Nme Unit III
Nme Unit III
KARUR-3
SUBJECT: FUNDAMENTALS OF
INTERNET
Prepared By,
Mrs. P. MANJULA. M.Sc(IT).,
Assistant Professor
PG & Research Department of Computer Science and Applications
FUNDAMENTALS OF INTERNET
Before moving further first of all we will understand how to connect our computer to the
internet. So to establish the connection follow the following steps:
Step 1: Install the hardware, such as a modem and an Ethernet cable, as well as the important
software like LAN driver, etc.
Step 2: Use an ethernet cable or a wireless link to establish a preliminary connection.
Step 3: Navigate to the router’s default IP address.
Step 4: Use the login name and password provided by the ISP to connect to the internet.
Step 5: Save your preferences.
Internet services
To access/exchange a large amount of data such as software, audio clips, video clips, text files,
other documents, etc., we need internet services. You must use an Internet service to connect to
the Internet. Data can be sent from Internet servers to your machine via Internet service. Some of
the commonly used internet services are :
Communication Services
Information Retrieval Services
File Transfer
World Wide Web Services
Web Services
Directory Services
Automatic Network Address Configuration
Network Management Services
Time Services
Usenet
NewsGroup
Ecommerce
Now let us discuss them one by one
1. Communication Services: To exchange data/information among individuals or organizations,
we need communication services. Following are some of the common communication services:
IRC(Internet Relay Chat): Subscribers can communicate in real-time by connecting
numerous computers in public spaces called channels.
VoIP: It stands for Voice over Internet Protocol, which describes how to make and receive
phone calls over the internet. A larger number of people believe VoIP is a viable alternative
to traditional landlines. VoIP (Voice over Internet Protocol) is a technique that helps us make
voice calls via the Internet rather than over a traditional (or analog) phone line. Some VoIP
services may let you call only other VoIP users, while others may let you call anyone with a
phone number, including long-distance, mobile, and local/international lines. If you have an
internet connection you can easily call anyone without using a local phone service because
VoIP solutions are based on open standards, they can be used on any computer. More than
just setting up calls is what VoIP service providers do. Outgoing and incoming calls are
routed through existing telephone networks by them.
List Server (LISTSERV): Delivers a group of email recipients’ content-specific emails.
E-Mail: Used to send electronic mail via the internet. It is a paperless method for sending
text, images, documents, videos, etc from one person to another via the internet.
User Network (USENET): It hosts newsgroups and message boards on certain topics, and it
is mostly run by volunteers.
Telnet: It’s used to connect to a remote computer that’s connected to the internet.
Video Conferencing: Video conferencing systems allow two or more people who are
generally in different locations to connect live and visually. Live video conferencing services
are necessary for simulating face-to-face talks over the internet. The system can vary from
very simple to complex, depending on the live video conferencing vendors. A live video-
based conference involves two or more individuals in separate locations utilizing video-
enabled devices and streaming voice, video, text, and presentations in real-time via the
internet. It allows numerous people to connect and collaborate face to face over large
distances. Tools available for this purpose are Zoom, FreeConference, Google Hangouts,
Skype, etc.
2. Information Retrieval Services: It is the procedure for gaining access to information/data
stored on the Internet. Net surfing or browsing is the process of discovering and obtaining
information from the Internet. When your computer is linked to the Internet, you may begin
retrieving data. To get data, we need a piece of software called a Web browser. A print or
computer-based information retrieval system searches for and locates data in a file, database, or
other collection of data. Some sites are:
www.geeksforgeeks.org: Free tutorials, millions of articles, live, online, and classroom
courses, frequent coding competitions, industry expert webinars, internships, and job
possibilities are all available. A computer-based system for searching and locating data in a
file, database, or another source.
www.crayola.com: It includes advice for students, parents, and educators on how to be more
creative.
3. File Transfer: The exchange of data files across computer systems is referred to as file
transfer. Using the network or internet connection to transfer or shift a file from one computer to
another is known as file transfer. To share, transfer, or send a file or logical data item across
several users and/or machines, both locally and remotely, we use file transfer. Data files include
– documents, multimedia, pictures, text, and PDFs and they can be shared by uploading or
downloading them. To retrieve information from the internet, there are various services available
such as:
Gopher: A file retrieval application based on hierarchical, distributed menus that is simple to
use.
FTP (File Transfer Protocol): To share, transfer, or send a file or logical data item across
several users and/or machines, both locally and remotely.
Archie: A file and directory information retrieval system that may be linked to FTP
4. Web services: Web services are software that uses defined messaging protocols and are made
accessible for usage by a client or other web-based programs through an application service
provider’s web server. Web services allow information to be exchanged across web-based
applications. Using Utility Computing, web services can be provided.
5. World Wide Web: The internet is a vast network of interconnected computers. Using this
network, you can connect to the world wide web (abbreviated as ‘www’ or ‘web’) is a collection
of web pages. The web browser lets you access the web via the internet.
6. Directory Services: A directory service is a set of software that keeps track of information
about your company, customers, or both. Network resource names are mapped to network
addresses by directory services. A directory service provides users and administrators with full
transparent access to printers, servers, and other network devices. The directory services are :
DNS (Domain Number System): This server provides DNS. The mappings of computer
hostnames and other types of domain names to IP addresses are stored on a DNS server.
LDAP (Lightweight Directory Access Protocol): It is a set of open protocols that are used
for obtaining network access to stored data centrally. It is a cross-platform authentication
protocol for directory services and also allows users to interact with other directory services
servers.
7. Automatic Network Address Configuration: Automatic Network Addressing assigns a
unique IP address to every system in a network. A DHCP Server is a network server that is used
to assign IP addresses, gateways, and other network information to client devices. It uses
Dynamic Host Configuration Protocol as a common protocol to reply to broadcast inquiries from
clients.
8. Network Management Services: Network management services are another essential internet
service that is beneficial to network administrators. Network management services aid in the
prevention, analysis, diagnosis, and resolution of connection problems. The two commands
related to this are:
ping: The ping command is a Command Prompt command that is used to see if a source can
communicate with a specific destination & get all the possible paths between them.
traceroute: To find the path between two connections, use the traceroute command.
9. Time Services: Using facilities included in the operating system, you may set your computer
clock via the Internet. Some services are :
Network Time Protocol (NTP): It is a widely used internet time service that allows you to
accurately synchronize and adjust your computer clock.
The Simple Network Time Protocol (SNTP): It is a time-keeping protocol that is used to
synchronize network hardware. When a full implementation of NTP is not required, then this
simplified form of NTP is typically utilized.
10. Usenet: The ‘User’s Network’ is also known as Usenet. It is a network of online discussion
groups. It’s one of the first networks where users may upload files to news servers and others can
view them.
11. News Group: It is a lively Online Discussion Forum that is easily accessible via Usenet.
Each newsgroup contains conversations on a certain topic, as indicated by the newsgroup name.
Users can use newsreader software to browse and follow the newsgroup as well as comment on
the posts. A newsgroup is a debate about a certain topic made up of notes posted to a central
Internet site and distributed over Usenet, a global network of news discussion groups. It uses
Network News Transfer Protocol (NNTP).
12. E-commerce: Electronic commerce, also known as e-commerce or e-Commerce, is a
business concept that allows businesses and individuals to buy and sell goods through
the internet.
The Internet completely revolutionised communication and technology across the Globe.
Initially, computerised devices were only used for large industries but later its usage increased
massively.
It is also mandatory for people to know that it is not possible for a single person to develop
something as broad and wide as the Internet all by himself/herself. It was a combined effort of
multiple researchers and programmers that the Internet was discovered.
Given below are a few important points which played an extremely important role in the
development of the Internet and making it one of the most widely used resources across the
world.
The first development was the introduction of host-to-host network interactions. This was
first observed in ARPANET in 1969. It was developed by Advanced Research Projects
Agency (APRA) of the Department of Defence, U.S. It was one of the first general usage
of computer networks.
Next step was commercialising the usage and making the transistors and transmitters fit
in smaller devices for convenient Internet usage for the general public. This was
introduced in the 1970s
Moving forward, satellites and wireless communication was the main target. Defence
Advanced Research Projects Agency (formerly ARPA), supported satellite-based radio
packets for mobile usage of networks
The next was the development of Transmission Control Protocol (TCP). This enabled
different machines and networks across the world to assemble data packets. It was in the
1980s that the TCP/IP approach was adapted by researchers and technologists, following
the footsteps of the U.S. Department of Defence
With the introduction of personal computers, the demand for commercial Internet usage
increased. This was the time when Ethernet and other Local Area Networks cam in the
foreground
In 1993, the web browser was introduced, which followed the point-and-click approach
and is now a widely used operation for Internet users
The late 1990s was the time when thousands of Internet Service Providers has taken up
the market and most of them were from the U.S.
And then the 21st century brought in an amalgamation of technology and wireless
Internet accessibility for its users. Wherein, wireless broadband services came in as a
boon for Internet users
1. SD-WAN
SD-WAN has become far more critical as businesses shut down offices, driving either a hybrid
work environment or a complete work-from-home (WFH) strategy. WFH went from temporary
to permanent for many companies, which redefined the network edge.
VPNs, which were often the point-to-point solution for remote workers, gave way to always-on
SD-WAN appliances for many tasks as the network edge extended into employees' homes. With
businesses becoming more distributed, they have accelerated their migration plans to SD-WAN
because of the improved experience and security for their WFH workforce.
2. 5G cellular
Because of the pandemic, the migration to 5G cellular changed significantly and not just because
some oddball conspiracy theories suggested 5G caused the pandemic. While carriers continued
their 5G rollouts, many businesses that planned to migrate to 5G have stuck with 4G/LTE for
now. Government programs for 5G, like smart cities, came under pressure from the pandemic's
unexpected and mounting healthcare costs.
But where 5G has gained a foothold -- and will continue to grow in 2022 and beyond -- is fixed
5G to the home. Many WFH companies are finding fixed 5G as a solution to segment work
systems from home systems and deliver internet to WFH employees who did not have previous
broadband access.
3. Wi-Fi 6
The transition to Wi-Fi 6 has been problematic for many businesses that began planning the
migration for 2020 or 2021. The shift to WFH has had a dramatic effect on commercial real
estate. Many offices are shuttered, and those that are still running often see lower employee
density.
Device density, one of the greatest benefits of Wi-Fi 6, is in less demand in the new commercial
real estate reality. Where Wi-Fi 6 is growing, and will continue to grow, is on the consumer side,
especially with WFH. The demands of home-based employees for higher bandwidth can more
easily justify the small price in moving to the new technology.
4. AI enablement
The AI enablement of networking products has been rolling along as expected. 2020 had a
concerted focus on the enablement of applications with AI, especially in the security and
analytics areas.
As the workplace splintered into WFH and hybrid environments, the security threat profile
changed dramatically. Additionally, managing productivity for remoteworkers is infinitely more
challenging, and AI can help bolster the human efforts through monitoring and analytics.
While AI can't replace humans entirely, it does a tremendous job of scaling and adapting as the
landscape underneath is shifting.
5. Network automation
Finally, network automation has had an important role because of the pandemic. As employees
moved to WFH, IT was clearly not immune to the changes. Many IT professionals became
further removed from their systems.
Additionally, many IT folks realized they were now managing far more physical devices than
ever before and relying more on automation to help compensate for the changing work profile.
As we roll into 2022, automation will continue to grow as it has proved its value through these
trying times.
2020 and 2021 have brought new dynamics to the field of networking but not necessarily new
ideas. Instead of radical, breakthrough products, most companies were positioning their IT
budgets to handle radical, breakthrough processes. It was not as much about new technologies
and far more about new ways to do things.
As we step into 2022, the ingenuity of IT will continue to be challenged as many of the changes
expected to be temporary have become the new normal. We should expect today's changes to
have a lasting effect on networking for years.
Next Generation Network (NGN) refers to a packet-based network and it can be used for both
telecommunication services as well as data and it supports mobility. It is able to make use of
multiple broadband capabilities, especially Quality of Services (QoS) enabled transport
technologies where the service-related functions are independent of the underlying transport-
related technologies.
The main goal of Next Generation Network (NGN) is to serve/work as an replacement of Public
Switched Telephone Network (PSTN) and Integrated Services Digital Network (ISDN).
Nowadays there exist different networks for different purposes like voice, data, and all sorts of
video. The telephony, Internet, and cellular networks refer to different domains and each has its
own protocol and services. The idea behind the Next Generation Network (NGN) is that one
network which transports all type of data and provides services in the form of packets similar to
those which is used on Internet. Commonly NGNs are built around Internet Protocol (IP). That’s
why sometimes NGN is referred to as an all-IP network to describe the transformation towards
Next Generation Network (NGN).
International Telecommunication Union Telecommunication Standardization Sector (ITU-T)
defines Next Generation Network (NGN) is a packet based network which provides
telecommunication services to users and it uses multiple broadbands, QoS enabled transport
technologies. NGN is a generalized mobility approach and it allows consistent and all over-
provision of services to users.
Fundamental characteristics for defining NGN :
Packet based transfer.
Separation of control functions for bearer capabilities, call/session – service.
Decoupling of service and network, and provision of open interfaces (I/F).
A wide range of services like (Real Time(RT)/ streaming/ non Real Time (RT)/ multimedia).
Interworking with legacy networks via open I/F.
Support of Generalized mobility.
Support to unrestricted access by users to different service providers.
Services supported in NGN :
Data communication services.
Multimedia Services.
Public interest services.
Public Switched Telephone Network (PSTN)/Integrated Services Digital Network (ISDN)
simulation services.
Public Switched Telephone Network (PSTN)/ Integrated Services Digital Network (ISDN)
emulation services
Next Generation Network Layer :
In Access Layer, different types of media gateways that support connection to and from
access network with the core network are included.
Core network layer is network handling converged services based on Internet Protocol (IP).
Control layer works as call server. It provides call control functions also provides control of a
media gateway.
Service layer is an IT platform that creates a service creation environment extending its
functionality in order to cover new network scenarios as an intelligent network.
The below figure illustrates Next Generation Network (NGN) Layers as
follows.
This basic reference model separated Transport layer (Access and Core) from Service layer. In
short Access Layer elements handles different media gateways. Core Layer handles networks
based on IP. Control Layer handles call control functions and control of media gateways. Service
Layer is an IT platform that plays role of an Intelligent Network Service Creation Environment.
UNIT-II
GETTING ONLINE
Types of Internet Accounts
With an Internet account, you get the right to use the provider's Internet service,
your very own email address (so you can send and receive email), and all the other information
you need to set up your computer for accessing the Internet through the service.
Dial-Up Accounts
Most Internet accounts are called "dial-up" accounts because you use them by "dialing up" the
Internet provider through your modem and telephone line. These are sometimes also described as
"IP" accounts because they require your computer to communicate through TCP/IP
An account with an online service such as America Online is also a "dial-up" account, but it's not
the same thing as a regular Internet PPP or SLIP account. An online service account requires a
different kind of communications software (supplied by the service) for accessing the service and
its non-Internet content.
When you access the Internet through an online service, the service may temporarily switch you
over to a PPP account, or it may funnel you to the Internet using a different communications
scenario.
This is why online services often limit you to one or two different Web browsers and other
clients, instead of letting you choose the one you want. Any client software used through the
service must be specially configured for the service's unique communications system.
Email-Only Accounts
With an email-only account, you get full access to Internet email, and nothing else—no Web, no
newsgroups, no chat, no shoes, no shirt, no service. You will have access to mailing lists,
however, which enable you to get through email much of the same discussion content you'd see
in newsgroups.
Email accounts can be run from the lowliest of computers and cost next to nothing. In fact, a few
companies now offer you an email account free of charge, in exchange for the right to send you
targeted advertisements.
ISPs may also provide other services, including email services, domain registration, web
hosting, and browser packages. An ISP may also be referred to as an information service
provider, a storage service provider, an internet network service provider (INSP), or any
combination of these three based on the services offered by the company.
An internet service provider (ISP) is a company that provides web access to businesses
and consumers.
ISPs may also provide other services such as email services, domain registration, web
hosting, and browser services.
An ISP is considered to be an information service provider, storage service provider,
internet network service provider (INSP), or a mix of all of them.
Internet use has evolved from only those with university or government accounts having
access to nearly everyone having access, whether it’s paid or free.
Access has gone from dial-up connections to high-speed broadband technology.
AT&T Internet: Best Overall
T-Mobile Home Internet: Best Mobile Internet
Cox Communications: Best Company for Bundles
CenturyLink: Best No Contract
Comcast Xfinity: Best Customer Reviews
Verizon Fios
Google Fiber
HughesNet
What is email?
Electronic mail, commonly shortened to “email,” is a communication method that uses electronic
devices to deliver messages across computer networks. "Email" refers to both the delivery
system and individual messages that are sent and received.
Email has existed in some form since the 1970s, when programmer Ray Tomlinson created a
way to transmit messages between computer systems on the Advanced Research Projects
Agency Network (ARPANET). Modern forms of email became available for widespread public
use with the development of email client software (e.g. Outlook) and web browsers, the latter of
which enables users to send and receive messages over the Internet using web-based email
clients (e.g. Gmail).
Advantages of email
Three basic types of email protocols involved for sending and receiving mails are:
SMTP
POP3
IMAP
SMTP (Simple Mail Transfer Protocol):
Simple Mail Transfer Protocol is used to send mails over the internet. SMTP is an application
layer and connection-oriented protocol. SMTP is efficient and reliable for sending emails.
SMTP uses TCP as the transport layer protocol. It handles the sending and receiving of
messages between email servers over a TCP/IP network. This protocol along with sending
emails also provides the feature of notification for incoming mails. When a sender sends an
email then the sender’s mail client sends it to the sender’s mail server and then it is sent to the
receiver mail server through SMTP. SMTP commands are used to identify the sender and
receiver email addresses along with the message to be sent.
Some of the SMTP commands are HELLO, MAIL FROM, RCPT TO, DATA, QUIT,
VERIFY, SIZE, etc. SMTP sends an error message if the mail is not delivered to the receiver
hence, reliable protocol.
Post Office Protocol is used to retrieve email for a single client. POP3 version is the current
version of POP used. It is an application layer protocol. It allows to access mail offline and
thus, needs less internet time. To access the message it has to be downloaded. POP allows only
a single mailbox to be created on the mail server. POP does not allow search facilities
Some of the POP commands are LOG IN, STAT, LIST, RETR, DELE, RSET, and QUIT.
Internet Message Access Protocol is used to retrieve mails for multiple clients. There are
several IMAP versions: IMAP, IMAP2, IMAP3, IMAP4, etc. IMAP is an application layer
protocol. IMAP allows to access email without downloading them and also supports email
download. The emails are maintained by the remote server. It enables all email operations such
as creating, manipulating, delete the email without reading it. IMAP allows you to search
emails. It allows multiple mailboxes to be created on multiple mail servers and allows
concurrent access. Some of the IMAP commands are: IMAP_LOGIN, CREATE, DELETE,
RENAME, SELECT, EXAMINE, and LOGOUT.
System Architecture:
From the user’s point of view, the web consists of a vast, worldwide connection of documents or
web pages. Each page may contain links to other pages anywhere in the world. The pages can be
retrieved and viewed by using browsers of which internet explorer, Netscape Navigator, Google
Chrome, etc are the popular ones. The browser fetches the page requested interprets the text and
formatting commands on it, and displays the page, properly formatted, on the screen.
The basic model of how the web works are shown in the figure below. Here the browser is
displaying a web page on the client machine. When the user clicks on a line of text that is linked
to a page on the abd.com server, the browser follows the hyperlink by sending a message to the
abd.com server asking it for the page.
Here the browser displays a web page on the client machine when the user clicks on a line of text
that is linked to a page on abd.com, the browser follows the hyperlink by sending a message to
the abd.com server asking for the page.
Working of WWW:
The World Wide Web is based on several different technologies: Web browsers, Hypertext
Markup Language (HTML) and Hypertext Transfer Protocol (HTTP).
A Web browser is used to access web pages. Web browsers can be defined as programs which
display text, data, pictures, animation and video on the Internet. Hyperlinked resources on the
World Wide Web can be accessed using software interfaces provided by Web browsers. Initially,
Web browsers were used only for surfing the Web but now they have become more universal.
Web browsers can be used for several tasks including conducting searches, mailing, transferring
files, and much more. Some of the commonly used browsers are Internet Explorer, Opera Mini,
and Google Chrome.
Features of WWW:
HyperText Information System
Cross-Platform
Distributed
Open Standards and Open Source
Uses Web Browsers to provide a single interface for many services
Dynamic, Interactive and Evolving.
“Web 2.0”
1. Uniform Resource Locator (URL): serves as a system for resources on the web.
2. HyperText Transfer Protocol (HTTP): specifies communication of browser and server.
3. Hyper Text Markup Language (HTML): defines the structure, organisation and content of
a webpage.
Types of websites
A website is a collection of interlinked web pages with a common domain name. The website
can be made by any individual, group, or company. All the websites together constitute the
world wide web. The website can be of several types, like an e-commerce website, social
media website, or a blog website, and every website has a different role, but one thing is
common that every website has several linked web pages.
Personal Website
These websites are used for sharing your personal information. Also, you can share your
philosophical thoughts and showcase your work. Many people use personal websites to brand
themselves.
Photo Sharing Website
This type of website enables you to store your photographs online and share them with your
family and friends. Here you can upload as much as you want, also manage it as well as share
it (private or public).
Blog
A blog is a website where people share information, ideas, and views. It is a place where you
can express your vision and your thoughts to the world. Earlier, blogs were used as a journal,
but now they are becoming one of the important mass communication tools where people get
to know about new things. WordPress and Google blogger are famous blogging sites where
you can write articles. Blogs include a travel blog, news blog, cooking blog,
Informational website
The term itself gives us the idea. This website provides information on various topics. We very
often get confused about many things and searching for them in a book is very time-taking.
These websites save our lives, as we get information about everything. For example, Wikipedia
is an information website where you can get information about everything related to history,
geography, science and technology, cinema, famous people,
E-commerce website
This website is a place for online shopping where a person can buy or sell a product. Amazon,
Flipkart, and Olx are some of the examples of an E-commerce website. E-commerce has a lot
of potentials to grow as nowadays, people tend to shop online because of their hectic life.
Social Media website
This is the most popular website where people can connect with each other. Social media
websites enable the user to share their personal information, pictures, video ideas, and opinion
in real-time. Facebook, Instagram, and Twitter are some examples of social media websites.
Educational Websites
Education websites include websites of colleges and schools and tuitions. The new normal has
changed the structure of educational institutions. Nowadays, people are learning through online
classes and the demands of educational websites also grow. As people want to learn more than
their college and schools. So there are platforms like Coursera, GeeksforGeeks where people
are learning more than their college and school.
Portfolio Websites
These websites are used to showcase your best work to a professional. It is a
more personal website where creative people add their creativity to showcase their industry. A
portfolio website is a majorly creative one. For example, I am a writer and I want a job in
digital content writing. Then I can make a portfolio website where I can showcase my different
type of writing style on the website.
Non-Profit Websites
We all know marketing is the essence of the business and, more importantly, it is a
public presence. Likewise, non-profit organizations to need attention from the public and thus,
websites come into the picture. These days, every NGO has its own website. They use them to
inform their audience, raising funds, and also informing about themselves what they are doing.
For example, GateFoundation.org is a non-profit website.
Magazine and News Websites
Many people got confused with a blog website and news websites. Basically, a
news website focused on journalism rather than personal interests. These days every media
house has a digital presence on the internet. News and magazine websites monetize through
advertisement and subscription models. For example, The Times of India have their own
website called timesofindia.indiatimes.com where you can read news online.
This article discusses Uniform Resource Locators (URLs), explaining what they are and how
they're structured.
Prerequisites You need to first know how the Internet works, what a Web server is and the
: concepts behind links on the web.
Objective: You will learn what a URL is and how it works on the Web.
URL stands for Uniform Resource Locator. A URL is nothing more than the
address of a given unique resource on the Web. In theory, each valid URL points to a unique
resource. Such resources can be an HTML page, a CSS document, an image, etc. In practice,
there are some exceptions, the most common being a URL pointing to a resource that no longer
exists or that has moved. As the resource represented by the URL and the URL itself are handled
by the Web server, it is up to the owner of the web server to carefully manage that resource and
its associated URL.
An application layer protocol defines how the application processes running on different
systems, pass the messages to each other.
DNS is a TCP/IP protocol used on different platforms. The domain name space is divided into
three different sections: generic domains, country domains, and inverse domain.
Generic Domains
Label Description
Country Domain
The format of country domain is same as a generic domain, but it uses two-character country
abbreviations (e.g., us for the United States) in place of three character organizational
abbreviations.
Inverse Domain
The inverse domain is used for mapping an address to a name. When the server has received a
request from the client, and the server contains the files of only authorized clients. To determine
whether the client is on the authorized list or not, it sends a query to the DNS server and ask for
mapping an address to the name.
Working of DNS
text
color
graphic
animation
video
sound
hyperlinks
2. Hyperlinks :
It refers to a link from a hypertext file to another such file. A hyperlink can be in the
form of a graphic or text, upon clicking where the linked document opens up.
Structure Wise :
Structure wise the components of a web page are :
1. Page Title –
This is a single line text which is displayed on the title bar of the browser displaying web
page.
2. Header –
This is generally a one or two line text (sometimes a graphics/image) defining the purpose
of the web page. It is displayed at the top of the web page, below the address bar of the
browser.
3. Body of the Web page –
This is the section below the header of the web page and it contains the actual content of
the web page.
4. Navigational Links –
These are the hyperlinks placed on the web page using which you can move the linked web
pages/documents.
5. Footer –
This is the bottom section of the web page. This is the section where usually the copyright
notice, website contact information, etc. is put.
UNIT-III
HOSTING AND PROMOTING WEBSITES
STRUCTURE OF WEBSITES
What is Website Structure?
Your site’s structure is how the different pages on your site are linked with each
other using internal links and their hierarchy. It is how the information on your site is organized
and presented so that the algorithm can read its context well. Good website structure facilitates
easy navigation for both users and crawlers which improves the SEO ranking of your website in
search engines.
The role of a designer is to create a website that has a great UX that takes care of
accessibility and is easy to use. A great website structure improves the usability or user-
friendliness of your website by making it easy for users to find what they are looking for. To
create a website structure, you need to map out how you will organize the content on your site
(homepage, categories, individual page, blog posts).
There are different types of web structure that you may use in UX design. They are hierarchical,
sequential, matrix, and database model. What are they about?
History[edit]
FrontPage was initially created by Cambridge, Massachusetts company Vermeer Technologies,
Incorporated,[2] evidence of which can be easily spotted in file names and directories
prefixed _vti_ in web sites created using FrontPage. Vermeer was acquired by Microsoft in
January 1996 specifically so that Microsoft could add FrontPage to its product line-up,
[3]
allowing them to gain an advantage in the browser wars, as FrontPage was designed to create
web pages for their own browser, Internet Explorer.[4]
As a "WYSIWYG" (What You See Is What You Get) editor, FrontPage is designed to hide the
details of pages' HTML code from the user, making it possible for novices to create web
pages and web sites easily.
FrontPage's initial outing under the Microsoft name came in 1996 with the release of Windows
NT 4.0 Server and its constituent Web server Internet Information Services 2.0. Bundled on CD
with the NT 4.0 Server release, FrontPage 1.1 would run under NT 4.0 (Server or Workstation)
or Windows 95. Up to FrontPage 98, the FrontPage Editor, which was used for designing pages,
was a separate application from the FrontPage Explorer which was used to manage web site
folders.[5] With FrontPage 2000, both programs were merged into the Editor.
FrontPage used to require a set of server-side plugins originally known as IIS Extensions. The
extension set was significantly enhanced for Microsoft inclusion of FrontPage into the Microsoft
Office line-up with Office 97 and subsequently renamed FrontPage Server Extensions (FPSE).
Both sets of extensions needed to be installed on the target web server for its content and
publishing features to work. Microsoft offered both Windows and Unix-based versions of FPSE.
FrontPage 2000 Server Extensions worked with earlier versions of FrontPage as well. FPSE
2002 was the last released version which also works with FrontPage 2003 and was later updated
for IIS 6.0 as well. However, with FrontPage 2003, Microsoft began moving away from
proprietary Server Extensions to standard protocols like FTP and WebDAV for remote web
publishing and authoring.[6] FrontPage 2003 can also be used with Windows SharePoint Services.
A version for the classic Mac OS was released in 1998; however, it had fewer features than the
Windows product and Microsoft has never updated it.[7]
In 2006, Microsoft announced that FrontPage would eventually be superseded by two products.
[8]
Microsoft SharePoint Designer would allow business professionals to design SharePoint-based
applications. Microsoft Expression Web is targeted at the web design professional for the
creation of feature-rich web sites. Microsoft discontinued Microsoft FrontPage in December
2006. Functional equivalent would be found in Microsoft Expression Web.
Features[edit]
Some of the features in the last version of FrontPage include:
FrontPage 2003 consists of a Split View option to allow the user to code in Code View and
preview in Design View without the hassle of switching from the Design and Code View
tabs for each review.
Dynamic Web Templates (DWT) were included for the first time in FrontPage 2003,
allowing users to create a single template that could be used across multiple pages and even
the whole Web site.
Interactive Buttons give users a new easy way to create Web graphics for navigation and
links, eliminating the need for a complicated image-editing package such as Adobe
Photoshop which Microsoft does not sell.
The accessibility checker gives the user the ability to check if their code is standards-
compliant and that their Web site is easily accessible for people with disabilities. An HTML
optimizer is included to aid in optimizing code to make it legible and quicker to process.
Intellisense, which is a form of autocompletion, is a key feature in FrontPage 2003 that
assists the user while typing in Code View. When working in Code View, Intellisense will
suggest tags and/or properties for the code that the user is entering which was intended to
significantly reduce the time to write code. The Quick Tag Editor shows the user the tag they
are currently in when editing in Design View. This also includes the option to edit the
specific tag/property from within the Tag Editor.
Code Snippets give users the advantage of creating snippets of their commonly used pieces
of code, allowing them to store it for easy access whenever it is next needed.
FrontPage 2003 includes support for programming in ASP.NET a server-side scripting
language that adds interactivity to Web sites and Web pages.
FrontPage 2003 includes support for macros in VBA.
Versions[edit]
ADOBE DREAMWEAVER
Adobe Dreamweaver is a proprietary web development tool from Adobe Inc. It was
created by Macromedia in 1997[1] and developed by them until Macromedia was acquired by
Adobe Systems in 2005.[3]
Adobe Dreamweaver is available for the macOS and Windows operating systems.
Following Adobe's acquisition of the Macromedia product suite, releases of Dreamweaver
subsequent to version 8.0 have been more compliant with W3C standards. Recent versions have
improved support for Web technologies such as CSS, JavaScript, and various server-side
scripting languages and frameworks including ASP (ASP JavaScript, ASP VBScript, ASP.NET
C#, ASP.NET VB), ColdFusion, Scriptlet, and PHP.[4]
Features[edit]
Adobe Dreamweaver CC is a web design Integrated Development Environment (IDE) that is
used to develop and design websites. Dreamweaver includes a code editor that supports syntax
highlighting, code completion, real-time syntax checking, and code introspection for generating
code hints to assist the user in writing code.
Dreamweaver, like other HTML editors, edits files locally then uploads them to the remote web
server using FTP, SFTP, or WebDAV. Dreamweaver CS4 supports the Subversion
(SVN) version control system.
Since version 5, Dreamweaver supports syntax highlighting for the following languages:
ActionScript
Active Server Pages (ASP).
C#
Cascading Style Sheets (CSS)
ColdFusion
EDML
Extensible HyperText Markup Language (XHTML)
Extensible Markup Language (XML)
Extensible Stylesheet Language Transformations (XSLT)
HyperText Markup Language (HTML)
Java
JavaScript
PHP
Visual Basic (VB)
Visual Basic Script Edition (VBScript)
Wireless Markup Language (WML)
Support for Active Server Pages (ASP) and JavaServer Pages was dropped in version CS5.[5][6]
Users can add their language syntax highlighting. Code completion is available for many of these
languages.
Visual Studio.NET
Visual Studio is an Integrated Development Environment(IDE) developed by Microsoft to
develop GUI(Graphical User Interface), console, Web applications, web apps, mobile apps,
cloud, and web services, etc. With the help of this IDE, you can create managed code as well
as native code. It uses the various platforms of Microsoft software development software like
Windows store, Microsoft Silverlight, and Windows API, etc. It is not a language-specific IDE
as you can use this to write code in C#, C++, VB(Visual Basic), Python, JavaScript, and many
more languages. It provides support for 36 different programming languages. It is available for
Windows as well as for macOS.
Evolution of Visual Studio:
The first version of VS(Visual Studio) was released in 1997, named as Visual Studio 97 having
version number 5.0. The latest version of Visual Studio is 15.0 which was released on March 7,
2017. It is also termed as Visual Studio 2017. The supported .Net Framework Versions in latest
Visual Studio is 3.5 to 4.7. Java was supported in old versions of Visual Studio but in the latest
version doesn’t provide any support for Java language.
Hosting websites:
Web hosting is a service that stores your website or web application and makes it easily
accessible across different devices such as desktop, mobile, and tablets. Any web application or
website is typically made of many files, such as images, videos, text, and code, that you need to
store on special computers called servers. The web hosting service provider maintains,
configures, and runs physical servers that you can rent for your files. Web site and web
application hosting services also provide additional support, such as security, website backup,
and website performance, which free up your time so that you can focus on the core functions of
your website.
Performance
A web hosting company that manages hardware resources for multiple websites has greater
purchasing power. It invests in cutting-edge technology so that you get high-performing web
servers with processing power, internal memory, and other computing resources. This improves
website performance, and your visitors can load pages quickly.
Reliability
Web hosting service providers take away the stress of ongoing server maintenance. They
perform regular system upgrades to maintain high security standards. By doing so, they free up
your IT resources so that you can focus on application delivery instead of server management.
Technical support
Most web hosting services offer comprehensive support for troubleshooting performance issues.
They also streamline website monitoring and analytics, data backup and recovery, and other
similar features that make your website run more smoothly.
Security and compliance
Web hosting services use an end-to-end approach to secure infrastructure, including physical,
operational, and software measures that meet all compliance requirements.
What are the features of web hosting?
Most web hosting companies provide different hosting packages and plans. Your monthly web
hosting cost can range from free to paid, depending on factors such as the following:
Before selecting a web hosting service, explore the different features that various services
provide. The following are the main features generally provided.
Disk space
Your website will require storage space for emails, web files, images, and databases. While you
are estimating your storage requirements, also consider future website growth and website
traffic. Low disk space impacts user experience, so it is an important factor in the selection of
a web hosting service.
In the web hosting industry, the terms bandwidth and data transfer are often used
interchangeably. However, they are two different things. Bandwidth is the amount of data that
your website can transfer to visitors at one time. Data transfer is the actual amount of data that it
transfers.
You can think of bandwidth as a pipe. The bigger the pipe, the more the water can pass through
it. However, for various reasons, you might not use the total capacity of the pipe. Data transfer is
like the actual amount of water that goes through the pipe in a given time period.
Email accounts
Many web hosting plans include an email account. You can link your email address to your
website name. For example, if your website name is example.com, your email address will
be yourname@example.com. The following are the main types of email accounts.
POP3
POP3 accounts give you server space to store your emails, which you can access directly or by
using your email client program.
Forwarding mail
Forwarding mail accounts redirect emails to another email address. This account could be a
personal email account with an email service provider or a third-party account that manages your
website emails for you.
Aliases
Some web hosts have emails plans that you can use to create several aliases or email account
names without creating a full POP3 account. For example, you might want to display sales@,
support@, and orders@ addresses on different pages of you website. Instead of having multiple
POP3 accounts that need to be checked and administered, you could redirect everything to a
single inbox.
FTP access
FTP refers to website file transfer and sharing. Many websites have documents, such as PDF
files or image files, that they want internet users to download. The web hosting company uses
FTP access to provide this service.
This section will explain how to register and transfer a domain name.
Domain registration is the process of purchasing a domain from a domain name registrar for
a specific period. On the other hand, domain name transfer refers to the process of moving a
domain from one registrar to another.
Start by opening a domain name generator. Use the following domain checker tool to check
if your desired name is still available.
To find the right domain, consider branding and cost. Make sure that it is memorable,
catchy, and fits your budget.
Popular domain names are often more expensive and might already be taken. Some
generators provide options if the domain you want is unavailable. With a hosting service
like Hostinger, users can choose a different top-level domain (TLD) with the same name or
an alternative.
If you choose to use Hostinger’s domain registration services, follow these steps:
2. Choose the registration period for your domain. The domain privacy protection is
included for free. It secures your personal information in the WHOIS database and
prevents identity theft through the WHOIS lookup tool.
After the domain registration is complete, you will have access to a control panel with all
the essential management tools.
UNIT-IV
Electronic commerce (e-commerce) refers to companies and individuals that buy and sell goods
and services over the internet. E-commerce operates in different types of market segments and
can be conducted over computers, tablets, smartphones, and other smart devices. Nearly every
imaginable product and service is available through e-commerce transactions, including books,
music, plane tickets, and financial services such as stock investing and online banking. As such,
it is considered a very disruptive technology.
Types of E-commerce
Depending on the goods, services, and organization of an ecommerce company, the business
can opt to operate several different ways. Here are several of the popular business models.
Business-to-Consumer (B2C)
B2C e-commerce companies sell directly to the product end-user. Instead of distributing goods
to an intermediary, a B2C company performs transactions with the consumer that will
ultimately use the good.
This type of business model may be used to sell products (like your local sporting goods store's
website) or services (such as a lawn care mobile app to reserve landscaping services). This is
the most common business model and is likely the concept most people think about when they
hear the term e-commerce.
Business-to-Business (B2B)
Similar to B2C, an e-commerce business can directly sell goods to a user. However, instead of
being a consumer, that user may be another company. B2B transactions often entail larger
quantities, greater specifications, and longer lead times. The company placing the order may
also have a need to set recurring goods if the purchase is for recurring manufacturing processes.
Business-to-Government (B2G)
Some entities specialize as government contractors providing goods or services to agencies or
administrations. Similar to a B2B relationship, the business produces items of value and remits
those items to an entity.
B2G e-commerce companies must often meet government requests for proposal requirements,
solicit bids for projects, and meet very specific product or service criteria. In addition, there
may be joint government endeavors to solicit a single contract through a government-wide
acquisition contract.
Consumer-to-Consumer (C2C)
Established companies are the only entities that can sell things. E-commerce platforms such as
digital marketplaces connect consumers with other consumers who can list their own products
and execute their own sales.
These C2C platforms may be auction-style listings (i.e. eBay auctions) or may warrant further
discussion regarding the item or service being provided (i.e. Craigslist postings). Enabled by
technology, C2C e-commerce platforms empower consumers to both buy and sell without the
need for companies.
Consumer-to-Business (C2B)
Modern platforms have allowed consumers to more easily engage with companies and offer
their services, especially related to short-term contracts, gigs, or freelance opportunities. For
example, consider listings on Upwork.
A consumer may solicit bids or interact with companies that need particular jobs done. In this
way, the e-commerce platform connects businesses with freelancers to enable consumers greater
power to achieve pricing, scheduling, and employment demands.
Consumer-to-Government (C2G)
Less of a traditional e-commerce relationship, consumers can interact with administrations,
agencies, or governments through C2G partnerships. These partnerships are often not in the
exchange of service but rather, the transaction of obligation.
M-Commerce
M-commerce stands for mobile commerce. The term refers to the purchasing and selling of
products and services using mobile phones and other wireless handheld devices. PDA’s
(personal digital assistants), for example, are handheld wireless devices.
Kevin Duffey coined the term ‘mobile commerce’ in 1997 at the launch of the Global Mobile
Commerce Forum. He said: “the delivery of electronic commerce capabilities directly into the
consumer’s hand, anywhere, via wireless technology. Many choose to think of Mobile
Commerce as meaning ‘a retail outlet in your customer’s pocket.’”
“Electronic commerce (e-commerce) transacted over mobile communication devices such as cell
phones or personal digital assistants (PDA).”
E-commerce and m-commerce have similar meanings and goals. However, they are not identical.
When people perform e-commerce activities using laptops or desktop computers, they need to
find a place to buy and sell things.
With m-commerce, on the other hand, people ‘buy and sell on the go.‘ In other words, they use
their mobile devices and can do their business transactions anywhere, as long as are online.
E-commerce includes any type of online commerce, i.e., using laptops, desktop computers,
tablets, and smartphones. M-commerce only includes devices we carry around with us such as
smartphones and perhaps also tablets. In other words, electronic commerce covers all mobile
commerce activities and more.
“Usually, e-commerce activities are conducted with the help of desktop computers and laptops,
so users have to look for a place to do their transactions.”
“M-commerce implies the use of mobile devices, so people can do their business transactions
anywhere they go as long as they can access the internet on their smartphones and can perform
transactions with just a few taps on the screen.”
In this post, you’ll learn what website marketing is, why it’s important to have a website
marketing strategy, and the 10 steps to follow to promote your website online successfully.
Website marketing is the process of promoting your website on the Internet. It is one of the
online marketing channels you can use as part of your overall digital marketing strategy. The
main goal of a website marketing campaign is to get more visits to your website.
As a Digital marketing manager, one of my tasks is to explain to my clients why they need a
complete website marketing strategy and how to make it work for the benefit of their
business.
A few years back, marketers thought about SEO when someone was talking about web
marketing.Later, that perception changed, and social media came into the picture; it is very
common today to associate digital marketing with social media and SEO.
As you can see from the diagram below, digital marketing has many more pillars, including
content marketing, PPC marketing, email marketing, and more. Social media and SEO are
only part of the equation.
Digital Marketing
A well-planned digital marketing strategy will help you utilize all available channels for
promoting your business online.
If you don’t write down your web marketing strategy that includes what you want to achieve
online and how to do it, it’s like driving with your eyes closed.
By preparing a strategy together with a plan, you will know exactly which tools to use, how
to use them, and what to expect as realistic results from each tool.
In addition, a plan makes it easier to communicate your goals within your business so that all
departments are aligned with your strategy.
Sooner or later, every business will get into the digital marketing game, and things will
become even more challenging. To get ahead of the game, you should take your online
promotion more seriously, and the best place to start is by creating a web marketing strategy.
1. Perform a website design review
Your website is the same as your shop window. It should look good on the outside, and when
customers enter your shop, everything should be organized and in place.
Before starting any campaigns, take some time and review your website and make sure that:
It has a simple hierarchical site structure – A good site structure helps users and search
engines navigate a website to find the information they need quickly. As a rule of thumb, any
page on your site should be accessible from the homepage in 3 clicks or less.
It’s user-friendly and functional – Evaluate your website’s friendliness using the principles
of SEO-friendly web design and try to remove design elements that add complexity or are
not needed.
It has accurate information about your company and products – Make sure that it
provides users with everything they need to know about your company and products. Make
use of visual elements to get the attention of your users.
It’s fast and mobile-friendly – The majority of your users will come from mobile devices,
so test your website on mobile and optimize the experience of the user in the best way
possible
The next step is to start thinking about your SEO strategy. A well-defined SEO plan will
eventually increase your rankings and traffic from search engines.
SEO is the process of increasing your website’s visibility in search engines, and it consists
of several steps:
Technical SEO – Making sure that your website is free of crawl errors and other issues that
might keep search engines from indexing your website properly.
On-Page SEO – Make your webpages SEO-friendly and your content easily read by search
engine crawlers.
Off-Page SEO – Promoting your website to get high-quality links from other websites.
Local SEO – Optimizing your website for location-aware searches and for getting more
clients to your brick-and-mortar store.
Besides the above standard SEO practices, you should also optimize your website for modern
SEO, like adding schema markup and optimizing your content for rich snippets .
Many webmasters skip this step, and it’s a mistake that can negatively affect your social
media promotion efforts.
While it looks like it’s more technical and not marketing-related, it does play an important
role. If your website does not allow users to share your content properly, don’t expect any
social
media exposure.
When you promote a website online, you essentially promote your website’s content, which
is why it is referred to as content marketing.
The main purpose of content marketing is to help you create the right type of content to
attract new users to your website and keep them engaged.
Do your keyword research and determine which SEO keywords to target with your
content.
Perform competitor analysis and find out what is working for your competitors.
Analyze Google search results to determine what type of content Google wants for
your target keywords (length of content, images/video, etc.).
Once you have a list of topics/keywords, you should create a content marketing calendar to
specify when each piece of content will be published, who will write it, and how it will be
promoted after publication.
Companies that manage to have an ongoing content marketing campaign have more chances
of succeeding online than companies that publish content occasionally without a plan.
Now that you have a constant flow of generated content, the next step is to start promoting
your website on different social networks.
Your first action is creating business pages in the social networks relevant to your business.
These are the networks that your potential customers might be using. The most common
suspects are Facebook, Twitter, Instagram, Pinterest, and LinkedIn.
Then, add links to your social pages on your website (in the footer) and also add the relevant
schema (this will help search engines associate your website and the business pages
together).
Having a business page with no followers does not benefit your business.
You need to spend some time to find and connect with people that might be interested in
your business and also influencers in your niche.
Social media success is based on the quality of your postings. You need to fetch your social
media networks high-quality content regularly. That’s the best way to get the attention of
users and create an audience for your brand.
A good way to start is to create a social media calendar (the same way you did with step 4
above) and specify what type of content to publish and when.
6. Use Paid Ads to reach more customers
PPC Marketing
As soon as you get started with SEO and social media marketing, you’ll realize one thing. It
takes time for SEO to work and to get a decent number of followers on social media
organically.
This means that if you want results faster, you need to add one more ingredient to your
website marketing and that is paid advertising.
With paid advertising, you can get targeted traffic fast and start making sales or conversions.
There are various advertising platforms you can use, but the most common are:
Google Ads – Target people based on the search terms they use on Google or show your ads
on other Google properties (YouTube, Gmail) and websites that participate in Google
AdSense.
Facebook Paid Ads – Promote your Facebook page, social media postings, or ads to people
using Facebook, Instagram, or Facebook Messenger.
Both methods are very effective but you should be careful not to waste a lot of money on
advertising without a return. Better start with a low budget and measure the effectiveness of
your campaigns and add more money as long as there is a positive ROI.
7. Utilize email marketing to engage with your audience
One of the most effective sales channels is email. In fact, one of the goals of your website
marketing campaign should be to grow your email list.
Having an active email list is a great way to get people back to your website, let them know
of new content, or directly sell them a product. Make no mistake; email is not yet dead.
To make the most of your campaigns, follow these email marketing tips:
Make it easy for users to subscribe to your list – add the newsletter sign-up box in
places that are visible while users are browsing the website
Give them incentives (like a free ebook or free resources) – Freebies can make a big
difference in how many people will sign up for your newsletter
Keep your promises – if you promise weekly updates, make sure that you send an
email with new tips weekly.
Don’t abuse their trust – Users trust you with their email addresses, and while you
can use automation to send personalized mass emails, don’t abuse their trust.
Everyone’s inbox is already full of promotional emails, so think about when to send
them another.
8. Use remarketing to get users back to your website
It’s a rather old marketing rule which states that a potential client should see or hear an ad (or
message) at least 7 times before they’ll take action to buy a product or service.
This applies to internet marketing as well. In website marketing terms, this means you need
to get users to revisit your website several times before they proceed to the next step of
your digital marketing funnel.
Publishing new content frequently and using social media marketing and email marketing are
all great ways to achieve this, but there is one more method that is highly effective and this
is remarketing.
This has a number of advantages, including more targeted traffic, lower advertising costs,
and higher conversion rates.
When you do website marketing, you should not forget two important things:
First: To keep your website up-to-date
This means upgrading your website software to the latest version, ensuring that your website
is secure and uses the latest technologies.
Besides publishing new content targeting specific keywords and increasing your organic
reach, you also need to go back and audit your existing content.
As your website gets bigger and older, some of your content will become outdated, which is
not good for users or search engines.
The first step of the process is to find thin content pages. These are pages that have no
rankings, backlinks, or traffic.
Maybe the content on those pages is good, but since they don’t rank for anything, they don’t
offer any real value to your website. As part of the audit, you should decide to either:
The second step is to review your Google Analytics and Google search console reports and
find out which are the most popular pages of your website.
A page with high rankings now does not mean it will maintain those rankings forever. The
competition is big and chances are that new pages are published daily targeting exactly the
same topics.
To ensure you will not lose your rankings, you need to review your top pages once every few
months and ensure that the content is still relevant and up-to-date.
These goals should be tracked in Google Analytics and analyzed so that you can make the
right decisions.
For example, if you notice that posts covering certain topics perform better than others, you
should focus your marketing efforts on creating content around those topics.
Virtual stores
What is a Virtual Store?
A virtual store is an e-commerce enterprise powered by Extended Reality. Virtual stores use
various modern technologies such as Virtual and Augmented Reality, holographic displays, and
3D models. They immerse customers in the VR shopping experience and provide lots of
possibilities to present products to users.
Virtual stores should be distinguished from conventional websites. Both are e-commerce
technologies but offer different mechanics of user engagement and product demonstration. Of
course, virtual stores provide more visibility and involvement.
Customers feel like they are inside a physical store and can virtually interact with products. The
development of different virtual scenarios makes the customer journey easier and more
personalized, pushes visitors to make a purchase, and helps reduce returns.
Virtual stores differ in the type of interaction their offer, with customers and with the real world:
Virtual try-on. Such stores use AR and VR to allow customers to try on products without
a physical connection with them. This helps consumers feel more confident they will
choose what really suits them. A good example is a virtual fitting room for a clothing
brand.
Virtual try-out. With Augmented Reality, technology users can check whether items
match their surroundings and choose the right size and color. This approach is often used
with furniture and interior design.
Virtual Reality store. Using special headsets, customers enter a virtual version of a real
shop. They can move around a store, examine products on the shelves, interact with
items, and make purchases.
Visual search. AI-powered technologies allow users to find items if they don’t know their
names or can’t explain what exactly they are looking for. For example, AI can help when
a user wants to find an outfit similar to one she saw on the street but doesn’t know where
to find it.
360-degree view. This is a catalog where, instead of 2D images, customers see 3D
models of products. It allows for looking at items from different angles and provides a
realistic interaction experience.
3D stores. Such stores represent websites where users interact with a 3-dimensional
environment that resembles a physical room. Customers can navigate through the store
using arrows and interact with 3D product models.
The diversity of virtual stores covers various areas of interest and brings as many goods as
possible into the virtual environment. Thanks to its numerous benefits, more and more brands are
adopting the virtual shopping experience.
Cookies are small files of information that a web server generates and sends to a web browser.
Web browsers store the cookies they receive for a predetermined period of time, or for the length
of a user's session on a website. They attach the relevant cookies to any future requests the user
makes of the web server.
Cookies help inform websites about the user, enabling the websites to personalize the user
experience. For example, ecommerce websites use cookies to know what merchandise users have
placed in their shopping carts. In addition, some cookies are necessary for security purposes,
such as authentication cookies (see below).
The cookies that are used on the Internet are also called "HTTP cookies." Like much of the web,
cookies are sent using the HTTP protocol.
A session cookie helps a website track a user's session. Session cookies are deleted after a user's
session ends — once they log out of their account on a website or exit the website. Session
cookies have no expiration date, which signifies to the browser that they should be deleted once
the session is over.
Persistent cookies
Unlike session cookies, persistent cookies remain in a user's browser for a predetermined length
of time, which could be a day, a week, several months, or even years. Persistent cookies always
contain an expiration date.
Authentication cookies
Authentication cookies help manage user sessions; they are generated when a user logs into an
account via their browser. They ensure that sensitive information is delivered to the correct user
sessions by associating user account information with a cookie identifier string.
Tracking cookies
Tracking cookies are generated by tracking services. They record user activity, and browsers
send this record to the associated tracking service the next time they load a website that uses that
tracking service.
Zombie cookies
Like the "zombies" of popular fiction, zombie cookies regenerate after they are deleted. Zombie
cookies create backup versions of themselves outside of a browser's typical cookie storage
location. They use these backups to reappear within a browser after they are deleted. Zombie
cookies are sometimes used by unscrupulous ad networks, and even by cyber attackers.
E-commerce Issues
Overview :
E-commerce is the evolution in technology, the buying and selling feature online not only have
shown growth in the online business but also allows customers to have a variety of choices for
buying their products. Now, customers can get the same product in a variety of ranges with a
variety of brands anywhere and anytime. Buying and selling now are not only limited to a
specific region or state, anyone can buy from anywhere in the world.
Issues in e-commerce :
E-commerce, or electronic commerce, is the buying and selling of goods and services over the
internet. While e-commerce has become increasingly popular and convenient for consumers and
businesses alike, it also comes with several issues and challenges that must be addressed to
ensure its success. Here are some of the most common e-commerce issues:
Privacy violation –
Many times we heard that companies have sold the personal details of their customers. This
is a very common issue nowadays even sometimes we allow sites to fully access our devices,
and also when we fill personal details in our account section these details can be used for
many purposes.
E-commerce also keeps track of our online activity or product preferences and product listing
based on this information they recommend products to us and advertise on platforms which
we use like Facebook, Instagram, and many more.
privacy invasion can also be done when there is low security in the e-commerce site. hackers
can hack the servers of e-commerce sites and gets personal information of users like credit
card details, phone number, and passwords.
Website spoofing –It is a technique to create the same lookalike website as other websites.
When the user by mistake types any other word in place of the original word they land on a page
that is the same as the original website. Or when a link is circulated among a group of persons of
the fake website they basically contain malicious code or they lure customers to buy their
product and give their personal details.
Online piracy –It is unauthorized copyright of the original property. Many sites provide free
copyright e-books, e-music, e-movies which are unethical. Sometimes original trademarks are
used to sell fake products. It is basically the use of other’s content without their permission or
without any right to download and distribute it. It has become the most dangerous threat to
content owners.
Email-spamming –Email spamming is a very common way to defraud users. This technique is
also known as phishing. In this, spammers sent emails to customers and lure them with products
and exciting offers. They tempt users to purchase their products and give their personal details on
their fake websites. Sometimes these emails are marked as spam mails but most often when we
give personal details such as name, email, phone number then they can easily send their mails to
defraud users. It is also known as junk mails.
Security: Security is a significant issue in e-commerce. Customers must trust the online store
they are purchasing from and be confident that their personal and financial information is secure.
Online businesses must ensure that their payment systems are secure and that they have strong
measures in place to protect customer data.
Fraud: E-commerce is vulnerable to fraud. Fraudsters may use stolen credit card information to
make purchases or create fake websites to deceive customers into sharing their personal and
financial information. Online businesses must be vigilant in detecting and preventing fraud, such
as implementing security measures like two-factor authentication.
Privacy: Privacy concerns are another issue in e-commerce. Customers may be hesitant to share
their personal information, such as their name, address, and email, with online businesses.
Companies must be transparent in their data collection and use policies and provide customers
with clear options for opting out of data collection.
Shipping and delivery: Shipping and delivery can be a major issue in e-commerce. Customers
expect timely and reliable delivery of their purchases, and online businesses must have efficient
logistics systems in place to meet those expectations. Unexpected delays, lost shipments, or
damaged goods can lead to dissatisfied customers.
Customer service: E-commerce companies must provide high-quality customer service to retain
customers and build a positive reputation. Customers expect prompt responses to their inquiries
and concerns and easy returns and exchanges if necessary. Online businesses must have efficient
customer support systems in place to address customer issues.
Competition: E-commerce is a highly competitive industry, and online businesses must
differentiate themselves from their competitors to succeed. They must offer unique products,
excellent customer service, and attractive prices to stay ahead of the competition.
Regulatory compliance: E-commerce companies must comply with a range of regulations, such
as data protection laws and tax regulations, depending on their location and the locations of their
customers. Failure to comply with these regulations can result in legal and financial
consequences.
Advantages of E-commerce:
Convenience: Customers can shop from anywhere and at any time without leaving the comfort
of their homes.
Increased Sales: E-commerce can help businesses increase their sales by reaching a wider
audience, offering more products, and simplifying the purchasing process.
Global Reach: E-commerce enables businesses to reach a global audience and sell their
products and services to customers in different parts of the world.
Reduced Costs: E-commerce can help businesses save money on overhead costs, such as rent,
utilities, and staffing.
Personalization: E-commerce platforms can use data analytics to offer personalized product
recommendations, discounts, and promotions to customers.
Disadvantages of E-commerce:
Lack of Personal Interaction: Customers may miss the personalized experience of shopping in
person and interacting with sales associates.
Security Threats: E-commerce platforms are vulnerable to security threats, such as data
breaches, hacking, and fraud, which can compromise customer data and harm businesses.
Technical Issues: Technical issues, such as website downtime or slow page load times, can
frustrate customers and harm businesses.
Dependence on Technology: E-commerce businesses are heavily reliant on technology, which
can be prone to glitches and failures.
Competition: E-commerce has made it easier for businesses to enter the market, which can
increase competition and make it harder for businesses to stand out.
Since a lot of things are expected to change in this industry over the coming years, let’s talk
about some of the most exciting ecommerce trends that we’re looking forward to in the future.
We believe that these trends will result in even faster growth of the industry and will bring about
some impactful changes.
The coronavirus has made an immense contribution to the sudden growth of the ecommerce
industry. When COVID19 was first declared as a global pandemic, people started stocking up.
The panic-buying behavior of the masses meant they wanted to get their hands on things as fast
as possible. As store supplies started to run out, ecommerce transactions went up because people
desperately needed alternatives.
This is further reinforced by a survey done by Search Engine Land which showed that consumers
are spending 30% more online. With such reliance on ecommerce, online stores and businesses
are also continually evolving. From partnering with better ecommerce hosting providers to
working on more convenient online store experiences, there’s a lot that we can expect from the
future of e-business.
When we talk about the future of ecommerce, the potential of automated shipping cannot be
ignored. As more customers buy online, the need to open strategically located fulfillment centers
has been significantly increasing to deliver orders in the shortest amount of time.
Automated shipping is definitely one of the most important ecommerce future trends that you
should look out for and aim to optimize your store with. Not only will this take away the
worrisome task of aligning shipments, it will also result in faster and timely deliveries to your
customers.
Many shipping automation software like ShipperHQ, ShippingEasy, and Shippo are now widely
available to be purchased and integrated directly with your ecommerce stores. There has never
been so much competition on fast delivery times before, but using these automated shipping
software, you can now lead your competitors.
Synchronizing your brick and mortar store with your digital store is also one of the up and
coming ecommerce future trends. There’s no denying the fact that online sales are increasing
faster than ever. But that doesn’t mean that brick and mortar stores are losing their value.
If you have a physical and an online store, you can hop on this synchronization trend where you
offer the same products, but different experiences to your customers. For example, Nike has
completely transformed the in-store experience for its customers. Customers now can customize
products, participate in in-store activities and try-out exclusive products, all things that are not
possible on a digital space.
Moreover, ecommerce-friendly PoS systems like Lightspeed, Square, and Revel are also
becoming increasingly popular which allows you to seamlessly integrate your online store with
your physical in-store PoS systems.
If you create two different experiences for your customers online and at your physical shop, you
will ensure great ecommerce future growth. In addition, you will be able to gauge old and new
customers alike and offer them something unique.
4. More Convenient Payment Methods
With ever-growing global digitalization, it is only fair that new and more convenient ways of
making payments are emerging. Ecommerce stores have also come a long way from only
offering credit/debit cards, bank transfers or cash payments.
With so many new payment gateways in the market like PayPal, Stripe and 2Checkout,
ecommerce business owners can now integrate these payment gateways into their platforms,
providing their customers the ease and convenience of making payments in a matter of seconds.
New and convenient payment methods are one of the hottest ecommerce future trends. If you’re
an ecommerce business owner, we’d suggest you follow this trend closely and give your
customers the best and easiest ways to make payments online.
5. Surge in Mobile Ecommerce and Increased Sales
When it comes to the future of ecommerce, mobile usage is a trend that has been significantly
increasing every year. According to Statista, the mobile ecommerce sales share in total
ecommerce sales has increased from 52.4% in 2016 to 72.9% in 2021.
This surge in mobile ecommerce can be attributed to the convenience of making purchases from
mobile devices. All major ecommerce platforms now have an application, which saves time, and
also offers exclusive offers to customers. Moreover, with seamless payment gateway
integrations, making payments for your purchased products has also become easier than ever.
However, there is still some ground that needs to be covered. Some customers believe their
experiences could be improved if the pages and links weren’t so small to click on. Another
concern for these customers is the lack of information and product reviews available on some
online platforms. These areas of improvement make mobile ecommerce one of the hottest
ecommerce future trends that companies could really work on.
Try Cloudways for faster performance, managed security, and 24/7 support.
Get Started Free
According to a Gartner survey, AI and machine learning will handle 40% of all customer
interactions by the year 2023. This means that the future of ecommerce holds a lot of room for
growth when it comes to AI and chatbots.
More and more ecommerce businesses are starting to incorporate chatbots into their online stores
because of the convenience they offer to the customers as well as the businesses. According to
Juniper Research, chatbots will save 2.5bn hours for customers as well as businesses by 2023.
Although AI is still in its early stages, it has seen a lot of progression over the last few years and
this trend will continue to grow further especially in the ecommerce industry as the AI
technology continues to adapt and evolve.
Visual lookup is a feature that will contribute a lot in the ecommerce future growth and in the
buying convenience for customers. Applications like Google Lens or the Image Search feature in
Google allow you to identify products you see around you, using its picture. For example, you’re
walking around a park and you see a flower that you want to purchase. Take a picture, and search
for the flower on the internet using visual lookup. Now you can locate a store nearby and buy the
flower.
Searching through visual stimuli is a trend that is still in its developmental stages and there’s
room for a lot of refinement. As time passes, this feature is also becoming increasingly popular.
With the release of the new iOS15, visual lookup can now be used on your iPhones as well. If
Apple and Android developers continue to improve this feature, then there’s no doubt that soon a
large amount of people will be using this feature for their day to day online shopping.
People all over the world are becoming increasingly aware of their individual impact on the
planet and how they can contribute in its minimization. Therefore, many ecommerce businesses
are now aligning their goals with social initiatives. Not only is this practice great for their
ecommerce future, but it’s also needed due to the environmental threats our planet is facing.
Customers today don’t just buy a product, they also look for the social contribution they can
make from their purchases. Many companies like Apple, Nestle etc. are working hard to
minimize their impact on the environment by reducing the use of plastic in their products.
The general sense of awareness amongst customers coupled with these initiatives will definitely
make the future of ecommerce brighter and more importantly, the future of our planet, a whole
lot better.
The introduction of AI and machine learning is here to revolutionize the future of ecommerce.
Ecommerce stores are now incorporating machine learning technology on their websites to
enhance their customers’ experiences.
Machine learning is starting to play a major role in the ecommerce industry. With this
technology businesses can now show product recommendations based on customer’s buying
behavior and the pages they visit. Moreover, AI and machine learning is also helping in giving
customers a visual experience of the product in the form of 3D models, online tours, etc.
When it comes to the future of e-business, it’s safe to say that the use of machine learning to
enhance online customer experiences will become one of the hottest ecommerce trends, one that
ecommerce businesses will greatly benefit from.
10. The Impact of Apple iOS14 and iOS15 Updates in the Long Term
Believe it or not, but things as small as an iOS update can impact global ecommerce trends at
some level. As of 2020, there are over 1 billion Apple device users all over the world. That
number is enough to make a change in an industry’s dynamics.
With each new iOS, Apple tries to strengthen their privacy measures and give its users more
control of the information that is being shared with third-parties and applications. These updates
can have a great impact on the future of ecommerce.
In iOS 14, Apple introduced a new privacy feature which gave users the option to choose the
amount of information they would like to share with applications. This means that many
ecommerce businesses who have apps and use data from those apps for marketing, might not
have access to key customer insights.
These privacy-related updates harm ecommerce businesses at some level because they’re losing
control of the information they can extract from their applications, in order to tailor their
marketing campaigns.
Nevertheless, it’s not all bad when it comes to these updates. New updates have also resulted in
better Apple Pay integrations, faster load-time for applications and an overall, more convenient
and faster ecommerce shopping experience.
Blogs:
Blogs are a type of regularly updated websites that provide insight into a certain topic. The word
blog is a combined version of the words “web” and “log.” At their inception, blogs were simply
an online diary where people could keep a log about their daily lives on the web.
Uses of blogs:
If you are starting a blog to create a web presence for an offline business you already have, the
step of choosing your topic is already done. If you're starting from scratch, you may not yet
know what you want to blog about.
A good approach to choosing a topic is to get in touch with what you are most passionate about.
What are you constantly reading or talking about to the point others wish you would stop talking
about it?! What excites you enough for you to want to write about it day after day without getting
bored?
If you choose a topic that is very broad, there’s a good chance you can’t compete with bigger
websites that are covering the same topic. You may need to narrow it down to a specialty. For
example, you are likely to have more success blogging about losing belly fat than weight loss in
general, or to blog about cultivating roses rather than just to blog about all aspects of gardening.
Choosing a topic comes easily to some but is more challenging for others. Don’t get hung up on
this step too long. If you start with one topic and find it’s going nowhere, you can always start a
different blog. The important thing is to get past your reluctance to get started.
Purchase a domain from a site like GoDaddy or NameCheap. If possible, use a keyword that
you are targeting in your domain name.
A keyword is a word that people will type into a search engine to search for a topic. A simple,
memorable title for your blog is a good idea rather than something complicated or difficult to
spell. It’s usually better to leave hyphens out of your domain name.
It’s always better to use a domain that ends with dot com (.com) rather than dot net (.net) or dot
anything else. If readers remember the name of your blog but not what comes after the dot, they
will always try .com first.
Step Three: Choose a Blogging Platform
There are several different blogging platforms to choose from, and they vary in the amount of
experience required to use them effectively. It’s a good idea to choose a platform which is
flexible and will allow for any future changes you may want to make.
WordPress.org – This is a self-hosted blogging platform, and probably the most popular of all
the blogging platforms. It offers plenty of functionality, themes, plugins and community support.
WordPress.com – This is a free blogging platform that is a great choice for beginners because it
is easy to learn while you are first getting started. Like other free platforms, it will run ads on
your site, and you never actually own your site, because WordPress can shut your site down if it
chooses to.
Blogger – This is another free platform that can get you started if you have absolutely no
blogging experience. Like WordPress.com, your blog isn’t actually owned by you and has
limited options for tools or support.
Squarespace – This is a user-friendly platform offering drag and drop website building for
beginners.
Wix – This is another platform that uses drag and drop tools to simplify the process of building a
website.
Joomla – This is an open source content management system. Like WordPress.org, it’s a self-
hosted option with plenty of templates but not as much community support as WordPress.
If you do choose a platform that is free so that you can get started and get some experience,
remember that there will be ads on your site that will detract from your message. If you do
choose this path, you don’t have to purchase a domain name and hosting.
For a professional site, choosing a platform in which you host your own blog is probably your
best bet.
Once you have chosen your domain name and your hosting, you will be able to put your blog up
online and install a theme. A theme is a template that can enhance the appearance of your blog.
Your blog will come with access to some free themes. You can choose one of them, or you may
wish to purchase a premium theme.
If you have chosen WordPress as your blogging platform, there are plenty of tutorials available
to help you go through the process of installing a theme, and there is also an active and
supportive community to help with any confusion you may have.
If you chose a different blogging platform, both your web hosting provider and your blogging
platform should offer support to walk you through the technical part of installing a theme.
There are many different plugins that can help improve the functionality of a WordPress blog.
Some enhance the experiences of those who are visiting your blog while others help you manage
it behind the scenes. Within the WordPress dashboard, you can search for the type of plugins you
are looking for, such as a contact form, photo dropper or editorial calendar.
Certain themes may require that certain plugins be installed in order for the theme to work. If
that’s a requirement, the theme will make it clear which plugins to install. Two plugins that are
recommended for just about every WordPress blog are Akismet, which prevents comment spam
from overtaking your blog, and Yoast SEO, which helps you to optimize your blog for search
engines.
Once you have set up your blog, it’s time to get writing. An editorial calendar can help you plan
your content ahead. Think about your target audience and what they want to read about, and then
get started writing content that is relevant to your niche. Whatever you post, stay focused and
relevant, or your audience will lose interest.
You can write posts ahead of time and use your blogging platform to schedule content to be
posted on the date and time that you want.
While it isn’t necessary to write a blog post every day, it’s a good idea to blog regularly. People
who are interested in your topic and find your blog will want to see new content on a fairly
regular basis. You will build up a following more quickly if you post frequently.
The more you blog, the more your writing will improve and the better you will get at knowing
what to write about. Make a commitment to your blog. Interact with other bloggers and learn all
you can about the world of blogging.
Use these five steps to get started as a blogger and make sure to post regularly, engage with
anyone that reaches out either through social sharing or posting a comment and keep track of
analytics so you know what content is resonating with your audience.
Above all, keep practising and posting and you will continue to improve your blogging skills.
What is social networking?
Social networks are websites and apps that allow users and organizations to connect,
communicate, share information and form relationships. People can connect with others in the
same area, families, friends, and those with the same interests. Social networks are one of the
most important uses of the internet today.
Popular social networking sites -- such as Facebook, Yelp, Twitter, Instagram and TikTok --
enable individuals to maintain social connections, stay informed and access, as well as share a
wealth of information. These sites also enable marketers to reach their target audiences.
As social media channels have evolved to become one of the primary ways people communicate
in the modern world on a daily basis, typical social rules are finding their way into digital
environments.
Just as social etiquette dictates how people behave around others in the real world, social media
etiquette revolves around online guidelines to follow.
The demands of social media etiquette differ from one platform to the next. For example,
reposting someone’s content on Instagram requires much more care than retweeting someone on
Twitter.
On the flip side, there are some basic dos and don’ts that essentially apply to all platforms:
Don’t be overly promotional. Try not to message all your customers asking them to buy
your products and avoid sharing constant advertisements on your page. Make your social
profiles a blend of promotional and valuable content.
Avoid over-automation. While scheduling your posts in advance and automating
analytics is helpful, don’t automate everything. Some things still need a human touch.
Handle your hashtags carefully. Avoid using too many hashtags at once. Even on
Instagram, where you can use 30 hashtags in a single caption, it’s important not to overdo
it.
Don’t bad-mouth your competition. Don’t be petty. Saying negative things about your
competitors online will harm your reputation more than it hurts theirs.
Be authentic and genuine. Don’t try to be something you’re not. Remember that your
customers can learn whatever they need to know about your brand online today and
things like authenticity can definitely go a long way.
Why is social media etiquette important?
Organizations can’t just delete messages that generate poor reactions anymore. A single mistake
can make or break a business.
Social media etiquette is often baked into the rules of a social media policy for modern brands.
This policy usually shares a complete code of conduct for anyone who interacts with a social
channel:
Protect against legal and security issues. If you exist in an industry with stringent
privacy and compliance laws, your system will keep you on the right side of the
regulations.
Empower staff. When your employees know how to share content safely online, they
can represent and advocate for your organization, without harming your reputation.
Defend your brand. Social etiquette ensures that everyone who interacts with your
brand on social media will see a respectable, professional business.
Internet security is a term that describes security for activities and transactions made over the
internet. It’s a particular component of the larger ideas of cybersecurity and computer security,
involving topics including browser security, online behavior and network security. We spend a
large proportion of our lives online, and some of the internet security threats we can encounter
include:
Hacking, where unauthorized users gain access to computer systems, email accounts, or
websites.
Viruses or malicious software (known as malware) which can damage data or make systems
vulnerable to other threats.
Identity theft, where criminals can steal personal and financial information.
THE IMPORTANCE OF INTERNET SECURITY
These days we do everything online, our computers, laptops and smartphones have become an
extension of ourselves so ensuring we have the best internet security is a way of knowing that
our identities, documents and passwords are not compromised.
With the internet came a selection of fraudulent activities from identity thieves to people who
hack computers and steal private passwords, documents and files. The fact we do everything
online only opens us up to these frauds and makes us sitting victims, unless you have taken the
necessary steps to protect your computer to the best of your ability.
It still surprises me how many people don’t bother with internet security. They seem to think that
their computers are invisible, but as soon as you start using your computer for anything that
involves logging onto the internet you are easy prey.
The safest method is to buy good internet security software, a program that will immediately
remove viruses, advice you when you are browsing the internet and click on a malicious site and
one that does regular scans of your computer to detect any damaging materials which may
compromise both you and your computer.
Over the years you have heard of these dangerous viruses, ones that will completely crash your
computer, wipe your computer clean, steal your private passwords and give the fraud access to
your personal information. Unfortunately there is no way of completely ridding yourself of these
frauds, they will send you emails, try and hack your passwords and access your accounts, but if
you have taken the relevant steps to protect your computer, you have nothing to worry about.
Internet frauds come from all backgrounds and all age groups and for some reason they feel the
need to post malicious software on the internet to cause serious damage. So many people become
victims as they didn’t have the right internet security in place. This means they lose all their
important documentation, they lose their operating systems and their computers won’t even boot
up. This results in the entire computer being formatted clean and reinstalled an inconvenience
that no one wants to bear.
THREATS INTERNET:
The internet has revolutionized the way we live, work, and communicate. However, it has also
brought with it a host of new threats that can compromise our privacy and security. These threats
come in many forms, from hackers and cybercriminals to viruses and malware.
One of the most significant threats on the internet is cybercrime. Cybercriminals use various
methods to steal personal information, financial data, and other sensitive information from
individuals and organizations. They may use phishing scams, malware, or other tactics to gain
access to their victims’ accounts or systems.
Another common threat on the internet is malware, which is software designed to damage or
disrupt computer systems. Malware can take many forms, including viruses, worms, and Trojan
horses. It can infect computers through email attachments, downloads, or other means and can
cause significant harm to individuals and organizations.
Other threats on the internet include identity theft, cyberbullying, and online harassment. These
can have serious consequences for victims, ranging from financial loss to emotional distress.
There are many types of threats information systems face today. Accidents, software errors,
hardware failures, or environmental influences such as fire may affect business’ operation. Each
of these threats require proper planning and range of activity to resolve.
Perpetrator of criminal threats often take control of communication systems. Malicious threats
can also be internal or external to organization. Activity may be from an individual, loosely it
group, organized criminal elements, Corporations, or governments. While motive and criminal
threats is important in evaluating risk, any attack against information and Infrastructure of
business can cause severe disruption and may result in loss of funds, productivity, market share,
or reputation.
Criminal activity against information systems is growing. This increase is partly due to:
Traditional business are increasingly moving to computer- based operations.
General knowledge of basic computer concepts and possibilities for exploitation are
becoming pervasive within public.
Increased connectivity and ineffective security controls allow greater access to information
and services while providing anonymity.
Some elements of stereotype amateur “hacker” are evolving into more criminally motivated
activities.
Almost every type of crime in physical world has or probably soon will have an online,
computer-based counterpart. In fact, networks become another tool which often become easier
criminal targets. With this said, there are several fundamental criteria for most profit motivated
criminals to use information systems.
Information systems provide low level of authentication and therefore higher degree anonymity.
This lessens chance of arrest in some cases, even though the crime is detected.
2. For-Profit Fraud –
Online activity of this group is highly variable and may include scams, extortion, deceptive
advertising. theft, securities fraud or illegal fund transfers. Many of these cases are classified
as computer assisted crimes. In other words, information systems are used as tool, not target.
For example, document fraud was involved in multi-million dollar case involving theft from
a pair of California banks last year using desktop publishing software and equipment to
create false payroll checks.
3. Organized Crime –
Many elements of organized crime are recognizing that they need to understand and use
information systems to maintain their traditional level of influence and revenue. Motivation
for organized crime to become involved in high technology information systems goes beyond
simple fraud and extortion to include surveillance of law enforcement, money laundering,
and secure and anonymous communication.
4. Fringe Groups – Political, Religious, and Anarchists –
Although this group rarely has fraudulent motives, there has been an increased use of
information systems by some groups to further their agendas. Most of the attacks in this
arena are in either theft of information or denial of service attacks.
A recent example was the attempt by German Chaos Computer Club to disrupt French
telecommunications and Internet infrastructures to protest against French Nuclear Testing.
7. Terrorism –
Several indicators have been discovered that traditional terrorist organizations are viewing
information systems as both potential tools and targets. In particular, ability to gather
targeting information from credit records, financial institutions and healthcare providers
appears to be an increasing threat recently demonstrated by IRA.
Types of Threats on Internet :
There are several types of threats on the internet, including:
1. Malware: Malware is malicious software that is designed to disrupt or damage computer
systems. It includes viruses, worms, Trojan horses, ransomware, and spyware.
2. Phishing: Phishing is a tactic used by cybercriminals to steal personal information, such as
usernames, passwords, and credit card numbers. This is often done by sending emails or
messages that appear to be from a legitimate source, but are actually designed to trick the
recipient into giving up their information.
3. Hacking: Hacking involves gaining unauthorized access to a computer system or network.
This can be done through exploiting vulnerabilities in software or using social engineering
tactics to trick users into giving up their login credentials.
4. Denial of Service (DoS) attacks: A DoS attack is designed to overwhelm a computer system
or network with traffic, making it unable to function properly. This can be done by sending a
large number of requests to a server, or by flooding a network with traffic.
5. Social engineering: Social engineering is the use of psychological manipulation to trick
users into giving up their personal information. This can include tactics such as phishing,
pretexting, and baiting.
6. Botnets: A botnet is a network of compromised computers that can be used to carry out
various malicious activities, such as DDoS attacks, spamming, and stealing personal
information.
7. Insider threats: Insider threats involve individuals within an organization who use their
access to confidential information for malicious purposes, such as stealing data or causing
damage to the network.
Issues of Threats on Internet :
Threats on the internet can have a wide range of issues, including:
1. Financial loss: One of the most significant issues of internet threats is financial loss.
Cybercriminals can steal credit card information, bank account details, and other financial
information, leading to significant financial losses for individuals and organizations.
2. Identity theft: Cybercriminals can use stolen personal information, such as social security
numbers and birthdates, to commit identity theft. This can lead to financial losses, damage to
credit scores, and other serious consequences.
3. Loss of privacy: Internet threats can compromise individuals’ privacy by allowing
cybercriminals to access personal information and monitor online activity. This can lead to
targeted advertising, cyberstalking, and other forms of online harassment.
4. Damage to reputation: Online threats can damage an individual’s or organization’s
reputation. This can happen through the spread of false information, negative reviews, or
other means.
5. Disruption of services: Cyberattacks can cause significant disruption to businesses and
organizations, leading to lost productivity and revenue.
6. Legal and regulatory consequences: Failure to protect personal and confidential
information can result in legal and regulatory consequences. Organizations can face fines,
legal action, and other penalties for failing to protect sensitive data.
7. Psychological impact: Online threats can have a significant psychological impact on
individuals, leading to anxiety, stress, and other negative effects.
HACKING:
Hacking is the act of identifying and then exploiting weaknesses in a computer system or
network, usually to gain unauthorized access to personal or organizational data. Hacking
is not always a malicious activity, but the term has mostly negative connotations due to
its association with cybercrime.
Cyber criminals exploit people and steal confidential and sensitive information through various
email-based strategies. Beware of the following:
Spam is unsolicited email, instant messages, or social media messages. These messages are
fairly easy to spot and can be damaging if you open or respond
Firewalls
A firewall employs rules to filter incoming and outgoing network traffic. It uses IP addresses and
port numbers to filter traffic. It can be set to either Layer 3 or transparent mode. The firewall
should be the first line of defense and installed inline at the network’s perimeter.
There are also different types of firewalls like proxy firewall, stateful inspection firewall, unified
threat management (UTM) firewall, next-generation firewall (NGFW), threat-focused NGFW,
IPS is a device that inspects, detects, classifies, and proactively prevents harmful traffic. It
examines real-time communications for attack patterns or signatures and then blocks attacks
when they have been detected. Placement and configuration in inline mode and generally being
in Layer 2 after the firewall. In inline mode, traffic passes into one of the device’s ethernet ports
and out of the other.
Intrusion Prevention System must work efficiently to avoid decreasing network performance. It
must be quick because exploits might occur anytime. To eliminate threats and false positives, the
IPS must detect and respond accurately.
UNIT-V
Blogs:
Blogs are a type of regularly updated websites that provide insight into a certain topic. The word
blog is a combined version of the words “web” and “log.” At their inception, blogs were simply
an online diary where people could keep a log about their daily lives on the web.
Uses of blogs:
If you are starting a blog to create a web presence for an offline business you already have, the
step of choosing your topic is already done. If you're starting from scratch, you may not yet
know what you want to blog about.
A good approach to choosing a topic is to get in touch with what you are most passionate about.
What are you constantly reading or talking about to the point others wish you would stop talking
about it?! What excites you enough for you to want to write about it day after day without getting
bored?
If you choose a topic that is very broad, there’s a good chance you can’t compete with bigger
websites that are covering the same topic. You may need to narrow it down to a specialty. For
example, you are likely to have more success blogging about losing belly fat than weight loss in
general, or to blog about cultivating roses rather than just to blog about all aspects of gardening.
Choosing a topic comes easily to some but is more challenging for others. Don’t get hung up on
this step too long. If you start with one topic and find it’s going nowhere, you can always start a
different blog. The important thing is to get past your reluctance to get started.
Purchase a domain from a site like GoDaddy or NameCheap. If possible, use a keyword that
you are targeting in your domain name.
A keyword is a word that people will type into a search engine to search for a topic. A simple,
memorable title for your blog is a good idea rather than something complicated or difficult to
spell. It’s usually better to leave hyphens out of your domain name.
It’s always better to use a domain that ends with dot com (.com) rather than dot net (.net) or dot
anything else. If readers remember the name of your blog but not what comes after the dot, they
will always try .com first.
Step Three: Choose a Blogging Platform
There are several different blogging platforms to choose from, and they vary in the amount of
experience required to use them effectively. It’s a good idea to choose a platform which is
flexible and will allow for any future changes you may want to make.
WordPress.org – This is a self-hosted blogging platform, and probably the most popular of all
the blogging platforms. It offers plenty of functionality, themes, plugins and community support.
WordPress.com – This is a free blogging platform that is a great choice for beginners because it
is easy to learn while you are first getting started. Like other free platforms, it will run ads on
your site, and you never actually own your site, because WordPress can shut your site down if it
chooses to.
Blogger – This is another free platform that can get you started if you have absolutely no
blogging experience. Like WordPress.com, your blog isn’t actually owned by you and has
limited options for tools or support.
Squarespace – This is a user-friendly platform offering drag and drop website building for
beginners.
Wix – This is another platform that uses drag and drop tools to simplify the process of building a
website.
Joomla – This is an open source content management system. Like WordPress.org, it’s a self-
hosted option with plenty of templates but not as much community support as WordPress.
If you do choose a platform that is free so that you can get started and get some experience,
remember that there will be ads on your site that will detract from your message. If you do
choose this path, you don’t have to purchase a domain name and hosting.
For a professional site, choosing a platform in which you host your own blog is probably your
best bet.
Step Four: Choose Your Hosting and Theme
Once you have chosen your domain name and your hosting, you will be able to put your blog up
online and install a theme. A theme is a template that can enhance the appearance of your blog.
Your blog will come with access to some free themes. You can choose one of them, or you may
wish to purchase a premium theme.
If you have chosen WordPress as your blogging platform, there are plenty of tutorials available
to help you go through the process of installing a theme, and there is also an active and
supportive community to help with any confusion you may have.
If you chose a different blogging platform, both your web hosting provider and your blogging
platform should offer support to walk you through the technical part of installing a theme.
There are many different plugins that can help improve the functionality of a WordPress blog.
Some enhance the experiences of those who are visiting your blog while others help you manage
it behind the scenes. Within the WordPress dashboard, you can search for the type of plugins you
are looking for, such as a contact form, photo dropper or editorial calendar.
Certain themes may require that certain plugins be installed in order for the theme to work. If
that’s a requirement, the theme will make it clear which plugins to install. Two plugins that are
recommended for just about every WordPress blog are Akismet, which prevents comment spam
from overtaking your blog, and Yoast SEO, which helps you to optimize your blog for search
engines.
Once you have set up your blog, it’s time to get writing. An editorial calendar can help you plan
your content ahead. Think about your target audience and what they want to read about, and then
get started writing content that is relevant to your niche. Whatever you post, stay focused and
relevant, or your audience will lose interest.
You can write posts ahead of time and use your blogging platform to schedule content to be
posted on the date and time that you want.
While it isn’t necessary to write a blog post every day, it’s a good idea to blog regularly. People
who are interested in your topic and find your blog will want to see new content on a fairly
regular basis. You will build up a following more quickly if you post frequently.
The more you blog, the more your writing will improve and the better you will get at knowing
what to write about. Make a commitment to your blog. Interact with other bloggers and learn all
you can about the world of blogging.
Use these five steps to get started as a blogger and make sure to post regularly, engage with
anyone that reaches out either through social sharing or posting a comment and keep track of
analytics so you know what content is resonating with your audience.
Above all, keep practising and posting and you will continue to improve your blogging skills.
Social networks are websites and apps that allow users and organizations to connect,
communicate, share information and form relationships. People can connect with others in the
same area, families, friends, and those with the same interests. Social networks are one of the
most important uses of the internet today.
Popular social networking sites -- such as Facebook, Yelp, Twitter, Instagram and TikTok --
enable individuals to maintain social connections, stay informed and access, as well as share a
wealth of information. These sites also enable marketers to reach their target audiences.
As social media channels have evolved to become one of the primary ways people communicate
in the modern world on a daily basis, typical social rules are finding their way into digital
environments.
Just as social etiquette dictates how people behave around others in the real world, social media
etiquette revolves around online guidelines to follow.
The demands of social media etiquette differ from one platform to the next. For example,
reposting someone’s content on Instagram requires much more care than retweeting someone on
Twitter.
On the flip side, there are some basic dos and don’ts that essentially apply to all platforms:
Don’t be overly promotional. Try not to message all your customers asking them to buy
your products and avoid sharing constant advertisements on your page. Make your social
profiles a blend of promotional and valuable content.
Avoid over-automation. While scheduling your posts in advance and automating
analytics is helpful, don’t automate everything. Some things still need a human touch.
Handle your hashtags carefully. Avoid using too many hashtags at once. Even on
Instagram, where you can use 30 hashtags in a single caption, it’s important not to overdo
it.
Don’t bad-mouth your competition. Don’t be petty. Saying negative things about your
competitors online will harm your reputation more than it hurts theirs.
Be authentic and genuine. Don’t try to be something you’re not. Remember that your
customers can learn whatever they need to know about your brand online today and
things like authenticity can definitely go a long way.
Organizations can’t just delete messages that generate poor reactions anymore. A single mistake
can make or break a business.
Social media etiquette is often baked into the rules of a social media policy for modern brands.
This policy usually shares a complete code of conduct for anyone who interacts with a social
channel:
Protect against legal and security issues. If you exist in an industry with stringent
privacy and compliance laws, your system will keep you on the right side of the
regulations.
Empower staff. When your employees know how to share content safely online, they
can represent and advocate for your organization, without harming your reputation.
Defend your brand. Social etiquette ensures that everyone who interacts with your
brand on social media will see a respectable, professional business.
Internet security is a term that describes security for activities and transactions made over the
internet. It’s a particular component of the larger ideas of cybersecurity and computer security,
involving topics including browser security, online behavior and network security. We spend a
large proportion of our lives online, and some of the internet security threats we can encounter
include:
Hacking, where unauthorized users gain access to computer systems, email accounts, or
websites.
Viruses or malicious software (known as malware) which can damage data or make systems
vulnerable to other threats.
Identity theft, where criminals can steal personal and financial information.
THE IMPORTANCE OF INTERNET SECURITY
These days we do everything online, our computers, laptops and smartphones have become an
extension of ourselves so ensuring we have the best internet security is a way of knowing that
our identities, documents and passwords are not compromised.
With the internet came a selection of fraudulent activities from identity thieves to people who
hack computers and steal private passwords, documents and files. The fact we do everything
online only opens us up to these frauds and makes us sitting victims, unless you have taken the
necessary steps to protect your computer to the best of your ability.
It still surprises me how many people don’t bother with internet security. They seem to think that
their computers are invisible, but as soon as you start using your computer for anything that
involves logging onto the internet you are easy prey.
The safest method is to buy good internet security software, a program that will immediately
remove viruses, advice you when you are browsing the internet and click on a malicious site and
one that does regular scans of your computer to detect any damaging materials which may
compromise both you and your computer.
Over the years you have heard of these dangerous viruses, ones that will completely crash your
computer, wipe your computer clean, steal your private passwords and give the fraud access to
your personal information. Unfortunately there is no way of completely ridding yourself of these
frauds, they will send you emails, try and hack your passwords and access your accounts, but if
you have taken the relevant steps to protect your computer, you have nothing to worry about.
Internet frauds come from all backgrounds and all age groups and for some reason they feel the
need to post malicious software on the internet to cause serious damage. So many people become
victims as they didn’t have the right internet security in place. This means they lose all their
important documentation, they lose their operating systems and their computers won’t even boot
up. This results in the entire computer being formatted clean and reinstalled an inconvenience
that no one wants to bear.
HERE’S A TOP ’10’ LIST OF THINGS
YOU SHOULD BE DOING!
Passwords – Keep your passwords secure. Don’t share them with anyone and ensure that they
can’t be easily guessed.
Software – Install security software on your computer and mobile, set it to scan regularly and
ensure it’s kept up to date. If your devices are not already protected, most virus protection
programs offer a free trial.
Phone calls – Be wary of calls you’re not expecting, requesting personal information, or access
to your computer. If in doubt, ask for a reference number and call the company from a number in
a public phone directory to ensure it’s genuine.
Social networking – think before you post photos, financial or personal information about
yourself, your friends or family online. And regularly adjust privacy settings.
Buying online – take care when transacting online – research the supplier and use a safe
payment method.
Email – carefully assess before clicking links and attachments, particularly from unknown
senders and keep up to date with the latest information on scams.
Mobile – protecting your mobile from viruses, malware, and Internet fraud is just as important as
protecting your home computer.
Check and report – Check bank statements and account records carefully to detect anything
unusual. If you see something suspicious or don’t recognise a transaction, contact the Bank
Share the knowledge – Talk with your family and encourage them to report anything that makes
them uncomfortable. Register for an Alert Service for regular updates on the latest threats. Check
with your local bank, they probably have one.
THREATS INTERNET:
The internet has revolutionized the way we live, work, and communicate. However, it has also
brought with it a host of new threats that can compromise our privacy and security. These threats
come in many forms, from hackers and cybercriminals to viruses and malware.
One of the most significant threats on the internet is cybercrime. Cybercriminals use various
methods to steal personal information, financial data, and other sensitive information from
individuals and organizations. They may use phishing scams, malware, or other tactics to gain
access to their victims’ accounts or systems.
Another common threat on the internet is malware, which is software designed to damage or
disrupt computer systems. Malware can take many forms, including viruses, worms, and Trojan
horses. It can infect computers through email attachments, downloads, or other means and can
cause significant harm to individuals and organizations.
Other threats on the internet include identity theft, cyberbullying, and online harassment. These
can have serious consequences for victims, ranging from financial loss to emotional distress.
There are many types of threats information systems face today. Accidents, software errors,
hardware failures, or environmental influences such as fire may affect business’ operation. Each
of these threats require proper planning and range of activity to resolve.
Perpetrator of criminal threats often take control of communication systems. Malicious threats
can also be internal or external to organization. Activity may be from an individual, loosely it
group, organized criminal elements, Corporations, or governments. While motive and criminal
threats is important in evaluating risk, any attack against information and Infrastructure of
business can cause severe disruption and may result in loss of funds, productivity, market share,
or reputation.
Criminal activity against information systems is growing. This increase is partly due to:
Traditional business are increasingly moving to computer- based operations.
General knowledge of basic computer concepts and possibilities for exploitation are
becoming pervasive within public.
Increased connectivity and ineffective security controls allow greater access to information
and services while providing anonymity.
Some elements of stereotype amateur “hacker” are evolving into more criminally motivated
activities.
Almost every type of crime in physical world has or probably soon will have an online,
computer-based counterpart. In fact, networks become another tool which often become easier
criminal targets. With this said, there are several fundamental criteria for most profit motivated
criminals to use information systems.
Information systems provide low level of authentication and therefore higher degree anonymity.
This lessens chance of arrest in some cases, even though the crime is detected.
9. For-Profit Fraud –
Online activity of this group is highly variable and may include scams, extortion, deceptive
advertising. theft, securities fraud or illegal fund transfers. Many of these cases are classified
as computer assisted crimes. In other words, information systems are used as tool, not target.
For example, document fraud was involved in multi-million dollar case involving theft from
a pair of California banks last year using desktop publishing software and equipment to
create false payroll checks.
14. Terrorism –
Several indicators have been discovered that traditional terrorist organizations are viewing
information systems as both potential tools and targets. In particular, ability to gather
targeting information from credit records, financial institutions and healthcare providers
appears to be an increasing threat recently demonstrated by IRA.
Types of Threats on Internet :
There are several types of threats on the internet, including:
8. Malware: Malware is malicious software that is designed to disrupt or damage computer
systems. It includes viruses, worms, Trojan horses, ransomware, and spyware.
9. Phishing: Phishing is a tactic used by cybercriminals to steal personal information, such as
usernames, passwords, and credit card numbers. This is often done by sending emails or
messages that appear to be from a legitimate source, but are actually designed to trick the
recipient into giving up their information.
10. Hacking: Hacking involves gaining unauthorized access to a computer system or network.
This can be done through exploiting vulnerabilities in software or using social engineering
tactics to trick users into giving up their login credentials.
11. Denial of Service (DoS) attacks: A DoS attack is designed to overwhelm a computer system
or network with traffic, making it unable to function properly. This can be done by sending a
large number of requests to a server, or by flooding a network with traffic.
12. Social engineering: Social engineering is the use of psychological manipulation to trick
users into giving up their personal information. This can include tactics such as phishing,
pretexting, and baiting.
13. Botnets: A botnet is a network of compromised computers that can be used to carry out
various malicious activities, such as DDoS attacks, spamming, and stealing personal
information.
14. Insider threats: Insider threats involve individuals within an organization who use their
access to confidential information for malicious purposes, such as stealing data or causing
damage to the network.
Issues of Threats on Internet :
Threats on the internet can have a wide range of issues, including:
8. Financial loss: One of the most significant issues of internet threats is financial loss.
Cybercriminals can steal credit card information, bank account details, and other financial
information, leading to significant financial losses for individuals and organizations.
9. Identity theft: Cybercriminals can use stolen personal information, such as social security
numbers and birthdates, to commit identity theft. This can lead to financial losses, damage to
credit scores, and other serious consequences.
10. Loss of privacy: Internet threats can compromise individuals’ privacy by allowing
cybercriminals to access personal information and monitor online activity. This can lead to
targeted advertising, cyberstalking, and other forms of online harassment.
11. Damage to reputation: Online threats can damage an individual’s or organization’s
reputation. This can happen through the spread of false information, negative reviews, or
other means.
12. Disruption of services: Cyberattacks can cause significant disruption to businesses and
organizations, leading to lost productivity and revenue.
13. Legal and regulatory consequences: Failure to protect personal and confidential
information can result in legal and regulatory consequences. Organizations can face fines,
legal action, and other penalties for failing to protect sensitive data.
14. Psychological impact: Online threats can have a significant psychological impact on
individuals, leading to anxiety, stress, and other negative effects.
HACKING:
Hacking is the act of identifying and then exploiting weaknesses in a computer system or
network, usually to gain unauthorized access to personal or organizational data. Hacking
is not always a malicious activity, but the term has mostly negative connotations due to
its association with cybercrime.
Cyber criminals exploit people and steal confidential and sensitive information through various
email-based strategies. Beware of the following:
Spam is unsolicited email, instant messages, or social media messages. These messages are
fairly easy to spot and can be damaging if you open or respond
Firewalls
A firewall employs rules to filter incoming and outgoing network traffic. It uses IP addresses and
port numbers to filter traffic. It can be set to either Layer 3 or transparent mode. The firewall
should be the first line of defense and installed inline at the network’s perimeter.
There are also different types of firewalls like proxy firewall, stateful inspection firewall, unified
threat management (UTM) firewall, next-generation firewall (NGFW), threat-focused NGFW,
Intrusion Prevention System must work efficiently to avoid decreasing network performance. It
must be quick because exploits might occur anytime. To eliminate threats and false positives, the
IPS must detect and respond accurately.