computers can often give us a false sense of security. After all, no one can sites. This means the website is using an HTTPS connection, which makes it
physically harm you through a computer screen. But to stay safe online, you'll safe to enter your personal information. You'll also see https at the beginning
want to take a more cautious approach. Here's one way to think about it: Treat of the URL.
the Internet as you would a shopping mall.
the HTTPS symbol
Most people don't consider a mall to be an especially dangerous place. You You won't see this symbol on all websites, and that's OK—not all websites
can go there to shop and meet up with friends. But there are also small things need this extra layer of security. However, you should avoid entering any
you may do to stay safe, even if you don't think about them very often. For sensitive information, such as your credit card number, if you don't see this
example, you probably wouldn't leave your car unlocked or give your credit symbol in the address bar.
card number to a stranger.
Update your browser regularly
Apply this same mindset whenever you're online. You shouldn't be afraid to New viruses and malware are created all the time, so it's important to update
use the Internet, but remember that it comes with many of the same risks your browser regularly. Your browser will usually notify you when it has an
you'd face in the real world. Throughout this tutorial, we'll show you how to update available, but you always have the option to update manually.
prepare for these risks so you can be online without putting yourself in danger.
Avoiding spam and phishing
Creating strong passwords To protect yourself from email scams, malicious software, and identity theft,
You'll need to create a password to do just about everything on the Web, from you'll need to understand how to identify and avoid potentially dangerous
checking your email to online banking. And while it's simpler to use a short, content in your inbox, including spam and phishing attempts.
easy-to-remember password, this can also pose serious risks to your online
security. To protect yourself and your information, you'll want to use Dealing with spam
passwords that are long, strong, and difficult for someone else to guess Spam messages can clutter your inbox and make it more difficult to find the
while still keeping them relatively easy for you to remember. emails you actually want to read. Even worse, spam often includes phishing
and malware, which can pose a serious risk to your computer. Fortunately,
Why do I need a strong password? most email services now include several features to help you protect your
Even though most websites are secure, there's always a small chance someone inbox from spam.
may try to access or steal your information. This is commonly known as
hacking. A strong password is one of the best ways to defend your accounts Spam filters
and private information from hackers. Whenever you receive an email, most email providers will check to see if it's a
real message or spam. Any likely spam messages will be placed in the spam
Tips for creating strong passwords folder so you don’t accidentally open them when checking your email.
A strong password is one that's easy for you to remember but difficult for
others to guess. Spam-blocking systems aren’t perfect, though, and there may be times when
legitimate emails end up in your spam folder. We recommend checking your
Never use personal information such as your name, birthday, user name, spam folder regularly to make sure you aren’t missing any important emails.
or email address. This type of information is often publicly available, which
makes it easier for someone to guess your password. Many email services also have a feature you can use to mark emails as spam.
In Gmail, for example, you can select the message and click the Mark as
Use a longer password. Your password should be at least six characters long, Spam button. This helps your email provider filter out these types of messages
although for extra security it should be even longer. in the future.
Don't use the same password for each account. If someone discovers your
password for one account, all of your other accounts will be vulnerable. Turning off email images
Try to include numbers, symbols, and both uppercase and lowercase Spam messages often contain images that the sender can track. When you
letters. open the email, the images will load and the spammer will be able to tell if
your email works, which could result in even more spam. You can avoid this
by turning off email images. Let's look at how to do this in Gmail, but - Ads can look like messages saying you have won a prize and
remember that the process will vary depending on your email service. instructing you to click to claim it.
- Pop-up windows frequently contain malware or attempt to lead
Phishing you to a less secure site. Most reputable sites don't use pop-up
Phishing scams are messages that try to trick you into providing sensitive windows. Many browsers block pop-up windows by default.
information. These often appear to come from a bank or another trusted - If you are prompted to download something you weren't
source, and they'll usually want you to re-enter a password, verify a birth date, expecting—or if it seems to be unrelated to the page you were
or confirm a credit card number. Phishing messages may look real enough at on—it's probably malware.
first glance, but it’s surprisingly easy for scammers to create convincing - Headlines that are ambiguous and sensational that encourage you
details. to click to read more are called clickbait. Sites that use lots of
clickbait headlines are more likely to contain links to malware.
Logo Fraud
It's easy to make a copy of any logo. Identify suspicious sites
If you're ever unsure whether a website or download is safe, close it and
Other common email scams investigate the site before returning to it. It's always a good idea to be cautious
Some will promise to give you a lot of money if you advance a small amount when browsing unfamiliar sites.
upfront. Others may pretend to be from people you know in real life, and
they'll often ask you to send money or download an attached file. - Ask your friends if the site is reputable or if they have any
experiences with the site.
As with spam and phishing scams, remember to trust your best judgment. You should - Search for information about the site. Use a search engine to find
never send someone money just because you've received an email request. You should news about the organization that runs the site, or look for posts on
also never download email attachments you weren't expecting because they might contain
forums about other people's experiences with that site.
malware that could damage your computer and steal your personal information.
- Check the address bar in your browser. Some malicious
websites are designed to look like other well-known sites, but your
Spam, scams, and phishing schemes will continue to evolve and change. But
address bar will tell you which site you're actually on. If you are no
now that you know what to look for—and what to avoid—you can keep your
longer on the site you expected to be, it's suspicious.
inbox and computer that much safer.
- Run a Google safe browsing diagnostic on the site. Copy and
paste the URL of a site into the search box on the diagnostic page,
then click the search button. This will display a site safety report.
INTERNET SAFETY: HOW TO AVOID MALWARE
If you want to opt out of cookies entirely, you could try enabling the Do Not What is IoT? The internet of things explained
Track setting in your browser. Most web browsers disable this feature by
default, but it can usually be activated from the privacy settings. The internet of things (IoT) is a network of connected smart devices providing
rich data, but it can also be a security nightmare.
turning on the Do Not Track feature in Google Chrome
Note that participation in the Do Not Track program is voluntary, so some The internet of things (IoT) is a catch-all term for the growing number of
sites may not honor this request. If you'd prefer to avoid cookies altogether, electronics that aren’t traditional computing devices, but are connected to the
internet to send data, receive instructions or both.
The final step, data processing and analytics, can take place in data centers or
There’s an incredibly broad range of ‘things’ that fall under the IoT umbrella: the cloud, but sometimes that’s not an option. In the case of critical devices
Internet-connected ‘smart’ versions of traditional appliances such as such as shutoffs in industrial settings, the delay of sending data from the
refrigerators and light bulbs; gadgets that could only exist in an device to a remote data center is too great. The round-trip time for sending
internet-enabled world such as Alexa-style digital assistants; and data, processing it, analyzing it and returning instructions (close that valve
internet-enabled sensors that are transforming factories, healthcare, before the pipes burst) can take too long.
transportation, distribution centers and farms.
In such cases edge computing can come into play, where a smart edge device
What is the internet of things? can aggregate data, analyze it and fashion responses if necessary, all within
The IoT brings internet connectivity, data processing and analytics to the relatively close physical distance, thereby reducing delay. Edge devices also
world of physical objects. For consumers, this means interacting with the have upstream connectivity for sending data to be further processed and
global information network without the intermediary of a keyboard and screen stored.
(Alexa, for example).
A growing number of edge computing use cases, such as autonomous vehicles
In enterprise settings, IoT can bring the same efficiencies to manufacturing that need to make split-second decisions, is accelerating the development of
processes and distribution systems that the internet has long delivered to edge technologies that can process and analyze data immediately without
knowledge work. Billions of embedded internet-enabled sensors worldwide going to the cloud.
provide an incredibly rich set of data that companies can use to improve the
safety of their operations, track assets and reduce manual processes. Network World How Internet of Things Works diagram
Network World / IDG
Data from machines can be used to predict whether equipment will break How the internet of things works.
down, giving manufacturers advance warning to prevent long stretches of
downtime. Researchers can also use IoT devices to gather data about customer Examples of IoT devices
preferences and behavior, though that can have serious implications for Essentially, any device that can gather and transmit information about the
privacy and security. physical world can participate in the IoT ecosystem. Smart home appliances,
RFID tags, and industrial sensors are a few examples. These sensors can
How big is the IoT? monitor a range of factors including temperature and pressure in industrial
In a word: enormous. Priceonomics breaks it down: There were more than 50 systems, status of critical parts in machinery, patient vital signs, the use of
billion IoT devices in 2020, and those devices generated 4.4 zettabytes of data. water and electricity, among many, many other possibilities.
(A zettabyte is a trillion gigabytes.) By comparison, in 2013 IoT devices
generated a mere 100 billion gigabytes. The amount of money to be made in Factory robots can be considered IoT devices, as well as autonomous vehicles
the IoT market is similarly staggering; estimates on the value of the market in and robots that move products around industrial settings and warehouses.
2025 range from $1.6 trillion to $14.4 trillion. Municipalities exploring smart city ecosystems are using IoT and
machine-to-machine (M2M) sensors to enable applications such as traffic
In its Global IoT Market Forecast, IoT Analytics Research predicts there will monitoring, street light management, and crime prevention through camera
be 27 billion active IoT connections (excluding computers, laptops, phones, feeds.
cellphones and tablets) by 2025. However, the company did lower its forecast
based on the ongoing chip shortage, which it expects to impact the number of Other examples include fitness wearables and home security systems. There
connected IoT devices beyond 2023. are also more generic devices, like the Raspberry Pi or Arduino, that let you
build your own IoT endpoints. Even though you might think of your
How does the IoT work? smartphone as a pocket-sized computer, it may well also be beaming data
The first element of an IoT system is the device that gathers data. Broadly about your location and behavior to back-end services in very IoT-like ways.
speaking, these are internet-connected devices, so they each have an IP
address. They range in complexity from autonomous mobile robots and IoT device management
forklifts that move products around factory floors and warehouses, to simple In order to work together, all those devices need to be authenticated,
sensors that monitor the temperature or scan for gas leaks in buildings. provisioned, configured, and monitored, as well as patched and updated as
necessary. Too often, all this happens within the context of a single vendor’s
They also include personal devices such as fitness trackers that monitor the proprietary systems – or, it doesn’t happen at all, which is even more risky.
number of steps individuals take each day. But the industry is starting to transition to a standards-based device
management model, which allows IoT devices to interoperate and will ensure
Explore related questions that devices aren’t orphaned.
How do IoT devices impact everyday consumer privacy?
Can IoT devices function in areas with poor internet connectivity? IoT communication standards and protocols
What are the potential health risks of widespread IoT usage? When IoT gadgets talk to other devices, they can use a wide variety of
How does IoT contribute to the advancement of smart cities? communication standards and protocols, many tailored to devices with limited
Are there international regulations governing IoT device interoperability? processing capabilities or low power consumption. Some of these you’ve
Ask a question definitely heard of — Wi-Fi or Bluetooth, for instance — but many more are
specialized for the world of IoT. ZigBee, for example, is a wireless protocol
Ask for low-power, short-distance communication, while message queuing
In the next step in the IoT process, collected data is transmitted from the telemetry transport (MQTT) is a publish/subscribe messaging protocol for
devices to a gathering point. Moving the data can be done wirelessly using a devices connected by unreliable or delay-prone networks. (See Network
range of technologies or over wired networks. Data can be sent over the World’s glossary of IoT standards and protocols.)
internet to a data center or the cloud. Or the transfer can be performed in
phases, with intermediary devices aggregating the data, formatting it, filtering The increased speeds and bandwidth of 5G cellular networks are expected to
it, discarding irrelevant or duplicative data, then sending the important data benefit IoT. In its Global IoT Market Forecast, IoT Analytics Research
along for further analysis. predicted a compounded annual growth rate (CAGR) of 159% for 5G-based
IoT devices from 2021 through 2025.
IoT, edge computing and the cloud
IoT and business applications
Business uses for IoT include keeping track of customers, inventory, and the
Network World / IDG status of important components. Here are four industries that have been
How edge computing enables IoT. transformed by IoT:
For many IoT systems, the stream of data is coming in fast and furious, which Oil and gas: Isolated drilling sites can be better monitored with IoT sensors
has given rise to a new technology category called edge computing, which than by human intervention.
consists of appliances placed relatively close to IoT devices, fielding the flow Agriculture: Granular data about crops growing in fields derived from IoT
of data from them. These machines process that data and send only relevant sensors can be used to increase yields.
material back to a more centralized system for analysis. For instance, imagine HVAC: Climate control systems across the country can be monitored by
a network of dozens of IoT security cameras. Instead of bombarding the manufacturers.
building’s security operations center (SoC) with simultaneous live-streams, Brick-and-mortar retail: Customers can be micro-targeted with offers on their
edge-computing systems can analyze the incoming video and only alert the phones as they linger in certain parts of a store.
SoC when one of the cameras detects movement. More generally, enterprises are looking for IoT solutions that can help in four
areas: energy use, asset tracking, security, and customer experience.
And where does that data go once it’s been processed? Well, it might go to
your centralized data center, but more often than not it will end up in the Industrial IoT
cloud. The elastic nature of cloud computing is great for IoT scenarios where The IIoT is a subset of the Internet of Things made up of connected sensors
data might come in intermittently or asynchronously. and instrumentation for machinery in the transport, energy, and industrial
sectors. The IIoT includes some of the most well-established sectors of the
Cloud vendors offer IoT platforms IoT market, including the descendants of some devices that predate the IoT
The cloud giants (Microsoft, Amazon, Google) are trying to sell more than moniker. IIoT devices are often longer-lived than most IoT endpoints – some
just a place to stash the data your sensors have collected. They’re offering full remain in service for a decade or more – and as a result may use legacy,
IoT platforms, which bundle together much of the functionality to coordinate proprietary protocols and standards that make it difficult to move to modern
the elements that make up IoT systems. In essence, an IoT platform serves as platforms.
middleware that connects the IoT devices and edge gateways with the
applications you use to deal with the IoT data. That said, every platform Consumer IoT
vendor seems to have a slightly different definition of what an IoT platform is, The move of IoT into consumer devices is more recent but much more visible
the better to distance themselves from the competition. to ordinary people. Connected devices range from fitness wearables that track
our movements to internet-enabled thermometers. Probably the most
IoT and Big Data analytics prominent IoT consumer product is the home assistant, such as Amazon Alexa
Imagine a scenario where people at a theme park are encouraged to download or Google Home.
an app that offers information about the park. At the same time, the app sends
GPS signals back to the park’s management to help predict wait times in lines. IoT security and vulnerabilities
With that information, the park can take action in the short term (by adding IoT devices have earned a bad reputation when it comes to security. PCs and
more staff to increase the capacity of some attractions, for instance) and the smartphones are “general use” computers designed to last for years, with
long term (by learning which rides are the most and least popular at the park). complex, user-friendly OSes that now have automated patching and security
features built in.
The theme park example is small potatoes compared to many real-world IoT
data-harvesting operations. Many big data operations use information IoT devices, by contrast, are often basic gadgets with stripped-down OSes.
harvested from IoT devices, correlated with other data points, to get insight They are designed for individual tasks and minimal human interaction, and
into human behavior. cannot be patched, monitored or updated. Because many IoT devices are
ultimately running a version of Linux under the hood with various network
For example, X-Mode released a map based on tracking location data of ports available, they make tempting targets for hackers.
people who partied at spring break in Ft. Lauderdale in March of 2020, even
as the coronavirus pandemic was gaining speed in the United States, showing Perhaps nothing demonstrated this more than the Mirai botnet, which was
where all those people ended up across the country. The map was shocking created by a teenager telnetting into home security cameras and baby monitors
not only because it showed the potential spread of the virus, but also because that had easy-to-guess default passwords, and which ended up launching one
it illustrated just how closely IoT devices can track us. (For more on IoT and of history’s largest DDoS attacks.
analytics, click here.)
While this situation is improving somewhat, the truth is that IoT transactions
IoT and AI are by and large still not secure. Enterprise IoT customers can work to
The volume of data IoT devices can gather is far larger than any human can improve their IoT security, but vendors need to make IoT devices more secure
deal with in a useful way, and certainly not in real time. We’ve already seen and easier to keep secure if they’re going to be in the field for any length of
that edge computing devices are needed just to make sense of the raw data time. (Related story: 7 steps to enhance IoT security)
coming in from the IoT endpoints. There’s also the need to detect and deal
with data that might be just plain wrong. Companies continue to expand on their security options for IoT devices. For
example, Microsoft recently announced its Edge Secured-core program for
Many IoT providers are offering machine learning and artificial intelligence Windows-based IoT devices. The program aims to address issues such as
capabilities to make sense of the collected data. IBM’s Watson platform, for device identity, secure boot, operating system hardening, device updates, data
instance, can be trained on IoT data sets to produce useful results in the field protection, and vulnerability disclosures.
of predictive maintenance — analyzing data from drones to distinguish
between trivial damage to a bridge and cracks that need attention, for instance. Privacy and IoT
Meanwhile, Arm has announced low-power chips that can provide AI No one wants a hacker snooping on private data. But what if it’s the company
capabilities on the IoT endpoints themselves. The company also launched new that sold the gadget that’s doing the spying? Take, for instance, home digital
IoT processors, such as the Cortex-M85 and Corstone-1000 that supports AI assistants. Recode has a pretty good breakdown on what Amazon and Google
at the edge. can learn about a person from connected devices. You’re probably not that
worried about Amazon learning when you turn your lights on and off, but
remember, every bit of information goes into a data lake that can help The Ribbon
companies produce a surprisingly complete picture of your life. The Ribbon contains all of the commands you will need to perform common
tasks in PowerPoint. It has multiple tabs, each with several groups of
The ability of IoT devices to track a user’s location is a particular privacy commands.
concern. Consider the map of spring breakers potentially carrying coronavirus
home, for instance. Location data is in theory anonymized, but The New York Tell Me
Times put together an extensive report showing how, for instance, the data The Tell me box works like a search bar to help you quickly find tools or
could be used to track the movements of individuals who could later be commands you want to use.
identified by name. Another incident crossed the line into a failure in
operational security: the Strava heat map, which shows popular running routes Microsoft Account
for Fitbit users around the world, accidentally revealed several secret From here, you can access your Microsoft account information, view your
American military bases. profile, and switch accounts.
One important milestone was widespread adoption of RFID tags, cheap Slide Number Indicator
minimalist transponders that can stick to any object to connect it to the larger Here, you can quickly see the total number of slides in your presentation, as
internet world. Omnipresent Wi-Fi, 4G and 5G wireless networks make it well as which slide you are viewing.
possible for designers to simply assume wireless connectivity anywhere. And
the rollout of IPv6 means that connecting billions of gadgets to the internet Notes
won’t exhaust the store of IP addresses, which was a real concern. (Related Click Notes to add notes to your current slide. Often called speaker notes, they
story: Can IoT networking drive adoption of IPv6?) can help you deliver or prepare for your presentation.
For example, when you click Save As, you can select either OneDrive or This
PC as the save location.
Lesson 3