0% found this document useful (0 votes)
8 views

Nme Unit III

The document outlines the curriculum for a course on the Fundamentals of Internet at Jairams Arts and Science College, covering topics such as the history and evolution of the Internet, types of internet accounts, website hosting, e-commerce, and internet security. It details various internet services, including communication, information retrieval, and file transfer, while also discussing the advantages and disadvantages of internet usage. Additionally, it introduces concepts like Web 1.0, Web 2.0, and Web 3.0, highlighting the future of the internet and its impact on society.

Uploaded by

Suthan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Nme Unit III

The document outlines the curriculum for a course on the Fundamentals of Internet at Jairams Arts and Science College, covering topics such as the history and evolution of the Internet, types of internet accounts, website hosting, e-commerce, and internet security. It details various internet services, including communication, information retrieval, and file transfer, while also discussing the advantages and disadvantages of internet usage. Additionally, it introduces concepts like Web 1.0, Web 2.0, and Web 3.0, highlighting the future of the internet and its impact on society.

Uploaded by

Suthan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 93

JAIRAMS ARTS AND SCIENCE COLLEGE

(Affiliated to Bharathidasan University, Tiruchirappalli-24)

KARUR-3

PG & RESEARCH DEPARTMENT OF COMPUTER SCIENCE AND


APPLICATIONS

CLASS : II-M.SC (CHEMISTRY)

SUBJECT: FUNDAMENTALS OF

INTERNET

SUBJECT CODE: P22CSNME2

Prepared By,
Mrs. P. MANJULA. M.Sc(IT).,
Assistant Professor
PG & Research Department of Computer Science and Applications
FUNDAMENTALS OF INTERNET

UNIT – I THE INTERNET:

INTRODUCTION: From Computers to the Internet - Advantages of the Internet –


Major Internet Services – Hardware and Software in the Internet Age. Evolution
and Growth of the Internet: Birth of the Internet – Current Networking
Technologies – Next Generation Networking.

UNIT – II GETTING ONLINE:

Types of Internet Accounts – Selecting Internet Service Providers – Electronic


Mail: Advantages of E-mails – E-mail addresses – Mail transfer protocols –
Working of E-mail system. World Wide Web: Architecture of the World Wide
Web – Types of websites – Uniform Resource Locator – Domain Name System –
Web Pages and Web Links – Visiting Web Pages – Using Internet Explorer –
Searching the Web – Google and Yahoo Search Engines.

UNIT – III HOSTING AND PROMOTING WEBSITES

Structure of Websites – Web Development tools – Microsoft Front Page –Adobe


Dreamweaver – Visual Studio. NET – Hosting Websites – Getting a Domain
/name – Visitor Analysis and Statistics – Website Promoting methods.

UNIT – IV ELECTRONIC COMMERCE

E-Business and E-Commerce – Types of business in the internet – MCommerce -


Marketing Strategies on the Web – Making Payments in Virtual Stores – Shopping
in Virtual Stores –Cookies and E-Commerce – Major issues of E-commerce and
M-Commerce – Future of Ecommerce

UNIT – V BLOGS AND SOCIAL NETWORKING

Blogs – Uses of Blogs – Blogs System Components – Steps for Blogging –


Building a Blog site – Social Networking – Etiquette in networking sites. Internet
Security: Importance of Internet Security – Internet Threats – Identity theft and
Cybersquatting – Hacking – Spamming and Spoofing – Phishing and Pharming -
Firewalls and Intrusion Prevention Systems –Internet Security Precautions
UNIT-I
Introduction to Internet
Computers and their structures are tough to approach, and it is made
even extra tough while you want to recognize phrases associated with the difficulty this is
already utilized in regular English, Network, and the net will appear to be absolutely wonderful
from one some other, however, they may seem like identical.
A network is a group of two or more computer systems (Multiple gadgets, additionally called
hosts), which are related through a couple of channels for the motive of sending and receiving
data (records/media) in a shared environment. The community also can consist of serval
gadgets/mediums that resource communique among or extra machines; those gadgets are called
Network devices and consist of routers, switches, hubs, and bridges, amongst others.
Internet is a group of computer systems connected from all around the world. The Internet
protocol suite is a framework defined through the Internet standards. Methods are divided right
into a layered set of protocols on this architecture. The Internet gives a huge variety of statistics
and communique offerings, which includes forums, databases, email, and hypertext. It is made of
the neighborhood to global personal, public networks connected through plenty of digital,
wireless, and networking technologies.
The Internet is a worldwide interconnected network of hundreds of thousands of computers of
various types that belong to multiple networks.
Working of the internet: The internet is a global computer network that connects various
devices and sends a lot of information and media. It uses an Internet Protocol (IP) and Transport
Control Protocol (TCP)-based packet routing network. TCP and IP work together to ensure that
data transmission across the internet is consistent and reliable, regardless of the device or
location. Data is delivered across the internet in the form of messages and packets. A message is
a piece of data delivered over the internet, but before it is sent, it is broken down into smaller
pieces known as packets.
IP is a set of rules that control how data is transmitted from one computer to another via the
internet. The IP system receives further instructions on how the data should be transferred using
a numerical address (IP Address). The TCP is used with IP to ensure that data is transferred in a
secure and reliable manner. This ensures that no packets are lost, that packets are reassembled in
the correct order, and that there is no delay that degrades data quality.
History of Internet
Talking about the history of internet, the ARPANET (Advanced Research Projects Agency
Network, later renamed the internet) established a successful link between the University of
California Los Angeles and the Stanford Research Institute on October 29, 1969. Libraries
automate and network catalogs outside of ARPANET in the late 1960s.
TCP/IP (Transmission Control Protocol and Internet Protocol) is established in the 1970s,
allowing internet technology to mature. The development of these protocols aided in the
standardization of how data was sent and received via the internet. NSFNET (National Science
Foundation Network), the 56 Kbps backbone of the internet, was financed by the National
Science Foundation in 1986. Because government monies were being used to administer and
maintain it, there were commercial restrictions in place at the time.
In the year 1991, a user-friendly internet interface was developed. Delphi was the first national
commercial online service to offer internet connectivity in July 1992. Later in May 1995, All
restrictions on commercial usage of the internet are lifted. As a result, the internet has been able
to diversify and grow swiftly. Wi-Fi was first introduced in 1997. The year is 1998, and
Windows 98 is released. Smartphone use is widespread in 2007. The 4G network is launched in
2009. The internet is used by 3 billion people nowadays. By 2030, there are expected to be 7.5
billion internet users and 500 billion devices linked to the internet.
Uses of the Internet:
 E-mail: E-mail is an electronic message sent across a network from one computer user to
one or more recipients. It refers to the internet services in which messages are sent from and
received by servers.
 Web Chat: Web chat is an application that allows you to send and receive messages in real-
time with others. By using Internet chat software, the user can log on to specific websites and
talk with a variety of other users online. Chat software is interactive software that allows
users to enter comments in one window and receive responses from others who are using the
same software in another window.
 World Wide Web: The World Wide Web is the Internet’s most popular information
exchange service. It provides users with access to a large number of documents that are
linked together using hypertext or hyperlinks.
 E-commerce: E-commerce refers to electronic business transactions made over the Internet.
It encompasses a wide range of product and service-related online business activities.
 Internet telephony: The technique that converts analog speech impulses into digital signals
and routes them through packet-switched networks of the internet is known as internet
telephony.
 Video conferencing: The term “video conferencing” refers to the use of voice and images to
communicate amongst users.
Web Client
The client (or user) side of the Internet. The Web browser on the user’s computer or mobile
device is referred to as a Web client. It could also apply to browser extensions and helper
software that improve the browser’s ability to support specific site services.
Web browser
A web browser is a software program software that searches for, retrieves, and presentations
material which includes Web pages, photos, videos, and different files. The browser sends a
request to the Webserver, which then transmits the statistics returned to the browser, which
presentations the findings at the laptop. Example – Mozilla Firefox, Microsoft Edge, Google
Chrome, Safari etc.
Webpage
An internet web page (additionally called a web page) is a report that may be regarded in an
internet browser at the World Wide Web. HTML (HyperText Markup Language) and CSS
(Cascading Style Sheet) are used to generate the primary shape of an internet web page. An
internet web page is generally a segment of an internet site that carries statistics in plenty of
formats, which includes textual content inside the shape of paragraphs, lists, tables, and so on.
The home web page is the beginning or first web page of an internet site. It gives trendy statistics
and connections to all the internet pages which are associated. Every internet web page has its
personal deal with. This may be visible withinside the deal with the bar. As a result, if we need to
get admission to a selected internet web page, the deal needs to be placed inside the browser’s
deal with bar.
Website
An internet site, in trendy, is a group of statistics approximately statistics prepared into many
internet pages. An internet site is probably made for a sure motive, subject matter, or to provide a
service. An internet site (abbreviated as “website” or “site”) is a group of online pages connected
collectively through links and saved on an internet server. By clicking on links, a tourist can pass
from one web page to the next. An internet site’s pages also are connected below one area call
and proportion a not unusual place subject matter and template.
Search Engine
Search engines are websites that search on the internet on behalf of users and show a listing of
results. More than actually written may be discovered on seek engines. You can be capable of
looking for different online content material which includes photographs, video content material,
books, and news, in addition to gadgets and offerings, relying on the seek engine you are the use
of.
To make use of the Internet, you do not always want to recognize the deal with an internet site. It
is crucial to recognize the way to do a look for statistics. Using a seek engine is one of the only
methods to seek. A seek engine can help you in finding what you are looking for. You also can
appearance up net maps and instructions to help you to plot your adventure from one factor to
some other. Example: Google, Bing, DuckDuckGo, yahoo, etc.
Web 1.0: The Beginning of the Internet
Web 1.0, which emerged with the invention of the Internet, featured static web pages that could
only be viewed. These early websites were essentially digital brochures, with limited
interactivity and no ability for users to contribute content. This era saw the rise of early browsers
such as Mosaic and Netscape Navigator, which made it easier for users to access the Web.
Web 2.0: The Era of Social Media and User-Generated Content
Web 2.0, which emerged during the “Internet Boom” era of the late 1990s and early 2000s,
introduced more dynamic web pages and websites, and allowed for user-generated content. This
era saw the rise of social media platforms such as Facebook, Twitter, and YouTube, as well as
the introduction of blogs, wikis, and other forms of user-generated content.
Web 3.0: The Future of the Internet
Web 3.0, which is still in development, promises to bring a more personalized and intuitive
experience for users. It is expected to be more intelligent and able to understand the context and
intent of the user’s actions. This will be achieved through the integration of Artificial
Intelligence (AI) and Machine Learning (ML) technologies.
Many experts in the tech industry claimed that Web 3.0 is the next evolution of the internet that
is focused on decentralization, intelligence, and security. It aims to create a more personalized,
intuitive, and inclusive experience for users by leveraging new technologies such as blockchain
and artificial intelligence. The goal of Web 3.0 is to make the internet more democratic, open-
source, and secure.
Differentiation between Network and Internet
The number one distinction between a network and the internet is that a network is made of
computer systems that are bodily related and may be used as a personal laptop at the same time
as additionally sharing records. The Internet, on the alternative hand, might be an era that
connects those small and massive networks and creates a brand new in-intensity community.
Advantages of the Internet:
 It is the best source of a wide range of information. There is no better place to conduct
research than the internet.
 Online gaming, talking, browsing, music, movies, dramas, and TV series are quickly
becoming the most popular ways to pass the time.
 Because there are hundreds of thousands of newsgroups and services that keep you updated
with every tick of the clock, the Internet is a source of the most recent news.
 Because of virtual shops where you may buy anything you want and need without leaving
your house, internet shopping is becoming increasingly popular. Recently, virtual shops have
been making a lot of money.
 With the emergence of online businesses, virtual stores, and credit card usage, purchasing
goods without going to the store has never been easier.
Disadvantages of the Internet:
 Spending too much time on the internet is hazardous for the young generation’s physical and
mental health.
 Children who use the internet develop an addiction, which is quite dangerous.
 It is now quite easy to decipher someone’s chat or email messages thanks to the hacking
community.
 With the emergence of online stores, people prefer to order online rather than going to local
stores which results in less social interactions among people.
Internet Services

The internet offers a range of services to its consumers. We can upload


and download the files/ data via the internet as it is a pool of knowledge. We can access or obtain
information as needed. It is quite popular because of the variety of senders available on the
Internet. Web services have grown in popularity as a result of these offerings. To
access/exchange a large amount of data such as software, audio clips, video clips, text files, other
documents, etc., we require internet services. We must use an Internet service to connect to the
Internet. Data can be sent from Internet servers to your machine via Internet service. Some of the
internet services are FTP, Telnet, VoIP, etc. In this article, we will learn about different types of
internet services.

How to connect your computer to the Internet?

Before moving further first of all we will understand how to connect our computer to the
internet. So to establish the connection follow the following steps:
Step 1: Install the hardware, such as a modem and an Ethernet cable, as well as the important
software like LAN driver, etc.
Step 2: Use an ethernet cable or a wireless link to establish a preliminary connection.
Step 3: Navigate to the router’s default IP address.
Step 4: Use the login name and password provided by the ISP to connect to the internet.
Step 5: Save your preferences.

Internet services

To access/exchange a large amount of data such as software, audio clips, video clips, text files,
other documents, etc., we need internet services. You must use an Internet service to connect to
the Internet. Data can be sent from Internet servers to your machine via Internet service. Some of
the commonly used internet services are :
 Communication Services
 Information Retrieval Services
 File Transfer
 World Wide Web Services
 Web Services
 Directory Services
 Automatic Network Address Configuration
 Network Management Services
 Time Services
 Usenet
 NewsGroup
 Ecommerce
Now let us discuss them one by one
1. Communication Services: To exchange data/information among individuals or organizations,
we need communication services. Following are some of the common communication services:
 IRC(Internet Relay Chat): Subscribers can communicate in real-time by connecting
numerous computers in public spaces called channels.
 VoIP: It stands for Voice over Internet Protocol, which describes how to make and receive
phone calls over the internet. A larger number of people believe VoIP is a viable alternative
to traditional landlines. VoIP (Voice over Internet Protocol) is a technique that helps us make
voice calls via the Internet rather than over a traditional (or analog) phone line. Some VoIP
services may let you call only other VoIP users, while others may let you call anyone with a
phone number, including long-distance, mobile, and local/international lines. If you have an
internet connection you can easily call anyone without using a local phone service because
VoIP solutions are based on open standards, they can be used on any computer. More than
just setting up calls is what VoIP service providers do. Outgoing and incoming calls are
routed through existing telephone networks by them.
 List Server (LISTSERV): Delivers a group of email recipients’ content-specific emails.
 E-Mail: Used to send electronic mail via the internet. It is a paperless method for sending
text, images, documents, videos, etc from one person to another via the internet.
 User Network (USENET): It hosts newsgroups and message boards on certain topics, and it
is mostly run by volunteers.
 Telnet: It’s used to connect to a remote computer that’s connected to the internet.
 Video Conferencing: Video conferencing systems allow two or more people who are
generally in different locations to connect live and visually. Live video conferencing services
are necessary for simulating face-to-face talks over the internet. The system can vary from
very simple to complex, depending on the live video conferencing vendors. A live video-
based conference involves two or more individuals in separate locations utilizing video-
enabled devices and streaming voice, video, text, and presentations in real-time via the
internet. It allows numerous people to connect and collaborate face to face over large
distances. Tools available for this purpose are Zoom, FreeConference, Google Hangouts,
Skype, etc.
2. Information Retrieval Services: It is the procedure for gaining access to information/data
stored on the Internet. Net surfing or browsing is the process of discovering and obtaining
information from the Internet. When your computer is linked to the Internet, you may begin
retrieving data. To get data, we need a piece of software called a Web browser. A print or
computer-based information retrieval system searches for and locates data in a file, database, or
other collection of data. Some sites are:
 www.geeksforgeeks.org: Free tutorials, millions of articles, live, online, and classroom
courses, frequent coding competitions, industry expert webinars, internships, and job
possibilities are all available. A computer-based system for searching and locating data in a
file, database, or another source.
 www.crayola.com: It includes advice for students, parents, and educators on how to be more
creative.
3. File Transfer: The exchange of data files across computer systems is referred to as file
transfer. Using the network or internet connection to transfer or shift a file from one computer to
another is known as file transfer. To share, transfer, or send a file or logical data item across
several users and/or machines, both locally and remotely, we use file transfer. Data files include
– documents, multimedia, pictures, text, and PDFs and they can be shared by uploading or
downloading them. To retrieve information from the internet, there are various services available
such as:
 Gopher: A file retrieval application based on hierarchical, distributed menus that is simple to
use.
 FTP (File Transfer Protocol): To share, transfer, or send a file or logical data item across
several users and/or machines, both locally and remotely.
 Archie: A file and directory information retrieval system that may be linked to FTP
4. Web services: Web services are software that uses defined messaging protocols and are made
accessible for usage by a client or other web-based programs through an application service
provider’s web server. Web services allow information to be exchanged across web-based
applications. Using Utility Computing, web services can be provided.
5. World Wide Web: The internet is a vast network of interconnected computers. Using this
network, you can connect to the world wide web (abbreviated as ‘www’ or ‘web’) is a collection
of web pages. The web browser lets you access the web via the internet.
6. Directory Services: A directory service is a set of software that keeps track of information
about your company, customers, or both. Network resource names are mapped to network
addresses by directory services. A directory service provides users and administrators with full
transparent access to printers, servers, and other network devices. The directory services are :
 DNS (Domain Number System): This server provides DNS. The mappings of computer
hostnames and other types of domain names to IP addresses are stored on a DNS server.
 LDAP (Lightweight Directory Access Protocol): It is a set of open protocols that are used
for obtaining network access to stored data centrally. It is a cross-platform authentication
protocol for directory services and also allows users to interact with other directory services
servers.
7. Automatic Network Address Configuration: Automatic Network Addressing assigns a
unique IP address to every system in a network. A DHCP Server is a network server that is used
to assign IP addresses, gateways, and other network information to client devices. It uses
Dynamic Host Configuration Protocol as a common protocol to reply to broadcast inquiries from
clients.
8. Network Management Services: Network management services are another essential internet
service that is beneficial to network administrators. Network management services aid in the
prevention, analysis, diagnosis, and resolution of connection problems. The two commands
related to this are:
 ping: The ping command is a Command Prompt command that is used to see if a source can
communicate with a specific destination & get all the possible paths between them.
 traceroute: To find the path between two connections, use the traceroute command.
9. Time Services: Using facilities included in the operating system, you may set your computer
clock via the Internet. Some services are :
 Network Time Protocol (NTP): It is a widely used internet time service that allows you to
accurately synchronize and adjust your computer clock.
 The Simple Network Time Protocol (SNTP): It is a time-keeping protocol that is used to
synchronize network hardware. When a full implementation of NTP is not required, then this
simplified form of NTP is typically utilized.
10. Usenet: The ‘User’s Network’ is also known as Usenet. It is a network of online discussion
groups. It’s one of the first networks where users may upload files to news servers and others can
view them.
11. News Group: It is a lively Online Discussion Forum that is easily accessible via Usenet.
Each newsgroup contains conversations on a certain topic, as indicated by the newsgroup name.
Users can use newsreader software to browse and follow the newsgroup as well as comment on
the posts. A newsgroup is a debate about a certain topic made up of notes posted to a central
Internet site and distributed over Usenet, a global network of news discussion groups. It uses
Network News Transfer Protocol (NNTP).
12. E-commerce: Electronic commerce, also known as e-commerce or e-Commerce, is a
business concept that allows businesses and individuals to buy and sell goods through
the internet.

History and Evolution of the Internet

The Internet completely revolutionised communication and technology across the Globe.
Initially, computerised devices were only used for large industries but later its usage increased
massively.

It is also mandatory for people to know that it is not possible for a single person to develop
something as broad and wide as the Internet all by himself/herself. It was a combined effort of
multiple researchers and programmers that the Internet was discovered.
Given below are a few important points which played an extremely important role in the
development of the Internet and making it one of the most widely used resources across the
world.

 The first development was the introduction of host-to-host network interactions. This was
first observed in ARPANET in 1969. It was developed by Advanced Research Projects
Agency (APRA) of the Department of Defence, U.S. It was one of the first general usage
of computer networks.
 Next step was commercialising the usage and making the transistors and transmitters fit
in smaller devices for convenient Internet usage for the general public. This was
introduced in the 1970s
 Moving forward, satellites and wireless communication was the main target. Defence
Advanced Research Projects Agency (formerly ARPA), supported satellite-based radio
packets for mobile usage of networks
 The next was the development of Transmission Control Protocol (TCP). This enabled
different machines and networks across the world to assemble data packets. It was in the
1980s that the TCP/IP approach was adapted by researchers and technologists, following
the footsteps of the U.S. Department of Defence
 With the introduction of personal computers, the demand for commercial Internet usage
increased. This was the time when Ethernet and other Local Area Networks cam in the
foreground
 In 1993, the web browser was introduced, which followed the point-and-click approach
and is now a widely used operation for Internet users
 The late 1990s was the time when thousands of Internet Service Providers has taken up
the market and most of them were from the U.S.
 And then the 21st century brought in an amalgamation of technology and wireless
Internet accessibility for its users. Wherein, wireless broadband services came in as a
boon for Internet users
1. SD-WAN

SD-WAN has become far more critical as businesses shut down offices, driving either a hybrid
work environment or a complete work-from-home (WFH) strategy. WFH went from temporary
to permanent for many companies, which redefined the network edge.

VPNs, which were often the point-to-point solution for remote workers, gave way to always-on
SD-WAN appliances for many tasks as the network edge extended into employees' homes. With
businesses becoming more distributed, they have accelerated their migration plans to SD-WAN
because of the improved experience and security for their WFH workforce.
2. 5G cellular

Because of the pandemic, the migration to 5G cellular changed significantly and not just because
some oddball conspiracy theories suggested 5G caused the pandemic. While carriers continued
their 5G rollouts, many businesses that planned to migrate to 5G have stuck with 4G/LTE for
now. Government programs for 5G, like smart cities, came under pressure from the pandemic's
unexpected and mounting healthcare costs.

But where 5G has gained a foothold -- and will continue to grow in 2022 and beyond -- is fixed
5G to the home. Many WFH companies are finding fixed 5G as a solution to segment work
systems from home systems and deliver internet to WFH employees who did not have previous
broadband access.

3. Wi-Fi 6

The transition to Wi-Fi 6 has been problematic for many businesses that began planning the
migration for 2020 or 2021. The shift to WFH has had a dramatic effect on commercial real
estate. Many offices are shuttered, and those that are still running often see lower employee
density.

Device density, one of the greatest benefits of Wi-Fi 6, is in less demand in the new commercial
real estate reality. Where Wi-Fi 6 is growing, and will continue to grow, is on the consumer side,
especially with WFH. The demands of home-based employees for higher bandwidth can more
easily justify the small price in moving to the new technology.

4. AI enablement

The AI enablement of networking products has been rolling along as expected. 2020 had a
concerted focus on the enablement of applications with AI, especially in the security and
analytics areas.

As the workplace splintered into WFH and hybrid environments, the security threat profile
changed dramatically. Additionally, managing productivity for remoteworkers is infinitely more
challenging, and AI can help bolster the human efforts through monitoring and analytics.
While AI can't replace humans entirely, it does a tremendous job of scaling and adapting as the
landscape underneath is shifting.

5. Network automation

Finally, network automation has had an important role because of the pandemic. As employees
moved to WFH, IT was clearly not immune to the changes. Many IT professionals became
further removed from their systems.

Additionally, many IT folks realized they were now managing far more physical devices than
ever before and relying more on automation to help compensate for the changing work profile.
As we roll into 2022, automation will continue to grow as it has proved its value through these
trying times.

2020 and 2021 have brought new dynamics to the field of networking but not necessarily new
ideas. Instead of radical, breakthrough products, most companies were positioning their IT
budgets to handle radical, breakthrough processes. It was not as much about new technologies
and far more about new ways to do things.

As we step into 2022, the ingenuity of IT will continue to be challenged as many of the changes
expected to be temporary have become the new normal. We should expect today's changes to
have a lasting effect on networking for years.

Next Generation Network (NGN)

Next Generation Network (NGN) refers to a packet-based network and it can be used for both
telecommunication services as well as data and it supports mobility. It is able to make use of
multiple broadband capabilities, especially Quality of Services (QoS) enabled transport
technologies where the service-related functions are independent of the underlying transport-
related technologies.
The main goal of Next Generation Network (NGN) is to serve/work as an replacement of Public
Switched Telephone Network (PSTN) and Integrated Services Digital Network (ISDN).
Nowadays there exist different networks for different purposes like voice, data, and all sorts of
video. The telephony, Internet, and cellular networks refer to different domains and each has its
own protocol and services. The idea behind the Next Generation Network (NGN) is that one
network which transports all type of data and provides services in the form of packets similar to
those which is used on Internet. Commonly NGNs are built around Internet Protocol (IP). That’s
why sometimes NGN is referred to as an all-IP network to describe the transformation towards
Next Generation Network (NGN).
International Telecommunication Union Telecommunication Standardization Sector (ITU-T)
defines Next Generation Network (NGN) is a packet based network which provides
telecommunication services to users and it uses multiple broadbands, QoS enabled transport
technologies. NGN is a generalized mobility approach and it allows consistent and all over-
provision of services to users.
Fundamental characteristics for defining NGN :
 Packet based transfer.
 Separation of control functions for bearer capabilities, call/session – service.
 Decoupling of service and network, and provision of open interfaces (I/F).
 A wide range of services like (Real Time(RT)/ streaming/ non Real Time (RT)/ multimedia).
 Interworking with legacy networks via open I/F.
 Support of Generalized mobility.
 Support to unrestricted access by users to different service providers.
Services supported in NGN :
 Data communication services.
 Multimedia Services.
 Public interest services.
 Public Switched Telephone Network (PSTN)/Integrated Services Digital Network (ISDN)
simulation services.
 Public Switched Telephone Network (PSTN)/ Integrated Services Digital Network (ISDN)
emulation services
Next Generation Network Layer :
 In Access Layer, different types of media gateways that support connection to and from
access network with the core network are included.
 Core network layer is network handling converged services based on Internet Protocol (IP).
Control layer works as call server. It provides call control functions also provides control of a
media gateway.
 Service layer is an IT platform that creates a service creation environment extending its
functionality in order to cover new network scenarios as an intelligent network.
The below figure illustrates Next Generation Network (NGN) Layers as

follows.
This basic reference model separated Transport layer (Access and Core) from Service layer. In
short Access Layer elements handles different media gateways. Core Layer handles networks
based on IP. Control Layer handles call control functions and control of media gateways. Service
Layer is an IT platform that plays role of an Intelligent Network Service Creation Environment.
UNIT-II
GETTING ONLINE
Types of Internet Accounts
With an Internet account, you get the right to use the provider's Internet service,
your very own email address (so you can send and receive email), and all the other information
you need to set up your computer for accessing the Internet through the service.

Dial-Up Accounts
Most Internet accounts are called "dial-up" accounts because you use them by "dialing up" the
Internet provider through your modem and telephone line. These are sometimes also described as
"IP" accounts because they require your computer to communicate through TCP/IP

An account with an online service such as America Online is also a "dial-up" account, but it's not
the same thing as a regular Internet PPP or SLIP account. An online service account requires a
different kind of communications software (supplied by the service) for accessing the service and
its non-Internet content.

When you access the Internet through an online service, the service may temporarily switch you
over to a PPP account, or it may funnel you to the Internet using a different communications
scenario.

This is why online services often limit you to one or two different Web browsers and other
clients, instead of letting you choose the one you want. Any client software used through the
service must be specially configured for the service's unique communications system.

Email-Only Accounts
With an email-only account, you get full access to Internet email, and nothing else—no Web, no
newsgroups, no chat, no shoes, no shirt, no service. You will have access to mailing lists,
however, which enable you to get through email much of the same discussion content you'd see
in newsgroups.

Email accounts can be run from the lowliest of computers and cost next to nothing. In fact, a few
companies now offer you an email account free of charge, in exchange for the right to send you
targeted advertisements.

What Is an Internet Service Provider (ISP)?


The term “internet service provider (ISP)” refers to a company that provides access to the
internet to both personal and business customers. ISPs make it possible for their customers to
surf the web, shop online, conduct business, and connect with family and friends—all for a fee.

ISPs may also provide other services, including email services, domain registration, web
hosting, and browser packages. An ISP may also be referred to as an information service
provider, a storage service provider, an internet network service provider (INSP), or any
combination of these three based on the services offered by the company.

 An internet service provider (ISP) is a company that provides web access to businesses
and consumers.
 ISPs may also provide other services such as email services, domain registration, web
hosting, and browser services.
 An ISP is considered to be an information service provider, storage service provider,
internet network service provider (INSP), or a mix of all of them.
 Internet use has evolved from only those with university or government accounts having
access to nearly everyone having access, whether it’s paid or free.
 Access has gone from dial-up connections to high-speed broadband technology.
 AT&T Internet: Best Overall
 T-Mobile Home Internet: Best Mobile Internet
 Cox Communications: Best Company for Bundles
 CenturyLink: Best No Contract
 Comcast Xfinity: Best Customer Reviews
 Verizon Fios
 Google Fiber
 HughesNet

What is email?

Electronic mail, commonly shortened to “email,” is a communication method that uses electronic
devices to deliver messages across computer networks. "Email" refers to both the delivery
system and individual messages that are sent and received.

Email has existed in some form since the 1970s, when programmer Ray Tomlinson created a
way to transmit messages between computer systems on the Advanced Research Projects
Agency Network (ARPANET). Modern forms of email became available for widespread public
use with the development of email client software (e.g. Outlook) and web browsers, the latter of
which enables users to send and receive messages over the Internet using web-based email
clients (e.g. Gmail).
Advantages of email

 Emails are delivered extremely fast when compared to traditional post.


 Emails can be sent 24 hours a day, 365 days a year.
 Webmail means emails can be sent and received from any computer, anywhere in the world,
that has an internet connection.
 Cheap - when using broadband, each email sent is effectively free. Dial-up users are charged
at local call rates but it only takes a few seconds (for conventional email, eg text only) to send
an email.
 Emails can be sent to one person or several people.
An email address consists of three main components:
1. The local intro (i.e., the name). The first part of your email address is your name, or some
other specific bit of information that is exclusive to you (or your intended recipients).
2. The @ symbol. The @ symbol is immutable.
3. The domain. At the end of the email address is the domain. The domain name is determined
by the account's host or client, such as Gmail, Yahoo, or Outlook, for example, gmail.com or
outlook.com.
Email protocols are a collection of protocols that are used to send and receive emails properly.
The email protocols provide the ability for the client to transmit the mail to or from the
intended mail server. Email protocols are a set of commands for sharing mails between two
computers. Email protocols establish communication between the sender and receiver for the
transmission of email. Email forwarding includes components like two computers sending and
receiving emails and the mail server. There are three basic types of email protocols.

Types of Email Protocols:

Three basic types of email protocols involved for sending and receiving mails are:
 SMTP
 POP3
 IMAP
SMTP (Simple Mail Transfer Protocol):

Simple Mail Transfer Protocol is used to send mails over the internet. SMTP is an application
layer and connection-oriented protocol. SMTP is efficient and reliable for sending emails.
SMTP uses TCP as the transport layer protocol. It handles the sending and receiving of
messages between email servers over a TCP/IP network. This protocol along with sending
emails also provides the feature of notification for incoming mails. When a sender sends an
email then the sender’s mail client sends it to the sender’s mail server and then it is sent to the
receiver mail server through SMTP. SMTP commands are used to identify the sender and
receiver email addresses along with the message to be sent.
Some of the SMTP commands are HELLO, MAIL FROM, RCPT TO, DATA, QUIT,
VERIFY, SIZE, etc. SMTP sends an error message if the mail is not delivered to the receiver
hence, reliable protocol.

POP(Post Office Protocol):

Post Office Protocol is used to retrieve email for a single client. POP3 version is the current
version of POP used. It is an application layer protocol. It allows to access mail offline and
thus, needs less internet time. To access the message it has to be downloaded. POP allows only
a single mailbox to be created on the mail server. POP does not allow search facilities
Some of the POP commands are LOG IN, STAT, LIST, RETR, DELE, RSET, and QUIT.

IMAP(Internet Message Access Protocol):

Internet Message Access Protocol is used to retrieve mails for multiple clients. There are
several IMAP versions: IMAP, IMAP2, IMAP3, IMAP4, etc. IMAP is an application layer
protocol. IMAP allows to access email without downloading them and also supports email
download. The emails are maintained by the remote server. It enables all email operations such
as creating, manipulating, delete the email without reading it. IMAP allows you to search
emails. It allows multiple mailboxes to be created on multiple mail servers and allows
concurrent access. Some of the IMAP commands are: IMAP_LOGIN, CREATE, DELETE,
RENAME, SELECT, EXAMINE, and LOGOUT.

World Wide Web (WWW)


The World Wide Web is abbreviated as WWW and is commonly known as the web.
The WWW was initiated by CERN (European library for Nuclear Research) in 1989.
WWW can be defined as the collection of different websites around the world, containing
different information shared via local servers(or computers).
History:
It is a project created, by Timothy Berner Lee in 1989, for researchers to work together
effectively at CERN. is an organization, named the World Wide Web Consortium (W3C), which
was developed for further development of the web. This organization is directed by Tim Berner’s
Lee, aka the father of the web.

System Architecture:
From the user’s point of view, the web consists of a vast, worldwide connection of documents or
web pages. Each page may contain links to other pages anywhere in the world. The pages can be
retrieved and viewed by using browsers of which internet explorer, Netscape Navigator, Google
Chrome, etc are the popular ones. The browser fetches the page requested interprets the text and
formatting commands on it, and displays the page, properly formatted, on the screen.
The basic model of how the web works are shown in the figure below. Here the browser is
displaying a web page on the client machine. When the user clicks on a line of text that is linked
to a page on the abd.com server, the browser follows the hyperlink by sending a message to the
abd.com server asking it for the page.

Here the browser displays a web page on the client machine when the user clicks on a line of text
that is linked to a page on abd.com, the browser follows the hyperlink by sending a message to
the abd.com server asking for the page.
Working of WWW:
The World Wide Web is based on several different technologies: Web browsers, Hypertext
Markup Language (HTML) and Hypertext Transfer Protocol (HTTP).
A Web browser is used to access web pages. Web browsers can be defined as programs which
display text, data, pictures, animation and video on the Internet. Hyperlinked resources on the
World Wide Web can be accessed using software interfaces provided by Web browsers. Initially,
Web browsers were used only for surfing the Web but now they have become more universal.
Web browsers can be used for several tasks including conducting searches, mailing, transferring
files, and much more. Some of the commonly used browsers are Internet Explorer, Opera Mini,
and Google Chrome.
Features of WWW:
 HyperText Information System
 Cross-Platform
 Distributed
 Open Standards and Open Source
 Uses Web Browsers to provide a single interface for many services
 Dynamic, Interactive and Evolving.
 “Web 2.0”

Components of the Web: There are 3 components of the web:

1. Uniform Resource Locator (URL): serves as a system for resources on the web.
2. HyperText Transfer Protocol (HTTP): specifies communication of browser and server.
3. Hyper Text Markup Language (HTML): defines the structure, organisation and content of
a webpage.
Types of websites

A website is a collection of interlinked web pages with a common domain name. The website
can be made by any individual, group, or company. All the websites together constitute the
world wide web. The website can be of several types, like an e-commerce website, social
media website, or a blog website, and every website has a different role, but one thing is
common that every website has several linked web pages.

Personal Website
These websites are used for sharing your personal information. Also, you can share your
philosophical thoughts and showcase your work. Many people use personal websites to brand
themselves.
Photo Sharing Website
This type of website enables you to store your photographs online and share them with your
family and friends. Here you can upload as much as you want, also manage it as well as share
it (private or public).
Blog
A blog is a website where people share information, ideas, and views. It is a place where you
can express your vision and your thoughts to the world. Earlier, blogs were used as a journal,
but now they are becoming one of the important mass communication tools where people get
to know about new things. WordPress and Google blogger are famous blogging sites where
you can write articles. Blogs include a travel blog, news blog, cooking blog,
Informational website
The term itself gives us the idea. This website provides information on various topics. We very
often get confused about many things and searching for them in a book is very time-taking.
These websites save our lives, as we get information about everything. For example, Wikipedia
is an information website where you can get information about everything related to history,
geography, science and technology, cinema, famous people,
E-commerce website
This website is a place for online shopping where a person can buy or sell a product. Amazon,
Flipkart, and Olx are some of the examples of an E-commerce website. E-commerce has a lot
of potentials to grow as nowadays, people tend to shop online because of their hectic life.
Social Media website
This is the most popular website where people can connect with each other. Social media
websites enable the user to share their personal information, pictures, video ideas, and opinion
in real-time. Facebook, Instagram, and Twitter are some examples of social media websites.
Educational Websites
Education websites include websites of colleges and schools and tuitions. The new normal has
changed the structure of educational institutions. Nowadays, people are learning through online
classes and the demands of educational websites also grow. As people want to learn more than
their college and schools. So there are platforms like Coursera, GeeksforGeeks where people
are learning more than their college and school.
Portfolio Websites
These websites are used to showcase your best work to a professional. It is a
more personal website where creative people add their creativity to showcase their industry. A
portfolio website is a majorly creative one. For example, I am a writer and I want a job in
digital content writing. Then I can make a portfolio website where I can showcase my different
type of writing style on the website.
Non-Profit Websites
We all know marketing is the essence of the business and, more importantly, it is a
public presence. Likewise, non-profit organizations to need attention from the public and thus,
websites come into the picture. These days, every NGO has its own website. They use them to
inform their audience, raising funds, and also informing about themselves what they are doing.
For example, GateFoundation.org is a non-profit website.
Magazine and News Websites
Many people got confused with a blog website and news websites. Basically, a
news website focused on journalism rather than personal interests. These days every media
house has a digital presence on the internet. News and magazine websites monetize through
advertisement and subscription models. For example, The Times of India have their own
website called timesofindia.indiatimes.com where you can read news online.

UNIFORM RESOURCE LOCATOR

This article discusses Uniform Resource Locators (URLs), explaining what they are and how
they're structured.

Prerequisites You need to first know how the Internet works, what a Web server is and the
: concepts behind links on the web.

Objective: You will learn what a URL is and how it works on the Web.
URL stands for Uniform Resource Locator. A URL is nothing more than the
address of a given unique resource on the Web. In theory, each valid URL points to a unique
resource. Such resources can be an HTML page, a CSS document, an image, etc. In practice,
there are some exceptions, the most common being a URL pointing to a resource that no longer
exists or that has moved. As the resource represented by the URL and the URL itself are handled
by the Web server, it is up to the owner of the web server to carefully manage that resource and
its associated URL.

DNS(Domain Name System)

An application layer protocol defines how the application processes running on different
systems, pass the messages to each other.

o DNS stands for Domain Name System.


o DNS is a directory service that provides a mapping between the name of a host on the
network and its numerical address.
o DNS is required for the functioning of the internet.
o Each node in a tree has a domain name, and a full domain name is a sequence of symbols
specified by dots.
o DNS is a service that translates the domain name into IP addresses. This allows the users
of networks to utilize user-friendly names when looking for other hosts instead of
remembering the IP addresses.
o For example, suppose the FTP site at EduSoft had an IP address of 132.147.165.50, most
people would reach this site by specifying ftp.EduSoft.com. Therefore, the domain name
is more reliable than IP address.

DNS is a TCP/IP protocol used on different platforms. The domain name space is divided into
three different sections: generic domains, country domains, and inverse domain.
Generic Domains

o It defines the registered hosts according to their generic behavior.


o Each node in a tree defines the domain name, which is an index to the DNS database.
o It uses three-character labels, and these labels describe the organization type.

Label Description

aero Airlines and aerospace companies

biz Businesses or firms

com Commercial Organizations

coop Cooperative business Organizations

edu Educational institutions

gov Government institutions

info Information service providers

int International Organizations


mil Military groups

museum Museum & other nonprofit organizations

name Personal names

net Network Support centers

org Nonprofit Organizations

pro Professional individual Organizations

Country Domain
The format of country domain is same as a generic domain, but it uses two-character country
abbreviations (e.g., us for the United States) in place of three character organizational
abbreviations.

Inverse Domain

The inverse domain is used for mapping an address to a name. When the server has received a
request from the client, and the server contains the files of only authorized clients. To determine
whether the client is on the authorized list or not, it sends a query to the DNS server and ask for
mapping an address to the name.

Working of DNS

o DNS is a client/server network communication protocol. DNS clients send requests to


the. server while DNS servers send responses to the client.
o Client requests contain a name which is converted into an IP address known as a forward
DNS lookups while requests containing an IP address which is converted into a name
known as reverse DNS lookups.
o DNS implements a distributed database to store the name of all the hosts available on the
internet.
o If a client like a web browser sends a request containing a hostname, then a piece of
software such as DNS resolver sends a request to the DNS server to obtain the IP address
of a hostname. If DNS server does not contain the IP address associated with a hostname,
then it forwards the request to another DNS server. If IP address has arrived at the
resolver, which in turn completes the request over the internet protocol.

Web Pages and weblink


A webpage is a digital document that is linked to the World Wide Web and
viewable by anyone connected to the internet having a web browser. It can contain any type of
information, such as text, color, graphics, animations, videos, sounds, etc.
A webpage is a document that is written in the HTML, it can be viewed from
the Internet. It can be accessed by entering the URL on the address bar of the web browser.
Components of a Webpage :
As you already know that a webpage is a digital document containing information in digital
form, still we are asking this question – What does it contain or what are its compositions?
Well, this question can be answered in more than one way :
 Components of a webpage, Content wise
 Components of a webpage, Structure Wise
ContentWise :
Content-wise the components of a webpage are: Hypertext and Hyperlinks
1. Hypertext :
It refers to a digital text, which is more than just text as it can include information in
various media formats such as :

 text
 color
 graphic
 animation
 video
 sound
 hyperlinks
2. Hyperlinks :
It refers to a link from a hypertext file to another such file. A hyperlink can be in the
form of a graphic or text, upon clicking where the linked document opens up.
Structure Wise :
Structure wise the components of a web page are :
1. Page Title –
This is a single line text which is displayed on the title bar of the browser displaying web
page.
2. Header –
This is generally a one or two line text (sometimes a graphics/image) defining the purpose
of the web page. It is displayed at the top of the web page, below the address bar of the
browser.
3. Body of the Web page –
This is the section below the header of the web page and it contains the actual content of
the web page.
4. Navigational Links –
These are the hyperlinks placed on the web page using which you can move the linked web
pages/documents.
5. Footer –
This is the bottom section of the web page. This is the section where usually the copyright
notice, website contact information, etc. is put.

UNIT-III
HOSTING AND PROMOTING WEBSITES
STRUCTURE OF WEBSITES
What is Website Structure?

Your site’s structure is how the different pages on your site are linked with each
other using internal links and their hierarchy. It is how the information on your site is organized
and presented so that the algorithm can read its context well. Good website structure facilitates
easy navigation for both users and crawlers which improves the SEO ranking of your website in
search engines.

website structure important for designers

The role of a designer is to create a website that has a great UX that takes care of
accessibility and is easy to use. A great website structure improves the usability or user-
friendliness of your website by making it easy for users to find what they are looking for. To
create a website structure, you need to map out how you will organize the content on your site
(homepage, categories, individual page, blog posts).

Types of Web Structures

There are different types of web structure that you may use in UX design. They are hierarchical,
sequential, matrix, and database model. What are they about?

1. Hierarchical structure: It’s the most common website structure is a hierarchical


structure that is based on one parent page (main page) and child pages (categories and
sub-categories) that flow from the main page.
2. Sequential structure: It’s used when you want your users to go through steps or any
other sequence. A good example of that structure is Growth Design‘s UX case study
pages that they share in their newsletter.
3. Matrix structure: This is site structure that’s common for online newspapers, such
as New York Times. The site architecture, although present, isn’t as clear as in the
hierarchical model.
4. Database model: This is the model prevalent for sites that have a lot user-generated
content.

WEB DEVELOPMENT TOOLS


The best web development tools make it simple and easy for
developers to create and design a custom software platform.
Web development has long since left the grounds of having to individually
code pages in HTML/CSS, JavaScript, PHP or another internet language, using just
Notepad or simply code-friendly text editor.
These days, development development platforms are already available to help
with every part of the process, from coding to web design itself. The result is the ability
to build and host your own website the way you want it to look.

MICROSOFT FRONT PAGE


Microsoft FrontPage It was branded as part of the Microsoft Office suite from 1997 to 2003.
Microsoft FrontPage has since been replaced by Microsoft Expression Web and SharePoint
Designer, which were first released in December 2006 alongside Microsoft Office 2007, but
these two products were also discontinued in favor of a web-based version of SharePoint
Designer, as those three HTML editors were desktop applications.

History[edit]
FrontPage was initially created by Cambridge, Massachusetts company Vermeer Technologies,
Incorporated,[2] evidence of which can be easily spotted in file names and directories
prefixed _vti_ in web sites created using FrontPage. Vermeer was acquired by Microsoft in
January 1996 specifically so that Microsoft could add FrontPage to its product line-up,
[3]
allowing them to gain an advantage in the browser wars, as FrontPage was designed to create
web pages for their own browser, Internet Explorer.[4]
As a "WYSIWYG" (What You See Is What You Get) editor, FrontPage is designed to hide the
details of pages' HTML code from the user, making it possible for novices to create web
pages and web sites easily.
FrontPage's initial outing under the Microsoft name came in 1996 with the release of Windows
NT 4.0 Server and its constituent Web server Internet Information Services 2.0. Bundled on CD
with the NT 4.0 Server release, FrontPage 1.1 would run under NT 4.0 (Server or Workstation)
or Windows 95. Up to FrontPage 98, the FrontPage Editor, which was used for designing pages,
was a separate application from the FrontPage Explorer which was used to manage web site
folders.[5] With FrontPage 2000, both programs were merged into the Editor.
FrontPage used to require a set of server-side plugins originally known as IIS Extensions. The
extension set was significantly enhanced for Microsoft inclusion of FrontPage into the Microsoft
Office line-up with Office 97 and subsequently renamed FrontPage Server Extensions (FPSE).
Both sets of extensions needed to be installed on the target web server for its content and
publishing features to work. Microsoft offered both Windows and Unix-based versions of FPSE.
FrontPage 2000 Server Extensions worked with earlier versions of FrontPage as well. FPSE
2002 was the last released version which also works with FrontPage 2003 and was later updated
for IIS 6.0 as well. However, with FrontPage 2003, Microsoft began moving away from
proprietary Server Extensions to standard protocols like FTP and WebDAV for remote web
publishing and authoring.[6] FrontPage 2003 can also be used with Windows SharePoint Services.
A version for the classic Mac OS was released in 1998; however, it had fewer features than the
Windows product and Microsoft has never updated it.[7]
In 2006, Microsoft announced that FrontPage would eventually be superseded by two products.
[8]
Microsoft SharePoint Designer would allow business professionals to design SharePoint-based
applications. Microsoft Expression Web is targeted at the web design professional for the
creation of feature-rich web sites. Microsoft discontinued Microsoft FrontPage in December
2006. Functional equivalent would be found in Microsoft Expression Web.

Features[edit]
Some of the features in the last version of FrontPage include:

 FrontPage 2003 consists of a Split View option to allow the user to code in Code View and
preview in Design View without the hassle of switching from the Design and Code View
tabs for each review.
 Dynamic Web Templates (DWT) were included for the first time in FrontPage 2003,
allowing users to create a single template that could be used across multiple pages and even
the whole Web site.
 Interactive Buttons give users a new easy way to create Web graphics for navigation and
links, eliminating the need for a complicated image-editing package such as Adobe
Photoshop which Microsoft does not sell.
 The accessibility checker gives the user the ability to check if their code is standards-
compliant and that their Web site is easily accessible for people with disabilities. An HTML
optimizer is included to aid in optimizing code to make it legible and quicker to process.
 Intellisense, which is a form of autocompletion, is a key feature in FrontPage 2003 that
assists the user while typing in Code View. When working in Code View, Intellisense will
suggest tags and/or properties for the code that the user is entering which was intended to
significantly reduce the time to write code. The Quick Tag Editor shows the user the tag they
are currently in when editing in Design View. This also includes the option to edit the
specific tag/property from within the Tag Editor.
 Code Snippets give users the advantage of creating snippets of their commonly used pieces
of code, allowing them to store it for easy access whenever it is next needed.
 FrontPage 2003 includes support for programming in ASP.NET a server-side scripting
language that adds interactivity to Web sites and Web pages.
 FrontPage 2003 includes support for macros in VBA.

Versions[edit]

 1995 — Vermeer FrontPage 1.0


 1996 — Microsoft FrontPage 1.1
 1996 — Microsoft FrontPage 97 (version 2)
 1997 — Microsoft FrontPage Express 2.0 (free simple web page editor came with Internet
Explorer 4 and 5, and could be found online from numerous shareware Web sites[9][10])
 1997 — Microsoft FrontPage for Macintosh 1.0
 1997 — Microsoft FrontPage 98 (version 3)
 1999 — Microsoft FrontPage 2000 (version 4): Also included in Office 2000 Premium and
Developer editions
 2001 — Microsoft FrontPage 2002 (version 10): Included in Office XP Professional with
FrontPage (volume license only), Office XP Professional Special Edition and Office XP
Developer edition. Starting with this version, the version number jumps to 10.0 to
tally Microsoft Office versions.
 2003 — Microsoft Office FrontPage 2003 (version 11): Not included in any of the Office
2003 editions, sold separately. It was included with Windows Small Business Server 2003
Premium Edition.

ADOBE DREAMWEAVER
Adobe Dreamweaver is a proprietary web development tool from Adobe Inc. It was
created by Macromedia in 1997[1] and developed by them until Macromedia was acquired by
Adobe Systems in 2005.[3]
Adobe Dreamweaver is available for the macOS and Windows operating systems.
Following Adobe's acquisition of the Macromedia product suite, releases of Dreamweaver
subsequent to version 8.0 have been more compliant with W3C standards. Recent versions have
improved support for Web technologies such as CSS, JavaScript, and various server-side
scripting languages and frameworks including ASP (ASP JavaScript, ASP VBScript, ASP.NET
C#, ASP.NET VB), ColdFusion, Scriptlet, and PHP.[4]

Features[edit]
Adobe Dreamweaver CC is a web design Integrated Development Environment (IDE) that is
used to develop and design websites. Dreamweaver includes a code editor that supports syntax
highlighting, code completion, real-time syntax checking, and code introspection for generating
code hints to assist the user in writing code.
Dreamweaver, like other HTML editors, edits files locally then uploads them to the remote web
server using FTP, SFTP, or WebDAV. Dreamweaver CS4 supports the Subversion
(SVN) version control system.
Since version 5, Dreamweaver supports syntax highlighting for the following languages:

 ActionScript
 Active Server Pages (ASP).
 C#
 Cascading Style Sheets (CSS)
 ColdFusion
 EDML
 Extensible HyperText Markup Language (XHTML)
 Extensible Markup Language (XML)
 Extensible Stylesheet Language Transformations (XSLT)
 HyperText Markup Language (HTML)
 Java
 JavaScript
 PHP
 Visual Basic (VB)
 Visual Basic Script Edition (VBScript)
 Wireless Markup Language (WML)
Support for Active Server Pages (ASP) and JavaServer Pages was dropped in version CS5.[5][6]
Users can add their language syntax highlighting. Code completion is available for many of these
languages.

Internationalization and Localization[edit]


Language availability[edit]
Adobe Dreamweaver CS6 is available in the following languages: Brazilian Portuguese,
Simplified Chinese, Traditional Chinese, Czech, Dutch, English, French, German, Italian,
Japanese, Korean (Windows only), Polish, Russian, Spanish, Swedish and Turkish.[7]
Specific features for Arabic and Hebrew languages[edit]
The older Adobe Dreamweaver CS3 also features a Middle Eastern version that allows typing
Arabic, Persian, Urdu, or Hebrew text (written from right to left) within the code view. Whether
the text is fully Middle Eastern (written from right to left) or includes both English and Middle
Eastern text (written left to right and right to left), it will be displayed properly.

Visual Studio.NET
Visual Studio is an Integrated Development Environment(IDE) developed by Microsoft to
develop GUI(Graphical User Interface), console, Web applications, web apps, mobile apps,
cloud, and web services, etc. With the help of this IDE, you can create managed code as well
as native code. It uses the various platforms of Microsoft software development software like
Windows store, Microsoft Silverlight, and Windows API, etc. It is not a language-specific IDE
as you can use this to write code in C#, C++, VB(Visual Basic), Python, JavaScript, and many
more languages. It provides support for 36 different programming languages. It is available for
Windows as well as for macOS.
Evolution of Visual Studio:
The first version of VS(Visual Studio) was released in 1997, named as Visual Studio 97 having
version number 5.0. The latest version of Visual Studio is 15.0 which was released on March 7,
2017. It is also termed as Visual Studio 2017. The supported .Net Framework Versions in latest
Visual Studio is 3.5 to 4.7. Java was supported in old versions of Visual Studio but in the latest
version doesn’t provide any support for Java language.

There are 3 editions of Microsoft Visual Studio as follows:

1. Community: It is a free version which is announced in 2014. All other editions


are paid. This contains the features similar to Professional edition. Using this
edition, any individual developer can develop their own free or paid apps
like .Net applications, Web applications and many more. In an enterprise
organization, this edition has some limitations. For example, if your
organization have more than 250 PCs and having annual revenue greater than $1
Million(US Dollars) then you are not permitted to use this edition. In a non-
enterprise organization, up to five users can use this edition. Its main purpose is
to provide the Ecosystem(Access to thousands of extensions) and
Languages(You can code in C#, VB, F#, C++, HTML, JavaScript, Python, etc.)
support.
2. Professional: It is the commercial edition of Visual Studio. It comes in Visual
Studio 2010 and later versions. It provides the support for XML and XSLT
editing and includes the tool like Server Explorer and integration with Microsoft
SQL Server. Microsoft provides a free trial of this edition and after the trial
period, the user has to pay to continue using it. Its main purpose is to provide
Flexibility(Professional developer tools for building any application type),
Productivity(Powerful features such as CodeLens improve your team’s
productivity), Collaboration(Agile project planning tools, charts, etc.) and
Subscriber benefits like Microsoft software, plus Azure, Pluralsight, etc.
3. Enterprise: It is an integrated, end to end solution for teams of any size with
the demanding quality and scale needs. Microsoft provides a 90-days free trial
of this edition and after the trial period, the user has to pay to continue using it.
The main benefit of this edition is that it is highly scalable and deliver high-
quality software.

Hosting websites:

What is web hosting?

Web hosting is a service that stores your website or web application and makes it easily
accessible across different devices such as desktop, mobile, and tablets. Any web application or
website is typically made of many files, such as images, videos, text, and code, that you need to
store on special computers called servers. The web hosting service provider maintains,
configures, and runs physical servers that you can rent for your files. Web site and web
application hosting services also provide additional support, such as security, website backup,
and website performance, which free up your time so that you can focus on the core functions of
your website.

Why is web hosting important?

Hosting your business website on an internal server can be n an


internal server can be time-consuming and expensive. Web hosting providers offer the following
benefits.

Performance
A web hosting company that manages hardware resources for multiple websites has greater
purchasing power. It invests in cutting-edge technology so that you get high-performing web
servers with processing power, internal memory, and other computing resources. This improves
website performance, and your visitors can load pages quickly.
Reliability
Web hosting service providers take away the stress of ongoing server maintenance. They
perform regular system upgrades to maintain high security standards. By doing so, they free up
your IT resources so that you can focus on application delivery instead of server management.
Technical support
Most web hosting services offer comprehensive support for troubleshooting performance issues.
They also streamline website monitoring and analytics, data backup and recovery, and other
similar features that make your website run more smoothly.
Security and compliance

Web hosting services use an end-to-end approach to secure infrastructure, including physical,
operational, and software measures that meet all compliance requirements.
What are the features of web hosting?

Most web hosting companies provide different hosting packages and plans. Your monthly web
hosting cost can range from free to paid, depending on factors such as the following:

 Size of your website.


 Number of daily website visitors.
 Peak time website or webpage traffic.
 Web hosting features that you require.

Before selecting a web hosting service, explore the different features that various services
provide. The following are the main features generally provided.

Disk space

Your website will require storage space for emails, web files, images, and databases. While you
are estimating your storage requirements, also consider future website growth and website
traffic. Low disk space impacts user experience, so it is an important factor in the selection of
a web hosting service.

Bandwidth and data transfer

In the web hosting industry, the terms bandwidth and data transfer are often used
interchangeably. However, they are two different things. Bandwidth is the amount of data that
your website can transfer to visitors at one time. Data transfer is the actual amount of data that it
transfers.

You can think of bandwidth as a pipe. The bigger the pipe, the more the water can pass through
it. However, for various reasons, you might not use the total capacity of the pipe. Data transfer is
like the actual amount of water that goes through the pipe in a given time period.

Email accounts

Many web hosting plans include an email account. You can link your email address to your
website name. For example, if your website name is example.com, your email address will
be yourname@example.com. The following are the main types of email accounts.

POP3

POP3 accounts give you server space to store your emails, which you can access directly or by
using your email client program.
Forwarding mail

Forwarding mail accounts redirect emails to another email address. This account could be a
personal email account with an email service provider or a third-party account that manages your
website emails for you.

Aliases

Some web hosts have emails plans that you can use to create several aliases or email account
names without creating a full POP3 account. For example, you might want to display sales@,
support@, and orders@ addresses on different pages of you website. Instead of having multiple
POP3 accounts that need to be checked and administered, you could redirect everything to a
single inbox.

FTP access

FTP refers to website file transfer and sharing. Many websites have documents, such as PDF
files or image files, that they want internet users to download. The web hosting company uses
FTP access to provide this service.

Getting A Domain/ Name


A domain name is a unique address for a website that can be acquired
through domain registration. Usually, it consists of a website name and a domain name
extension. A memorable domain will strengthen your branding and help your audience find
your website.

This section will explain how to register and transfer a domain name.
Domain registration is the process of purchasing a domain from a domain name registrar for
a specific period. On the other hand, domain name transfer refers to the process of moving a
domain from one registrar to another.

How to Register a Domain Name

Start by opening a domain name generator. Use the following domain checker tool to check
if your desired name is still available.
To find the right domain, consider branding and cost. Make sure that it is memorable,
catchy, and fits your budget.
Popular domain names are often more expensive and might already be taken. Some
generators provide options if the domain you want is unavailable. With a hosting service
like Hostinger, users can choose a different top-level domain (TLD) with the same name or
an alternative.
If you choose to use Hostinger’s domain registration services, follow these steps:

1. Select your desired domain and continue to checkout.

2. Choose the registration period for your domain. The domain privacy protection is
included for free. It secures your personal information in the WHOIS database and
prevents identity theft through the WHOIS lookup tool.

3. Upon payment, access your new account.

4. Complete the registration process by entering the required information, including


your name and postal address.

After the domain registration is complete, you will have access to a control panel with all
the essential management tools.

UNIT-IV

What Is Electronic Commerce (E-commerce)?

Electronic commerce (e-commerce) refers to companies and individuals that buy and sell goods
and services over the internet. E-commerce operates in different types of market segments and
can be conducted over computers, tablets, smartphones, and other smart devices. Nearly every
imaginable product and service is available through e-commerce transactions, including books,
music, plane tickets, and financial services such as stock investing and online banking. As such,
it is considered a very disruptive technology.

Types of E-commerce

Depending on the goods, services, and organization of an ecommerce company, the business
can opt to operate several different ways. Here are several of the popular business models.

Business-to-Consumer (B2C)
B2C e-commerce companies sell directly to the product end-user. Instead of distributing goods
to an intermediary, a B2C company performs transactions with the consumer that will
ultimately use the good.

This type of business model may be used to sell products (like your local sporting goods store's
website) or services (such as a lawn care mobile app to reserve landscaping services). This is
the most common business model and is likely the concept most people think about when they
hear the term e-commerce.

Business-to-Business (B2B)
Similar to B2C, an e-commerce business can directly sell goods to a user. However, instead of
being a consumer, that user may be another company. B2B transactions often entail larger
quantities, greater specifications, and longer lead times. The company placing the order may
also have a need to set recurring goods if the purchase is for recurring manufacturing processes.

Business-to-Government (B2G)
Some entities specialize as government contractors providing goods or services to agencies or
administrations. Similar to a B2B relationship, the business produces items of value and remits
those items to an entity.

B2G e-commerce companies must often meet government requests for proposal requirements,
solicit bids for projects, and meet very specific product or service criteria. In addition, there
may be joint government endeavors to solicit a single contract through a government-wide
acquisition contract.

Consumer-to-Consumer (C2C)
Established companies are the only entities that can sell things. E-commerce platforms such as
digital marketplaces connect consumers with other consumers who can list their own products
and execute their own sales.

These C2C platforms may be auction-style listings (i.e. eBay auctions) or may warrant further
discussion regarding the item or service being provided (i.e. Craigslist postings). Enabled by
technology, C2C e-commerce platforms empower consumers to both buy and sell without the
need for companies.

Consumer-to-Business (C2B)
Modern platforms have allowed consumers to more easily engage with companies and offer
their services, especially related to short-term contracts, gigs, or freelance opportunities. For
example, consider listings on Upwork.

A consumer may solicit bids or interact with companies that need particular jobs done. In this
way, the e-commerce platform connects businesses with freelancers to enable consumers greater
power to achieve pricing, scheduling, and employment demands.

Consumer-to-Government (C2G)
Less of a traditional e-commerce relationship, consumers can interact with administrations,
agencies, or governments through C2G partnerships. These partnerships are often not in the
exchange of service but rather, the transaction of obligation.

M-Commerce
M-commerce stands for mobile commerce. The term refers to the purchasing and selling of
products and services using mobile phones and other wireless handheld devices. PDA’s
(personal digital assistants), for example, are handheld wireless devices.

Kevin Duffey coined the term ‘mobile commerce’ in 1997 at the launch of the Global Mobile
Commerce Forum. He said: “the delivery of electronic commerce capabilities directly into the
consumer’s hand, anywhere, via wireless technology. Many choose to think of Mobile
Commerce as meaning ‘a retail outlet in your customer’s pocket.’”

Business Dictionary has the following definition of m-commerce:

“Electronic commerce (e-commerce) transacted over mobile communication devices such as cell
phones or personal digital assistants (PDA).”

Difference between electronic and mobile commerce

E-commerce and m-commerce have similar meanings and goals. However, they are not identical.

When people perform e-commerce activities using laptops or desktop computers, they need to
find a place to buy and sell things.

With m-commerce, on the other hand, people ‘buy and sell on the go.‘ In other words, they use
their mobile devices and can do their business transactions anywhere, as long as are online.

E-commerce includes any type of online commerce, i.e., using laptops, desktop computers,
tablets, and smartphones. M-commerce only includes devices we carry around with us such as
smartphones and perhaps also tablets. In other words, electronic commerce covers all mobile
commerce activities and more.

“Usually, e-commerce activities are conducted with the help of desktop computers and laptops,
so users have to look for a place to do their transactions.”

“M-commerce implies the use of mobile devices, so people can do their business transactions
anywhere they go as long as they can access the internet on their smartphones and can perform
transactions with just a few taps on the screen.”

Marketing strategies on the web


A marketing strategy is a plan for reaching a specific marketing-related
goal (or goals) in a focused and achievable way. It takes into consideration what your business is
currently doing well and what you're missing in regards to the objective you set, so you're more
likely to accomplish it.
A website is a great marketing tool. It represents your business on the Internet and is one of
the most important digital marketing channels you can use to get more traffic or make more
sales.
Every business that wants to succeed online must have a clearly defined website marketing
strategy. This is no longer optional but a ‘must-have’ for businesses that want to survive in
the highly competitive online market.

In this post, you’ll learn what website marketing is, why it’s important to have a website
marketing strategy, and the 10 steps to follow to promote your website online successfully.

What is Website Marketing?

Website marketing is the process of promoting your website on the Internet. It is one of the
online marketing channels you can use as part of your overall digital marketing strategy. The
main goal of a website marketing campaign is to get more visits to your website.

Why Do You Need a Website Marketing Strategy?

As a Digital marketing manager, one of my tasks is to explain to my clients why they need a
complete website marketing strategy and how to make it work for the benefit of their
business.

#1 – It’s not about SEO and Social Media anymore

A few years back, marketers thought about SEO when someone was talking about web
marketing.Later, that perception changed, and social media came into the picture; it is very
common today to associate digital marketing with social media and SEO.

As you can see from the diagram below, digital marketing has many more pillars, including
content marketing, PPC marketing, email marketing, and more. Social media and SEO are
only part of the equation.

Digital Marketing
A well-planned digital marketing strategy will help you utilize all available channels for
promoting your business online.

#2 – You need a strategy and a plan

If you don’t write down your web marketing strategy that includes what you want to achieve
online and how to do it, it’s like driving with your eyes closed.

By preparing a strategy together with a plan, you will know exactly which tools to use, how
to use them, and what to expect as realistic results from each tool.

In addition, a plan makes it easier to communicate your goals within your business so that all
departments are aligned with your strategy.

#3 – Do it before the competition

Sooner or later, every business will get into the digital marketing game, and things will
become even more challenging. To get ahead of the game, you should take your online
promotion more seriously, and the best place to start is by creating a web marketing strategy.
1. Perform a website design review

Website Design Review Checklist


The first step is to create a website that accurately represents your business. This is not
directly related to the visual aspect of it (i.e., how it looks) but to the quality of the
information provided.

Your website is the same as your shop window. It should look good on the outside, and when
customers enter your shop, everything should be organized and in place.
Before starting any campaigns, take some time and review your website and make sure that:

It has a simple hierarchical site structure – A good site structure helps users and search
engines navigate a website to find the information they need quickly. As a rule of thumb, any
page on your site should be accessible from the homepage in 3 clicks or less.

It’s user-friendly and functional – Evaluate your website’s friendliness using the principles
of SEO-friendly web design and try to remove design elements that add complexity or are
not needed.

It has accurate information about your company and products – Make sure that it
provides users with everything they need to know about your company and products. Make
use of visual elements to get the attention of your users.

It’s fast and mobile-friendly – The majority of your users will come from mobile devices,
so test your website on mobile and optimize the experience of the user in the best way
possible

.2. Optimize your website for SEO

The next step is to start thinking about your SEO strategy. A well-defined SEO plan will
eventually increase your rankings and traffic from search engines.

SEO is the process of increasing your website’s visibility in search engines, and it consists
of several steps:
Technical SEO – Making sure that your website is free of crawl errors and other issues that
might keep search engines from indexing your website properly.

On-Page SEO – Make your webpages SEO-friendly and your content easily read by search
engine crawlers.

SEO Content – Writing content that satisfies the user’s intent.

Off-Page SEO – Promoting your website to get high-quality links from other websites.

Local SEO – Optimizing your website for location-aware searches and for getting more
clients to your brick-and-mortar store.

Besides the above standard SEO practices, you should also optimize your website for modern
SEO, like adding schema markup and optimizing your content for rich snippets .

3. Optimize your website for social media

Social Media Optimization Elements


The next step is to optimize your website for social media. This is not the same as social
media marketing (we’ll talk about this in step 5), but it has to do with the following:
 Having visual elements (images, video) on your website that can be shared on social
media networks.
 Adding social media sharing buttons on the pages you want to be shared on social
networks.
 Making sure that when a user clicks the share button (or shares your URL directly), the
generated snippet is well-formatted.
 Adding the necessary open graph meta tags and using image sizes and formats
supported by all major networks is recommended.

Many webmasters skip this step, and it’s a mistake that can negatively affect your social
media promotion efforts.

While it looks like it’s more technical and not marketing-related, it does play an important
role. If your website does not allow users to share your content properly, don’t expect any

social

media exposure.

5. Create a content marketing plan


The next step in your website marketing plan is to design a content marketing
strategy.Content Marketing Strategy

When you promote a website online, you essentially promote your website’s content, which
is why it is referred to as content marketing.

The main purpose of content marketing is to help you create the right type of content to
attract new users to your website and keep them engaged.

To create a good strategy, you first need to:

 Do your keyword research and determine which SEO keywords to target with your
content.
 Perform competitor analysis and find out what is working for your competitors.
 Analyze Google search results to determine what type of content Google wants for
your target keywords (length of content, images/video, etc.).

Once you have a list of topics/keywords, you should create a content marketing calendar to
specify when each piece of content will be published, who will write it, and how it will be
promoted after publication.

Companies that manage to have an ongoing content marketing campaign have more chances
of succeeding online than companies that publish content occasionally without a plan.

5. Promote your website on social media networks

Now that you have a constant flow of generated content, the next step is to start promoting
your website on different social networks.

Follow the steps below:

Create Business Accounts on Social Networks

Your first action is creating business pages in the social networks relevant to your business.

These are the networks that your potential customers might be using. The most common
suspects are Facebook, Twitter, Instagram, Pinterest, and LinkedIn.

Complete your Social Profiles


Next, make sure that your business pages are correctly configured and that all information is
appropriately filled in.

Link your website and social media pages

Then, add links to your social pages on your website (in the footer) and also add the relevant
schema (this will help search engines associate your website and the business pages
together).

Grow your social media following

Having a business page with no followers does not benefit your business.

You need to spend some time to find and connect with people that might be interested in
your business and also influencers in your niche.

Create a social media calendar

Social media success is based on the quality of your postings. You need to fetch your social
media networks high-quality content regularly. That’s the best way to get the attention of
users and create an audience for your brand.

A good way to start is to create a social media calendar (the same way you did with step 4
above) and specify what type of content to publish and when.
6. Use Paid Ads to reach more customers

PPC Marketing
As soon as you get started with SEO and social media marketing, you’ll realize one thing. It
takes time for SEO to work and to get a decent number of followers on social media
organically.

This means that if you want results faster, you need to add one more ingredient to your
website marketing and that is paid advertising.

With paid advertising, you can get targeted traffic fast and start making sales or conversions.

There are various advertising platforms you can use, but the most common are:

Google Ads – Target people based on the search terms they use on Google or show your ads
on other Google properties (YouTube, Gmail) and websites that participate in Google
AdSense.

Facebook Paid Ads – Promote your Facebook page, social media postings, or ads to people
using Facebook, Instagram, or Facebook Messenger.

Both methods are very effective but you should be careful not to waste a lot of money on
advertising without a return. Better start with a low budget and measure the effectiveness of
your campaigns and add more money as long as there is a positive ROI.
7. Utilize email marketing to engage with your audience

One of the most effective sales channels is email. In fact, one of the goals of your website
marketing campaign should be to grow your email list.

Having an active email list is a great way to get people back to your website, let them know
of new content, or directly sell them a product. Make no mistake; email is not yet dead.

To make the most of your campaigns, follow these email marketing tips:

Email Marketing Tips

 Make it easy for users to subscribe to your list – add the newsletter sign-up box in
places that are visible while users are browsing the website
 Give them incentives (like a free ebook or free resources) – Freebies can make a big
difference in how many people will sign up for your newsletter
 Keep your promises – if you promise weekly updates, make sure that you send an
email with new tips weekly.
 Don’t abuse their trust – Users trust you with their email addresses, and while you
can use automation to send personalized mass emails, don’t abuse their trust.
Everyone’s inbox is already full of promotional emails, so think about when to send
them another.
8. Use remarketing to get users back to your website

Do you know what the rule of 7 is?

It’s a rather old marketing rule which states that a potential client should see or hear an ad (or
message) at least 7 times before they’ll take action to buy a product or service.

This applies to internet marketing as well. In website marketing terms, this means you need
to get users to revisit your website several times before they proceed to the next step of
your digital marketing funnel.

Publishing new content frequently and using social media marketing and email marketing are
all great ways to achieve this, but there is one more method that is highly effective and this
is remarketing.

Retargeting / Remarketing Ads


With remarketing, you use advertising platforms (either Google Ads, Facebook, or even
Twitter) to re-connect with people that visited your website at least once.

This has a number of advantages, including more targeted traffic, lower advertising costs,
and higher conversion rates.

9. Keep your website and content up-to-date and move forward

When you do website marketing, you should not forget two important things:
First: To keep your website up-to-date

This means upgrading your website software to the latest version, ensuring that your website
is secure and uses the latest technologies.

Second: To keep your content fresh and relevant

Besides publishing new content targeting specific keywords and increasing your organic
reach, you also need to go back and audit your existing content.

As your website gets bigger and older, some of your content will become outdated, which is
not good for users or search engines.

The first step of the process is to find thin content pages. These are pages that have no
rankings, backlinks, or traffic.

Maybe the content on those pages is good, but since they don’t rank for anything, they don’t
offer any real value to your website. As part of the audit, you should decide to either:

 Update and republish them


 Remove them and redirect the URL to other related pages on your website
 Merge them with other pages

The second step is to review your Google Analytics and Google search console reports and
find out which are the most popular pages of your website.

A page with high rankings now does not mean it will maintain those rankings forever. The
competition is big and chances are that new pages are published daily targeting exactly the
same topics.

To ensure you will not lose your rankings, you need to review your top pages once every few
months and ensure that the content is still relevant and up-to-date.

10. Measure, analyze, rinse, and repeat

No marketing strategy is complete without proper monitoring. Everything can be measurable


and analyzed in the digital marketing world, so having the right tools and metrics in place is
important.
In most cases, you can get the data you want from Google Analytics, so you must ensure that
you have Google Analytics installed on your website and properly configured.

The most common goals of a website marketing campaign are to:

 Get traffic to your site


 Increase conversion (makes sales, gets new email subscribers, etc.)

These goals should be tracked in Google Analytics and analyzed so that you can make the
right decisions.

For example, if you notice that posts covering certain topics perform better than others, you
should focus your marketing efforts on creating content around those topics.

Virtual stores
What is a Virtual Store?
A virtual store is an e-commerce enterprise powered by Extended Reality. Virtual stores use
various modern technologies such as Virtual and Augmented Reality, holographic displays, and
3D models. They immerse customers in the VR shopping experience and provide lots of
possibilities to present products to users.

Virtual stores should be distinguished from conventional websites. Both are e-commerce
technologies but offer different mechanics of user engagement and product demonstration. Of
course, virtual stores provide more visibility and involvement.

Customers feel like they are inside a physical store and can virtually interact with products. The
development of different virtual scenarios makes the customer journey easier and more
personalized, pushes visitors to make a purchase, and helps reduce returns.

Types of Virtual Stores

Virtual stores differ in the type of interaction their offer, with customers and with the real world:

 Virtual try-on. Such stores use AR and VR to allow customers to try on products without
a physical connection with them. This helps consumers feel more confident they will
choose what really suits them. A good example is a virtual fitting room for a clothing
brand.
 Virtual try-out. With Augmented Reality, technology users can check whether items
match their surroundings and choose the right size and color. This approach is often used
with furniture and interior design.
 Virtual Reality store. Using special headsets, customers enter a virtual version of a real
shop. They can move around a store, examine products on the shelves, interact with
items, and make purchases.
 Visual search. AI-powered technologies allow users to find items if they don’t know their
names or can’t explain what exactly they are looking for. For example, AI can help when
a user wants to find an outfit similar to one she saw on the street but doesn’t know where
to find it.
 360-degree view. This is a catalog where, instead of 2D images, customers see 3D
models of products. It allows for looking at items from different angles and provides a
realistic interaction experience.
 3D stores. Such stores represent websites where users interact with a 3-dimensional
environment that resembles a physical room. Customers can navigate through the store
using arrows and interact with 3D product models.

The diversity of virtual stores covers various areas of interest and brings as many goods as
possible into the virtual environment. Thanks to its numerous benefits, more and more brands are
adopting the virtual shopping experience.

What are cookies on websites?

Cookies are small files of information that a web server generates and sends to a web browser.
Web browsers store the cookies they receive for a predetermined period of time, or for the length
of a user's session on a website. They attach the relevant cookies to any future requests the user
makes of the web server.

Cookies help inform websites about the user, enabling the websites to personalize the user
experience. For example, ecommerce websites use cookies to know what merchandise users have
placed in their shopping carts. In addition, some cookies are necessary for security purposes,
such as authentication cookies (see below).

The cookies that are used on the Internet are also called "HTTP cookies." Like much of the web,
cookies are sent using the HTTP protocol.

What are the different types of cookies?

Some of the most important types of cookies to know include:


Session cookies

A session cookie helps a website track a user's session. Session cookies are deleted after a user's
session ends — once they log out of their account on a website or exit the website. Session
cookies have no expiration date, which signifies to the browser that they should be deleted once
the session is over.

Persistent cookies

Unlike session cookies, persistent cookies remain in a user's browser for a predetermined length
of time, which could be a day, a week, several months, or even years. Persistent cookies always
contain an expiration date.

Authentication cookies

Authentication cookies help manage user sessions; they are generated when a user logs into an
account via their browser. They ensure that sensitive information is delivered to the correct user
sessions by associating user account information with a cookie identifier string.

Tracking cookies

Tracking cookies are generated by tracking services. They record user activity, and browsers
send this record to the associated tracking service the next time they load a website that uses that
tracking service.
Zombie cookies

Like the "zombies" of popular fiction, zombie cookies regenerate after they are deleted. Zombie
cookies create backup versions of themselves outside of a browser's typical cookie storage
location. They use these backups to reappear within a browser after they are deleted. Zombie
cookies are sometimes used by unscrupulous ad networks, and even by cyber attackers.

E-commerce Issues

Overview :
E-commerce is the evolution in technology, the buying and selling feature online not only have
shown growth in the online business but also allows customers to have a variety of choices for
buying their products. Now, customers can get the same product in a variety of ranges with a
variety of brands anywhere and anytime. Buying and selling now are not only limited to a
specific region or state, anyone can buy from anywhere in the world.
Issues in e-commerce :
E-commerce, or electronic commerce, is the buying and selling of goods and services over the
internet. While e-commerce has become increasingly popular and convenient for consumers and
businesses alike, it also comes with several issues and challenges that must be addressed to
ensure its success. Here are some of the most common e-commerce issues:
Privacy violation –
 Many times we heard that companies have sold the personal details of their customers. This
is a very common issue nowadays even sometimes we allow sites to fully access our devices,
and also when we fill personal details in our account section these details can be used for
many purposes.
 E-commerce also keeps track of our online activity or product preferences and product listing
based on this information they recommend products to us and advertise on platforms which
we use like Facebook, Instagram, and many more.
 privacy invasion can also be done when there is low security in the e-commerce site. hackers
can hack the servers of e-commerce sites and gets personal information of users like credit
card details, phone number, and passwords.
Website spoofing –It is a technique to create the same lookalike website as other websites.
When the user by mistake types any other word in place of the original word they land on a page
that is the same as the original website. Or when a link is circulated among a group of persons of
the fake website they basically contain malicious code or they lure customers to buy their
product and give their personal details.
Online piracy –It is unauthorized copyright of the original property. Many sites provide free
copyright e-books, e-music, e-movies which are unethical. Sometimes original trademarks are
used to sell fake products. It is basically the use of other’s content without their permission or
without any right to download and distribute it. It has become the most dangerous threat to
content owners.
Email-spamming –Email spamming is a very common way to defraud users. This technique is
also known as phishing. In this, spammers sent emails to customers and lure them with products
and exciting offers. They tempt users to purchase their products and give their personal details on
their fake websites. Sometimes these emails are marked as spam mails but most often when we
give personal details such as name, email, phone number then they can easily send their mails to
defraud users. It is also known as junk mails.
Security: Security is a significant issue in e-commerce. Customers must trust the online store
they are purchasing from and be confident that their personal and financial information is secure.
Online businesses must ensure that their payment systems are secure and that they have strong
measures in place to protect customer data.
Fraud: E-commerce is vulnerable to fraud. Fraudsters may use stolen credit card information to
make purchases or create fake websites to deceive customers into sharing their personal and
financial information. Online businesses must be vigilant in detecting and preventing fraud, such
as implementing security measures like two-factor authentication.
Privacy: Privacy concerns are another issue in e-commerce. Customers may be hesitant to share
their personal information, such as their name, address, and email, with online businesses.
Companies must be transparent in their data collection and use policies and provide customers
with clear options for opting out of data collection.
Shipping and delivery: Shipping and delivery can be a major issue in e-commerce. Customers
expect timely and reliable delivery of their purchases, and online businesses must have efficient
logistics systems in place to meet those expectations. Unexpected delays, lost shipments, or
damaged goods can lead to dissatisfied customers.
Customer service: E-commerce companies must provide high-quality customer service to retain
customers and build a positive reputation. Customers expect prompt responses to their inquiries
and concerns and easy returns and exchanges if necessary. Online businesses must have efficient
customer support systems in place to address customer issues.
Competition: E-commerce is a highly competitive industry, and online businesses must
differentiate themselves from their competitors to succeed. They must offer unique products,
excellent customer service, and attractive prices to stay ahead of the competition.
Regulatory compliance: E-commerce companies must comply with a range of regulations, such
as data protection laws and tax regulations, depending on their location and the locations of their
customers. Failure to comply with these regulations can result in legal and financial
consequences.

Advantages of E-commerce:

Convenience: Customers can shop from anywhere and at any time without leaving the comfort
of their homes.
Increased Sales: E-commerce can help businesses increase their sales by reaching a wider
audience, offering more products, and simplifying the purchasing process.
Global Reach: E-commerce enables businesses to reach a global audience and sell their
products and services to customers in different parts of the world.
Reduced Costs: E-commerce can help businesses save money on overhead costs, such as rent,
utilities, and staffing.
Personalization: E-commerce platforms can use data analytics to offer personalized product
recommendations, discounts, and promotions to customers.

Disadvantages of E-commerce:

Lack of Personal Interaction: Customers may miss the personalized experience of shopping in
person and interacting with sales associates.
Security Threats: E-commerce platforms are vulnerable to security threats, such as data
breaches, hacking, and fraud, which can compromise customer data and harm businesses.
Technical Issues: Technical issues, such as website downtime or slow page load times, can
frustrate customers and harm businesses.
Dependence on Technology: E-commerce businesses are heavily reliant on technology, which
can be prone to glitches and failures.
Competition: E-commerce has made it easier for businesses to enter the market, which can
increase competition and make it harder for businesses to stand out.

The Future of Ecommerce in 2022

Since a lot of things are expected to change in this industry over the coming years, let’s talk
about some of the most exciting ecommerce trends that we’re looking forward to in the future.
We believe that these trends will result in even faster growth of the industry and will bring about
some impactful changes.

1. ‘New Normal’ in Ecommerce

The coronavirus has made an immense contribution to the sudden growth of the ecommerce
industry. When COVID19 was first declared as a global pandemic, people started stocking up.
The panic-buying behavior of the masses meant they wanted to get their hands on things as fast
as possible. As store supplies started to run out, ecommerce transactions went up because people
desperately needed alternatives.
This is further reinforced by a survey done by Search Engine Land which showed that consumers
are spending 30% more online. With such reliance on ecommerce, online stores and businesses
are also continually evolving. From partnering with better ecommerce hosting providers to
working on more convenient online store experiences, there’s a lot that we can expect from the
future of e-business.

2. Automated Shipping for Speedy Delivery

When we talk about the future of ecommerce, the potential of automated shipping cannot be
ignored. As more customers buy online, the need to open strategically located fulfillment centers
has been significantly increasing to deliver orders in the shortest amount of time.

Automated shipping is definitely one of the most important ecommerce future trends that you
should look out for and aim to optimize your store with. Not only will this take away the
worrisome task of aligning shipments, it will also result in faster and timely deliveries to your
customers.

Many shipping automation software like ShipperHQ, ShippingEasy, and Shippo are now widely
available to be purchased and integrated directly with your ecommerce stores. There has never
been so much competition on fast delivery times before, but using these automated shipping
software, you can now lead your competitors.

3. Synchronized Physical and Digital Connection

Synchronizing your brick and mortar store with your digital store is also one of the up and
coming ecommerce future trends. There’s no denying the fact that online sales are increasing
faster than ever. But that doesn’t mean that brick and mortar stores are losing their value.
If you have a physical and an online store, you can hop on this synchronization trend where you
offer the same products, but different experiences to your customers. For example, Nike has
completely transformed the in-store experience for its customers. Customers now can customize
products, participate in in-store activities and try-out exclusive products, all things that are not
possible on a digital space.

Moreover, ecommerce-friendly PoS systems like Lightspeed, Square, and Revel are also
becoming increasingly popular which allows you to seamlessly integrate your online store with
your physical in-store PoS systems.

If you create two different experiences for your customers online and at your physical shop, you
will ensure great ecommerce future growth. In addition, you will be able to gauge old and new
customers alike and offer them something unique.
4. More Convenient Payment Methods

With ever-growing global digitalization, it is only fair that new and more convenient ways of
making payments are emerging. Ecommerce stores have also come a long way from only
offering credit/debit cards, bank transfers or cash payments.

With so many new payment gateways in the market like PayPal, Stripe and 2Checkout,
ecommerce business owners can now integrate these payment gateways into their platforms,
providing their customers the ease and convenience of making payments in a matter of seconds.

New and convenient payment methods are one of the hottest ecommerce future trends. If you’re
an ecommerce business owner, we’d suggest you follow this trend closely and give your
customers the best and easiest ways to make payments online.
5. Surge in Mobile Ecommerce and Increased Sales

When it comes to the future of ecommerce, mobile usage is a trend that has been significantly
increasing every year. According to Statista, the mobile ecommerce sales share in total
ecommerce sales has increased from 52.4% in 2016 to 72.9% in 2021.

This surge in mobile ecommerce can be attributed to the convenience of making purchases from
mobile devices. All major ecommerce platforms now have an application, which saves time, and
also offers exclusive offers to customers. Moreover, with seamless payment gateway
integrations, making payments for your purchased products has also become easier than ever.

However, there is still some ground that needs to be covered. Some customers believe their
experiences could be improved if the pages and links weren’t so small to click on. Another
concern for these customers is the lack of information and product reviews available on some
online platforms. These areas of improvement make mobile ecommerce one of the hottest
ecommerce future trends that companies could really work on.

Want to start your online ecommerce store?

Try Cloudways for faster performance, managed security, and 24/7 support.
Get Started Free

6. Personalized Communication and Customer Service Through AI and Chatbots

According to a Gartner survey, AI and machine learning will handle 40% of all customer
interactions by the year 2023. This means that the future of ecommerce holds a lot of room for
growth when it comes to AI and chatbots.

More and more ecommerce businesses are starting to incorporate chatbots into their online stores
because of the convenience they offer to the customers as well as the businesses. According to
Juniper Research, chatbots will save 2.5bn hours for customers as well as businesses by 2023.

Although AI is still in its early stages, it has seen a lot of progression over the last few years and
this trend will continue to grow further especially in the ecommerce industry as the AI
technology continues to adapt and evolve.

7. Search Through Visual Stimuli

Visual lookup is a feature that will contribute a lot in the ecommerce future growth and in the
buying convenience for customers. Applications like Google Lens or the Image Search feature in
Google allow you to identify products you see around you, using its picture. For example, you’re
walking around a park and you see a flower that you want to purchase. Take a picture, and search
for the flower on the internet using visual lookup. Now you can locate a store nearby and buy the
flower.
Searching through visual stimuli is a trend that is still in its developmental stages and there’s
room for a lot of refinement. As time passes, this feature is also becoming increasingly popular.
With the release of the new iOS15, visual lookup can now be used on your iPhones as well. If
Apple and Android developers continue to improve this feature, then there’s no doubt that soon a
large amount of people will be using this feature for their day to day online shopping.

8. Alignment of Goals with Social Initiatives

People all over the world are becoming increasingly aware of their individual impact on the
planet and how they can contribute in its minimization. Therefore, many ecommerce businesses
are now aligning their goals with social initiatives. Not only is this practice great for their
ecommerce future, but it’s also needed due to the environmental threats our planet is facing.
Customers today don’t just buy a product, they also look for the social contribution they can
make from their purchases. Many companies like Apple, Nestle etc. are working hard to
minimize their impact on the environment by reducing the use of plastic in their products.

The general sense of awareness amongst customers coupled with these initiatives will definitely
make the future of ecommerce brighter and more importantly, the future of our planet, a whole
lot better.

9. Machine Learning Taking Customer Experience to A Whole New Level

The introduction of AI and machine learning is here to revolutionize the future of ecommerce.
Ecommerce stores are now incorporating machine learning technology on their websites to
enhance their customers’ experiences.
Machine learning is starting to play a major role in the ecommerce industry. With this
technology businesses can now show product recommendations based on customer’s buying
behavior and the pages they visit. Moreover, AI and machine learning is also helping in giving
customers a visual experience of the product in the form of 3D models, online tours, etc.

When it comes to the future of e-business, it’s safe to say that the use of machine learning to
enhance online customer experiences will become one of the hottest ecommerce trends, one that
ecommerce businesses will greatly benefit from.
10. The Impact of Apple iOS14 and iOS15 Updates in the Long Term

Believe it or not, but things as small as an iOS update can impact global ecommerce trends at
some level. As of 2020, there are over 1 billion Apple device users all over the world. That
number is enough to make a change in an industry’s dynamics.

With each new iOS, Apple tries to strengthen their privacy measures and give its users more
control of the information that is being shared with third-parties and applications. These updates
can have a great impact on the future of ecommerce.

In iOS 14, Apple introduced a new privacy feature which gave users the option to choose the
amount of information they would like to share with applications. This means that many
ecommerce businesses who have apps and use data from those apps for marketing, might not
have access to key customer insights.
These privacy-related updates harm ecommerce businesses at some level because they’re losing
control of the information they can extract from their applications, in order to tailor their
marketing campaigns.

Nevertheless, it’s not all bad when it comes to these updates. New updates have also resulted in
better Apple Pay integrations, faster load-time for applications and an overall, more convenient
and faster ecommerce shopping experience.

Blogs:
Blogs are a type of regularly updated websites that provide insight into a certain topic. The word
blog is a combined version of the words “web” and “log.” At their inception, blogs were simply
an online diary where people could keep a log about their daily lives on the web.
Uses of blogs:

 To help your company rank on search engines.


 To share information about a given topic and become an expert in an industry.
 To attract visitors to your site, and turn those visitors into leads.
 To cultivate an online community and engage with an audience.

STEP FOR BLOGGINGS:
 Starting a blog isn’t difficult or complicated. People postpone getting started for a variety
of reasons. Some think it’s too technical and confusing, while others talk themselves out
of it because they think they can’t compete in a crowded marketplace. Some never get
started because they can’t decide for sure what they want to blog about, while others hold
themselves back through fear of failure.
 None of these self-constructed roadblocks need to continue to hold you back.
The blog that you create will be unique and a great way to share information with other
people who have similar interests.
 You don’t need technical expertise or a ton of money. You just need to overcome
whatever has been stopping you from getting started.
 Overview of the Steps Needed to Start a Blog
 Whether this is your very first blog or a new start after other attempts, the best approach
is to make the process as simple as possible and just get started one step at a time.
 You can start your blog in just 5 simple steps:
 1. Choose a topic
 2. Name your domain
 3. Choose a blogging platform
 4. Choose your hosting and theme
 5. Plan and write content
 Read on for more detailed information about what is involved in each step.
Step One: Choose Your Topic

If you are starting a blog to create a web presence for an offline business you already have, the
step of choosing your topic is already done. If you're starting from scratch, you may not yet
know what you want to blog about.

A good approach to choosing a topic is to get in touch with what you are most passionate about.
What are you constantly reading or talking about to the point others wish you would stop talking
about it?! What excites you enough for you to want to write about it day after day without getting
bored?

If you choose a topic that is very broad, there’s a good chance you can’t compete with bigger
websites that are covering the same topic. You may need to narrow it down to a specialty. For
example, you are likely to have more success blogging about losing belly fat than weight loss in
general, or to blog about cultivating roses rather than just to blog about all aspects of gardening.

Choosing a topic comes easily to some but is more challenging for others. Don’t get hung up on
this step too long. If you start with one topic and find it’s going nowhere, you can always start a
different blog. The important thing is to get past your reluctance to get started.

Step Two: Choose a Domain Name

Purchase a domain from a site like GoDaddy or NameCheap. If possible, use a keyword that
you are targeting in your domain name.

A keyword is a word that people will type into a search engine to search for a topic. A simple,
memorable title for your blog is a good idea rather than something complicated or difficult to
spell. It’s usually better to leave hyphens out of your domain name.

It’s always better to use a domain that ends with dot com (.com) rather than dot net (.net) or dot
anything else. If readers remember the name of your blog but not what comes after the dot, they
will always try .com first.
Step Three: Choose a Blogging Platform

There are several different blogging platforms to choose from, and they vary in the amount of
experience required to use them effectively. It’s a good idea to choose a platform which is
flexible and will allow for any future changes you may want to make.

Some of your choices include:

WordPress.org – This is a self-hosted blogging platform, and probably the most popular of all
the blogging platforms. It offers plenty of functionality, themes, plugins and community support.

WordPress.com – This is a free blogging platform that is a great choice for beginners because it
is easy to learn while you are first getting started. Like other free platforms, it will run ads on
your site, and you never actually own your site, because WordPress can shut your site down if it
chooses to.

Blogger – This is another free platform that can get you started if you have absolutely no
blogging experience. Like WordPress.com, your blog isn’t actually owned by you and has
limited options for tools or support.

Squarespace – This is a user-friendly platform offering drag and drop website building for
beginners.

Wix – This is another platform that uses drag and drop tools to simplify the process of building a
website.

Joomla – This is an open source content management system. Like WordPress.org, it’s a self-
hosted option with plenty of templates but not as much community support as WordPress.

If you do choose a platform that is free so that you can get started and get some experience,
remember that there will be ads on your site that will detract from your message. If you do
choose this path, you don’t have to purchase a domain name and hosting.

For a professional site, choosing a platform in which you host your own blog is probably your
best bet.

Step Four: Choose Your Hosting and Theme

Once you have chosen your domain name and your hosting, you will be able to put your blog up
online and install a theme. A theme is a template that can enhance the appearance of your blog.
Your blog will come with access to some free themes. You can choose one of them, or you may
wish to purchase a premium theme.
If you have chosen WordPress as your blogging platform, there are plenty of tutorials available
to help you go through the process of installing a theme, and there is also an active and
supportive community to help with any confusion you may have.

If you chose a different blogging platform, both your web hosting provider and your blogging
platform should offer support to walk you through the technical part of installing a theme.

There are many different plugins that can help improve the functionality of a WordPress blog.
Some enhance the experiences of those who are visiting your blog while others help you manage
it behind the scenes. Within the WordPress dashboard, you can search for the type of plugins you
are looking for, such as a contact form, photo dropper or editorial calendar.

Certain themes may require that certain plugins be installed in order for the theme to work. If
that’s a requirement, the theme will make it clear which plugins to install. Two plugins that are
recommended for just about every WordPress blog are Akismet, which prevents comment spam
from overtaking your blog, and Yoast SEO, which helps you to optimize your blog for search
engines.

Step Five: Plan and Write Your Content

Once you have set up your blog, it’s time to get writing. An editorial calendar can help you plan
your content ahead. Think about your target audience and what they want to read about, and then
get started writing content that is relevant to your niche. Whatever you post, stay focused and
relevant, or your audience will lose interest.

You can write posts ahead of time and use your blogging platform to schedule content to be
posted on the date and time that you want.

While it isn’t necessary to write a blog post every day, it’s a good idea to blog regularly. People
who are interested in your topic and find your blog will want to see new content on a fairly
regular basis. You will build up a following more quickly if you post frequently.

The more you blog, the more your writing will improve and the better you will get at knowing
what to write about. Make a commitment to your blog. Interact with other bloggers and learn all
you can about the world of blogging.

Use these five steps to get started as a blogger and make sure to post regularly, engage with
anyone that reaches out either through social sharing or posting a comment and keep track of
analytics so you know what content is resonating with your audience.

Above all, keep practising and posting and you will continue to improve your blogging skills.
What is social networking?

Social networks are websites and apps that allow users and organizations to connect,
communicate, share information and form relationships. People can connect with others in the
same area, families, friends, and those with the same interests. Social networks are one of the
most important uses of the internet today.

Popular social networking sites -- such as Facebook, Yelp, Twitter, Instagram and TikTok --
enable individuals to maintain social connections, stay informed and access, as well as share a
wealth of information. These sites also enable marketers to reach their target audiences.

SOCIAL MEDIA ETIQUETTE:


Social media etiquette refers to the guidelines that companies and individuals use to preserve
their reputation online.

As social media channels have evolved to become one of the primary ways people communicate
in the modern world on a daily basis, typical social rules are finding their way into digital
environments.

Just as social etiquette dictates how people behave around others in the real world, social media
etiquette revolves around online guidelines to follow.

The basics of social media etiquette

The demands of social media etiquette differ from one platform to the next. For example,
reposting someone’s content on Instagram requires much more care than retweeting someone on
Twitter.

On the flip side, there are some basic dos and don’ts that essentially apply to all platforms:

 Don’t be overly promotional. Try not to message all your customers asking them to buy
your products and avoid sharing constant advertisements on your page. Make your social
profiles a blend of promotional and valuable content.
 Avoid over-automation. While scheduling your posts in advance and automating
analytics is helpful, don’t automate everything. Some things still need a human touch.
 Handle your hashtags carefully. Avoid using too many hashtags at once. Even on
Instagram, where you can use 30 hashtags in a single caption, it’s important not to overdo
it.
 Don’t bad-mouth your competition. Don’t be petty. Saying negative things about your
competitors online will harm your reputation more than it hurts theirs.
 Be authentic and genuine. Don’t try to be something you’re not. Remember that your
customers can learn whatever they need to know about your brand online today and
things like authenticity can definitely go a long way.
Why is social media etiquette important?

Organizations can’t just delete messages that generate poor reactions anymore. A single mistake
can make or break a business.

Social media etiquette is often baked into the rules of a social media policy for modern brands.
This policy usually shares a complete code of conduct for anyone who interacts with a social
channel:
 Protect against legal and security issues. If you exist in an industry with stringent
privacy and compliance laws, your system will keep you on the right side of the
regulations.
 Empower staff. When your employees know how to share content safely online, they
can represent and advocate for your organization, without harming your reputation.
 Defend your brand. Social etiquette ensures that everyone who interacts with your
brand on social media will see a respectable, professional business.

What is internet security? - Definition and meaning

Internet security is a term that describes security for activities and transactions made over the
internet. It’s a particular component of the larger ideas of cybersecurity and computer security,
involving topics including browser security, online behavior and network security. We spend a
large proportion of our lives online, and some of the internet security threats we can encounter
include:

 Hacking, where unauthorized users gain access to computer systems, email accounts, or
websites.
 Viruses or malicious software (known as malware) which can damage data or make systems
vulnerable to other threats.
 Identity theft, where criminals can steal personal and financial information.
THE IMPORTANCE OF INTERNET SECURITY

These days we do everything online, our computers, laptops and smartphones have become an
extension of ourselves so ensuring we have the best internet security is a way of knowing that
our identities, documents and passwords are not compromised.

With the internet came a selection of fraudulent activities from identity thieves to people who
hack computers and steal private passwords, documents and files. The fact we do everything
online only opens us up to these frauds and makes us sitting victims, unless you have taken the
necessary steps to protect your computer to the best of your ability.
It still surprises me how many people don’t bother with internet security. They seem to think that
their computers are invisible, but as soon as you start using your computer for anything that
involves logging onto the internet you are easy prey.

The safest method is to buy good internet security software, a program that will immediately
remove viruses, advice you when you are browsing the internet and click on a malicious site and
one that does regular scans of your computer to detect any damaging materials which may
compromise both you and your computer.

TAKE RELEVANT STEPS TO PROTECT YOUR COMPUTER

Over the years you have heard of these dangerous viruses, ones that will completely crash your
computer, wipe your computer clean, steal your private passwords and give the fraud access to
your personal information. Unfortunately there is no way of completely ridding yourself of these
frauds, they will send you emails, try and hack your passwords and access your accounts, but if
you have taken the relevant steps to protect your computer, you have nothing to worry about.

Internet frauds come from all backgrounds and all age groups and for some reason they feel the
need to post malicious software on the internet to cause serious damage. So many people become
victims as they didn’t have the right internet security in place. This means they lose all their
important documentation, they lose their operating systems and their computers won’t even boot
up. This results in the entire computer being formatted clean and reinstalled an inconvenience
that no one wants to bear.

HERE’S A TOP ’10’ LIST OF THINGS


YOU SHOULD BE DOING!
 Passwords – Keep your passwords secure. Don’t share them with anyone and ensure that they
can’t be easily guessed.
 Software – Install security software on your computer and mobile, set it to scan regularly and
ensure it’s kept up to date. If your devices are not already protected, most virus protection
programs offer a free trial.
 Phone calls – Be wary of calls you’re not expecting, requesting personal information, or access
to your computer. If in doubt, ask for a reference number and call the company from a number in
a public phone directory to ensure it’s genuine.
 Social networking – think before you post photos, financial or personal information about
yourself, your friends or family online. And regularly adjust privacy settings.
 Buying online – take care when transacting online – research the supplier and use a safe
payment method.
Email – carefully assess before clicking links and attachments, particularly from unknown
senders and keep up to date with the latest information on scams.
 Mobile – protecting your mobile from viruses, malware, and Internet fraud is just as important as
protecting your home computer.
 Check and report – Check bank statements and account records carefully to detect anything
unusual. If you see something suspicious or don’t recognise a transaction, contact the Bank
 Share the knowledge – Talk with your family and encourage them to report anything that makes
them uncomfortable. Register for an Alert Service for regular updates on the latest threats. Check
with your local bank, they probably have one.

THREATS INTERNET:
The internet has revolutionized the way we live, work, and communicate. However, it has also
brought with it a host of new threats that can compromise our privacy and security. These threats
come in many forms, from hackers and cybercriminals to viruses and malware.
One of the most significant threats on the internet is cybercrime. Cybercriminals use various
methods to steal personal information, financial data, and other sensitive information from
individuals and organizations. They may use phishing scams, malware, or other tactics to gain
access to their victims’ accounts or systems.
Another common threat on the internet is malware, which is software designed to damage or
disrupt computer systems. Malware can take many forms, including viruses, worms, and Trojan
horses. It can infect computers through email attachments, downloads, or other means and can
cause significant harm to individuals and organizations.
Other threats on the internet include identity theft, cyberbullying, and online harassment. These
can have serious consequences for victims, ranging from financial loss to emotional distress.
There are many types of threats information systems face today. Accidents, software errors,
hardware failures, or environmental influences such as fire may affect business’ operation. Each
of these threats require proper planning and range of activity to resolve.
Perpetrator of criminal threats often take control of communication systems. Malicious threats
can also be internal or external to organization. Activity may be from an individual, loosely it
group, organized criminal elements, Corporations, or governments. While motive and criminal
threats is important in evaluating risk, any attack against information and Infrastructure of
business can cause severe disruption and may result in loss of funds, productivity, market share,
or reputation.
Criminal activity against information systems is growing. This increase is partly due to:
 Traditional business are increasingly moving to computer- based operations.
 General knowledge of basic computer concepts and possibilities for exploitation are
becoming pervasive within public.
 Increased connectivity and ineffective security controls allow greater access to information
and services while providing anonymity.
 Some elements of stereotype amateur “hacker” are evolving into more criminally motivated
activities.
Almost every type of crime in physical world has or probably soon will have an online,
computer-based counterpart. In fact, networks become another tool which often become easier
criminal targets. With this said, there are several fundamental criteria for most profit motivated
criminals to use information systems.
Information systems provide low level of authentication and therefore higher degree anonymity.
This lessens chance of arrest in some cases, even though the crime is detected.

Today, criminal activity against information systems can be categorized as follows :


1. Low-Level Intruders –
This group images up a subset of stereotypical “hacker”. These individuals may evolve from
online trespass and vandalism to more criminal activity such as theft of information,
extortion, and credit card fraud. In addition, this group has a pool of potential resources for
more conditional criminal elements to exploit either directly or indirectly.
For example, in 1995, loosely knit group of low-level “hackers” was arrested for using
computer systems to steal credit card numbers. These numbers were sold to European-based
organized crime groups for telecommunication fraud.

2. For-Profit Fraud –
Online activity of this group is highly variable and may include scams, extortion, deceptive
advertising. theft, securities fraud or illegal fund transfers. Many of these cases are classified
as computer assisted crimes. In other words, information systems are used as tool, not target.
For example, document fraud was involved in multi-million dollar case involving theft from
a pair of California banks last year using desktop publishing software and equipment to
create false payroll checks.

3. Organized Crime –
Many elements of organized crime are recognizing that they need to understand and use
information systems to maintain their traditional level of influence and revenue. Motivation
for organized crime to become involved in high technology information systems goes beyond
simple fraud and extortion to include surveillance of law enforcement, money laundering,
and secure and anonymous communication.
4. Fringe Groups – Political, Religious, and Anarchists –
Although this group rarely has fraudulent motives, there has been an increased use of
information systems by some groups to further their agendas. Most of the attacks in this
arena are in either theft of information or denial of service attacks.
A recent example was the attempt by German Chaos Computer Club to disrupt French
telecommunications and Internet infrastructures to protest against French Nuclear Testing.

5. Industrial Espionage and Sabotage –


Because few companies report cases of industrial espionage, accurate statistics are difficult to
produce.

6. International Espionage and Information Warfare –


Several well documented cases have come to light of national intelligence agencies gathering
economic information to assist their nation’s businesses in competitive situations. Some of
methods for gathering this information have extended into attempts to access information and
communication systems.

7. Terrorism –
Several indicators have been discovered that traditional terrorist organizations are viewing
information systems as both potential tools and targets. In particular, ability to gather
targeting information from credit records, financial institutions and healthcare providers
appears to be an increasing threat recently demonstrated by IRA.
Types of Threats on Internet :
There are several types of threats on the internet, including:
1. Malware: Malware is malicious software that is designed to disrupt or damage computer
systems. It includes viruses, worms, Trojan horses, ransomware, and spyware.
2. Phishing: Phishing is a tactic used by cybercriminals to steal personal information, such as
usernames, passwords, and credit card numbers. This is often done by sending emails or
messages that appear to be from a legitimate source, but are actually designed to trick the
recipient into giving up their information.
3. Hacking: Hacking involves gaining unauthorized access to a computer system or network.
This can be done through exploiting vulnerabilities in software or using social engineering
tactics to trick users into giving up their login credentials.
4. Denial of Service (DoS) attacks: A DoS attack is designed to overwhelm a computer system
or network with traffic, making it unable to function properly. This can be done by sending a
large number of requests to a server, or by flooding a network with traffic.
5. Social engineering: Social engineering is the use of psychological manipulation to trick
users into giving up their personal information. This can include tactics such as phishing,
pretexting, and baiting.
6. Botnets: A botnet is a network of compromised computers that can be used to carry out
various malicious activities, such as DDoS attacks, spamming, and stealing personal
information.
7. Insider threats: Insider threats involve individuals within an organization who use their
access to confidential information for malicious purposes, such as stealing data or causing
damage to the network.
Issues of Threats on Internet :
Threats on the internet can have a wide range of issues, including:
1. Financial loss: One of the most significant issues of internet threats is financial loss.
Cybercriminals can steal credit card information, bank account details, and other financial
information, leading to significant financial losses for individuals and organizations.
2. Identity theft: Cybercriminals can use stolen personal information, such as social security
numbers and birthdates, to commit identity theft. This can lead to financial losses, damage to
credit scores, and other serious consequences.
3. Loss of privacy: Internet threats can compromise individuals’ privacy by allowing
cybercriminals to access personal information and monitor online activity. This can lead to
targeted advertising, cyberstalking, and other forms of online harassment.
4. Damage to reputation: Online threats can damage an individual’s or organization’s
reputation. This can happen through the spread of false information, negative reviews, or
other means.
5. Disruption of services: Cyberattacks can cause significant disruption to businesses and
organizations, leading to lost productivity and revenue.
6. Legal and regulatory consequences: Failure to protect personal and confidential
information can result in legal and regulatory consequences. Organizations can face fines,
legal action, and other penalties for failing to protect sensitive data.
7. Psychological impact: Online threats can have a significant psychological impact on
individuals, leading to anxiety, stress, and other negative effects.

HACKING:

Hacking is the act of identifying and then exploiting weaknesses in a computer system or
network, usually to gain unauthorized access to personal or organizational data. Hacking
is not always a malicious activity, but the term has mostly negative connotations due to
its association with cybercrime.

Cyber criminals exploit people and steal confidential and sensitive information through various
email-based strategies. Beware of the following:

Spam is unsolicited email, instant messages, or social media messages. These messages are
fairly easy to spot and can be damaging if you open or respond

Spoofing describes a criminal who impersonates another individual or organization, with


the intent to gather personal or business information.

Phishing is an email sent from an Internet criminal disguised as an email from a


legitimate, trustworthy source. The message is meant to lure you into revealing sensitive
or confidential information.

Pharming is a malicious website that resembles a legitimate website, used to gather


usernames and passwords.

Firewalls
A firewall employs rules to filter incoming and outgoing network traffic. It uses IP addresses and
port numbers to filter traffic. It can be set to either Layer 3 or transparent mode. The firewall
should be the first line of defense and installed inline at the network’s perimeter.

There are also different types of firewalls like proxy firewall, stateful inspection firewall, unified
threat management (UTM) firewall, next-generation firewall (NGFW), threat-focused NGFW,

and a virtual firewall.

Intrusion Prevention System (IPS)

IPS is a device that inspects, detects, classifies, and proactively prevents harmful traffic. It
examines real-time communications for attack patterns or signatures and then blocks attacks
when they have been detected. Placement and configuration in inline mode and generally being
in Layer 2 after the firewall. In inline mode, traffic passes into one of the device’s ethernet ports
and out of the other.

Intrusion Prevention System must work efficiently to avoid decreasing network performance. It
must be quick because exploits might occur anytime. To eliminate threats and false positives, the
IPS must detect and respond accurately.

Some of the actions of IPS include:

 Alerting network administrators (anomaly-based detection)


 Dropping the malicious traffic
 Denying traffic from the source address
 Reset the connection

Internet security precautions:


1. Get the latest anti-virus and firewall software
Download updates regularly to make sure you’re protected against any new online threats.
2. Update your internet browser
The latest versions have built-in protection against fake websites and viruses.
3. Create a strong and easy-to-remember password
Passwords that combine letters and numbers are generally harder to guess.
4. Use a different password to the one you use for other services
You should have a unique password for your HSBC Online Banking.
5. Change your password on a regular basis
It's a good idea to change your password every month.
6. Never share your password
No HSBC employee will ever ask you for your password. If you receive a call or email
from someone claiming to be from HSBC, ignore it and contact us immediately.
7. Don't let your browser remember your log on details
It's much safer to re-enter your details every time you log on, even if it takes slightly
longer.
8. Look after your paper statements
Fraudsters can use information on paper statements to steal someone’s identity. You
should always destroy your paper statements before throwing them away.
9. Learn to spot fake emails and websites
Criminals use them to con people into giving away passwords and bank details – the
technical word is ‘phishing’.
10. Avoid online fraud and con tricks
To protect yourself and your money on the internet, look out for deals that look too good to be
true.

UNIT-V

Blogs:
Blogs are a type of regularly updated websites that provide insight into a certain topic. The word
blog is a combined version of the words “web” and “log.” At their inception, blogs were simply
an online diary where people could keep a log about their daily lives on the web.
Uses of blogs:

 To help your company rank on search engines.


 To share information about a given topic and become an expert in an industry.
 To attract visitors to your site, and turn those visitors into leads.
 To cultivate an online community and engage with an audience.

STEP FOR BLOGGINGS:
 Starting a blog isn’t difficult or complicated. People postpone getting started for a variety
of reasons. Some think it’s too technical and confusing, while others talk themselves out
of it because they think they can’t compete in a crowded marketplace. Some never get
started because they can’t decide for sure what they want to blog about, while others hold
themselves back through fear of failure.
 None of these self-constructed roadblocks need to continue to hold you back.
The blog that you create will be unique and a great way to share information with other
people who have similar interests.
 You don’t need technical expertise or a ton of money. You just need to overcome
whatever has been stopping you from getting started.
 Overview of the Steps Needed to Start a Blog
 Whether this is your very first blog or a new start after other attempts, the best approach
is to make the process as simple as possible and just get started one step at a time.
 You can start your blog in just 5 simple steps:
 1. Choose a topic
 2. Name your domain
 3. Choose a blogging platform
 4. Choose your hosting and theme
 5. Plan and write content
 Read on for more detailed information about what is involved in each step.

Step One: Choose Your Topic

If you are starting a blog to create a web presence for an offline business you already have, the
step of choosing your topic is already done. If you're starting from scratch, you may not yet
know what you want to blog about.

A good approach to choosing a topic is to get in touch with what you are most passionate about.
What are you constantly reading or talking about to the point others wish you would stop talking
about it?! What excites you enough for you to want to write about it day after day without getting
bored?

If you choose a topic that is very broad, there’s a good chance you can’t compete with bigger
websites that are covering the same topic. You may need to narrow it down to a specialty. For
example, you are likely to have more success blogging about losing belly fat than weight loss in
general, or to blog about cultivating roses rather than just to blog about all aspects of gardening.

Choosing a topic comes easily to some but is more challenging for others. Don’t get hung up on
this step too long. If you start with one topic and find it’s going nowhere, you can always start a
different blog. The important thing is to get past your reluctance to get started.

Step Two: Choose a Domain Name

Purchase a domain from a site like GoDaddy or NameCheap. If possible, use a keyword that
you are targeting in your domain name.

A keyword is a word that people will type into a search engine to search for a topic. A simple,
memorable title for your blog is a good idea rather than something complicated or difficult to
spell. It’s usually better to leave hyphens out of your domain name.

It’s always better to use a domain that ends with dot com (.com) rather than dot net (.net) or dot
anything else. If readers remember the name of your blog but not what comes after the dot, they
will always try .com first.
Step Three: Choose a Blogging Platform

There are several different blogging platforms to choose from, and they vary in the amount of
experience required to use them effectively. It’s a good idea to choose a platform which is
flexible and will allow for any future changes you may want to make.

Some of your choices include:

WordPress.org – This is a self-hosted blogging platform, and probably the most popular of all
the blogging platforms. It offers plenty of functionality, themes, plugins and community support.

WordPress.com – This is a free blogging platform that is a great choice for beginners because it
is easy to learn while you are first getting started. Like other free platforms, it will run ads on
your site, and you never actually own your site, because WordPress can shut your site down if it
chooses to.

Blogger – This is another free platform that can get you started if you have absolutely no
blogging experience. Like WordPress.com, your blog isn’t actually owned by you and has
limited options for tools or support.

Squarespace – This is a user-friendly platform offering drag and drop website building for
beginners.

Wix – This is another platform that uses drag and drop tools to simplify the process of building a
website.

Joomla – This is an open source content management system. Like WordPress.org, it’s a self-
hosted option with plenty of templates but not as much community support as WordPress.

If you do choose a platform that is free so that you can get started and get some experience,
remember that there will be ads on your site that will detract from your message. If you do
choose this path, you don’t have to purchase a domain name and hosting.

For a professional site, choosing a platform in which you host your own blog is probably your
best bet.
Step Four: Choose Your Hosting and Theme

Once you have chosen your domain name and your hosting, you will be able to put your blog up
online and install a theme. A theme is a template that can enhance the appearance of your blog.
Your blog will come with access to some free themes. You can choose one of them, or you may
wish to purchase a premium theme.

If you have chosen WordPress as your blogging platform, there are plenty of tutorials available
to help you go through the process of installing a theme, and there is also an active and
supportive community to help with any confusion you may have.

If you chose a different blogging platform, both your web hosting provider and your blogging
platform should offer support to walk you through the technical part of installing a theme.

There are many different plugins that can help improve the functionality of a WordPress blog.
Some enhance the experiences of those who are visiting your blog while others help you manage
it behind the scenes. Within the WordPress dashboard, you can search for the type of plugins you
are looking for, such as a contact form, photo dropper or editorial calendar.

Certain themes may require that certain plugins be installed in order for the theme to work. If
that’s a requirement, the theme will make it clear which plugins to install. Two plugins that are
recommended for just about every WordPress blog are Akismet, which prevents comment spam
from overtaking your blog, and Yoast SEO, which helps you to optimize your blog for search
engines.

Step Five: Plan and Write Your Content

Once you have set up your blog, it’s time to get writing. An editorial calendar can help you plan
your content ahead. Think about your target audience and what they want to read about, and then
get started writing content that is relevant to your niche. Whatever you post, stay focused and
relevant, or your audience will lose interest.

You can write posts ahead of time and use your blogging platform to schedule content to be
posted on the date and time that you want.

While it isn’t necessary to write a blog post every day, it’s a good idea to blog regularly. People
who are interested in your topic and find your blog will want to see new content on a fairly
regular basis. You will build up a following more quickly if you post frequently.

The more you blog, the more your writing will improve and the better you will get at knowing
what to write about. Make a commitment to your blog. Interact with other bloggers and learn all
you can about the world of blogging.
Use these five steps to get started as a blogger and make sure to post regularly, engage with
anyone that reaches out either through social sharing or posting a comment and keep track of
analytics so you know what content is resonating with your audience.

Above all, keep practising and posting and you will continue to improve your blogging skills.

What is social networking?

Social networks are websites and apps that allow users and organizations to connect,
communicate, share information and form relationships. People can connect with others in the
same area, families, friends, and those with the same interests. Social networks are one of the
most important uses of the internet today.

Popular social networking sites -- such as Facebook, Yelp, Twitter, Instagram and TikTok --
enable individuals to maintain social connections, stay informed and access, as well as share a
wealth of information. These sites also enable marketers to reach their target audiences.

SOCIAL MEDIA ETIQUETTE:


Social media etiquette refers to the guidelines that companies and individuals use to preserve
their reputation online.

As social media channels have evolved to become one of the primary ways people communicate
in the modern world on a daily basis, typical social rules are finding their way into digital
environments.

Just as social etiquette dictates how people behave around others in the real world, social media
etiquette revolves around online guidelines to follow.

The basics of social media etiquette

The demands of social media etiquette differ from one platform to the next. For example,
reposting someone’s content on Instagram requires much more care than retweeting someone on
Twitter.

On the flip side, there are some basic dos and don’ts that essentially apply to all platforms:

 Don’t be overly promotional. Try not to message all your customers asking them to buy
your products and avoid sharing constant advertisements on your page. Make your social
profiles a blend of promotional and valuable content.
 Avoid over-automation. While scheduling your posts in advance and automating
analytics is helpful, don’t automate everything. Some things still need a human touch.
 Handle your hashtags carefully. Avoid using too many hashtags at once. Even on
Instagram, where you can use 30 hashtags in a single caption, it’s important not to overdo
it.
 Don’t bad-mouth your competition. Don’t be petty. Saying negative things about your
competitors online will harm your reputation more than it hurts theirs.
 Be authentic and genuine. Don’t try to be something you’re not. Remember that your
customers can learn whatever they need to know about your brand online today and
things like authenticity can definitely go a long way.

Why is social media etiquette important?

Organizations can’t just delete messages that generate poor reactions anymore. A single mistake
can make or break a business.

Social media etiquette is often baked into the rules of a social media policy for modern brands.
This policy usually shares a complete code of conduct for anyone who interacts with a social
channel:
 Protect against legal and security issues. If you exist in an industry with stringent
privacy and compliance laws, your system will keep you on the right side of the
regulations.
 Empower staff. When your employees know how to share content safely online, they
can represent and advocate for your organization, without harming your reputation.
 Defend your brand. Social etiquette ensures that everyone who interacts with your
brand on social media will see a respectable, professional business.

What is internet security? - Definition and meaning

Internet security is a term that describes security for activities and transactions made over the
internet. It’s a particular component of the larger ideas of cybersecurity and computer security,
involving topics including browser security, online behavior and network security. We spend a
large proportion of our lives online, and some of the internet security threats we can encounter
include:

 Hacking, where unauthorized users gain access to computer systems, email accounts, or
websites.
 Viruses or malicious software (known as malware) which can damage data or make systems
vulnerable to other threats.
 Identity theft, where criminals can steal personal and financial information.
THE IMPORTANCE OF INTERNET SECURITY

These days we do everything online, our computers, laptops and smartphones have become an
extension of ourselves so ensuring we have the best internet security is a way of knowing that
our identities, documents and passwords are not compromised.
With the internet came a selection of fraudulent activities from identity thieves to people who
hack computers and steal private passwords, documents and files. The fact we do everything
online only opens us up to these frauds and makes us sitting victims, unless you have taken the
necessary steps to protect your computer to the best of your ability.

It still surprises me how many people don’t bother with internet security. They seem to think that
their computers are invisible, but as soon as you start using your computer for anything that
involves logging onto the internet you are easy prey.

The safest method is to buy good internet security software, a program that will immediately
remove viruses, advice you when you are browsing the internet and click on a malicious site and
one that does regular scans of your computer to detect any damaging materials which may
compromise both you and your computer.

TAKE RELEVANT STEPS TO PROTECT YOUR COMPUTER

Over the years you have heard of these dangerous viruses, ones that will completely crash your
computer, wipe your computer clean, steal your private passwords and give the fraud access to
your personal information. Unfortunately there is no way of completely ridding yourself of these
frauds, they will send you emails, try and hack your passwords and access your accounts, but if
you have taken the relevant steps to protect your computer, you have nothing to worry about.

Internet frauds come from all backgrounds and all age groups and for some reason they feel the
need to post malicious software on the internet to cause serious damage. So many people become
victims as they didn’t have the right internet security in place. This means they lose all their
important documentation, they lose their operating systems and their computers won’t even boot
up. This results in the entire computer being formatted clean and reinstalled an inconvenience
that no one wants to bear.
HERE’S A TOP ’10’ LIST OF THINGS
YOU SHOULD BE DOING!

 Passwords – Keep your passwords secure. Don’t share them with anyone and ensure that they
can’t be easily guessed.
 Software – Install security software on your computer and mobile, set it to scan regularly and
ensure it’s kept up to date. If your devices are not already protected, most virus protection
programs offer a free trial.
 Phone calls – Be wary of calls you’re not expecting, requesting personal information, or access
to your computer. If in doubt, ask for a reference number and call the company from a number in
a public phone directory to ensure it’s genuine.
 Social networking – think before you post photos, financial or personal information about
yourself, your friends or family online. And regularly adjust privacy settings.
 Buying online – take care when transacting online – research the supplier and use a safe
payment method.
Email – carefully assess before clicking links and attachments, particularly from unknown
senders and keep up to date with the latest information on scams.
 Mobile – protecting your mobile from viruses, malware, and Internet fraud is just as important as
protecting your home computer.
 Check and report – Check bank statements and account records carefully to detect anything
unusual. If you see something suspicious or don’t recognise a transaction, contact the Bank
 Share the knowledge – Talk with your family and encourage them to report anything that makes
them uncomfortable. Register for an Alert Service for regular updates on the latest threats. Check
with your local bank, they probably have one.

THREATS INTERNET:
The internet has revolutionized the way we live, work, and communicate. However, it has also
brought with it a host of new threats that can compromise our privacy and security. These threats
come in many forms, from hackers and cybercriminals to viruses and malware.
One of the most significant threats on the internet is cybercrime. Cybercriminals use various
methods to steal personal information, financial data, and other sensitive information from
individuals and organizations. They may use phishing scams, malware, or other tactics to gain
access to their victims’ accounts or systems.
Another common threat on the internet is malware, which is software designed to damage or
disrupt computer systems. Malware can take many forms, including viruses, worms, and Trojan
horses. It can infect computers through email attachments, downloads, or other means and can
cause significant harm to individuals and organizations.
Other threats on the internet include identity theft, cyberbullying, and online harassment. These
can have serious consequences for victims, ranging from financial loss to emotional distress.
There are many types of threats information systems face today. Accidents, software errors,
hardware failures, or environmental influences such as fire may affect business’ operation. Each
of these threats require proper planning and range of activity to resolve.
Perpetrator of criminal threats often take control of communication systems. Malicious threats
can also be internal or external to organization. Activity may be from an individual, loosely it
group, organized criminal elements, Corporations, or governments. While motive and criminal
threats is important in evaluating risk, any attack against information and Infrastructure of
business can cause severe disruption and may result in loss of funds, productivity, market share,
or reputation.
Criminal activity against information systems is growing. This increase is partly due to:
 Traditional business are increasingly moving to computer- based operations.
 General knowledge of basic computer concepts and possibilities for exploitation are
becoming pervasive within public.
 Increased connectivity and ineffective security controls allow greater access to information
and services while providing anonymity.
 Some elements of stereotype amateur “hacker” are evolving into more criminally motivated
activities.
Almost every type of crime in physical world has or probably soon will have an online,
computer-based counterpart. In fact, networks become another tool which often become easier
criminal targets. With this said, there are several fundamental criteria for most profit motivated
criminals to use information systems.
Information systems provide low level of authentication and therefore higher degree anonymity.
This lessens chance of arrest in some cases, even though the crime is detected.

Today, criminal activity against information systems can be categorized as follows :


8. Low-Level Intruders –
This group images up a subset of stereotypical “hacker”. These individuals may evolve from
online trespass and vandalism to more criminal activity such as theft of information,
extortion, and credit card fraud. In addition, this group has a pool of potential resources for
more conditional criminal elements to exploit either directly or indirectly.
For example, in 1995, loosely knit group of low-level “hackers” was arrested for using
computer systems to steal credit card numbers. These numbers were sold to European-based
organized crime groups for telecommunication fraud.

9. For-Profit Fraud –
Online activity of this group is highly variable and may include scams, extortion, deceptive
advertising. theft, securities fraud or illegal fund transfers. Many of these cases are classified
as computer assisted crimes. In other words, information systems are used as tool, not target.
For example, document fraud was involved in multi-million dollar case involving theft from
a pair of California banks last year using desktop publishing software and equipment to
create false payroll checks.

10. Organized Crime –


Many elements of organized crime are recognizing that they need to understand and use
information systems to maintain their traditional level of influence and revenue. Motivation
for organized crime to become involved in high technology information systems goes beyond
simple fraud and extortion to include surveillance of law enforcement, money laundering,
and secure and anonymous communication.

11. Fringe Groups – Political, Religious, and Anarchists –


Although this group rarely has fraudulent motives, there has been an increased use of
information systems by some groups to further their agendas. Most of the attacks in this
arena are in either theft of information or denial of service attacks.
A recent example was the attempt by German Chaos Computer Club to disrupt French
telecommunications and Internet infrastructures to protest against French Nuclear Testing.

12. Industrial Espionage and Sabotage –


Because few companies report cases of industrial espionage, accurate statistics are difficult to
produce.

13. International Espionage and Information Warfare –


Several well documented cases have come to light of national intelligence agencies gathering
economic information to assist their nation’s businesses in competitive situations. Some of
methods for gathering this information have extended into attempts to access information and
communication systems.

14. Terrorism –
Several indicators have been discovered that traditional terrorist organizations are viewing
information systems as both potential tools and targets. In particular, ability to gather
targeting information from credit records, financial institutions and healthcare providers
appears to be an increasing threat recently demonstrated by IRA.
Types of Threats on Internet :
There are several types of threats on the internet, including:
8. Malware: Malware is malicious software that is designed to disrupt or damage computer
systems. It includes viruses, worms, Trojan horses, ransomware, and spyware.
9. Phishing: Phishing is a tactic used by cybercriminals to steal personal information, such as
usernames, passwords, and credit card numbers. This is often done by sending emails or
messages that appear to be from a legitimate source, but are actually designed to trick the
recipient into giving up their information.
10. Hacking: Hacking involves gaining unauthorized access to a computer system or network.
This can be done through exploiting vulnerabilities in software or using social engineering
tactics to trick users into giving up their login credentials.
11. Denial of Service (DoS) attacks: A DoS attack is designed to overwhelm a computer system
or network with traffic, making it unable to function properly. This can be done by sending a
large number of requests to a server, or by flooding a network with traffic.
12. Social engineering: Social engineering is the use of psychological manipulation to trick
users into giving up their personal information. This can include tactics such as phishing,
pretexting, and baiting.
13. Botnets: A botnet is a network of compromised computers that can be used to carry out
various malicious activities, such as DDoS attacks, spamming, and stealing personal
information.
14. Insider threats: Insider threats involve individuals within an organization who use their
access to confidential information for malicious purposes, such as stealing data or causing
damage to the network.
Issues of Threats on Internet :
Threats on the internet can have a wide range of issues, including:
8. Financial loss: One of the most significant issues of internet threats is financial loss.
Cybercriminals can steal credit card information, bank account details, and other financial
information, leading to significant financial losses for individuals and organizations.
9. Identity theft: Cybercriminals can use stolen personal information, such as social security
numbers and birthdates, to commit identity theft. This can lead to financial losses, damage to
credit scores, and other serious consequences.
10. Loss of privacy: Internet threats can compromise individuals’ privacy by allowing
cybercriminals to access personal information and monitor online activity. This can lead to
targeted advertising, cyberstalking, and other forms of online harassment.
11. Damage to reputation: Online threats can damage an individual’s or organization’s
reputation. This can happen through the spread of false information, negative reviews, or
other means.
12. Disruption of services: Cyberattacks can cause significant disruption to businesses and
organizations, leading to lost productivity and revenue.
13. Legal and regulatory consequences: Failure to protect personal and confidential
information can result in legal and regulatory consequences. Organizations can face fines,
legal action, and other penalties for failing to protect sensitive data.
14. Psychological impact: Online threats can have a significant psychological impact on
individuals, leading to anxiety, stress, and other negative effects.

HACKING:

Hacking is the act of identifying and then exploiting weaknesses in a computer system or
network, usually to gain unauthorized access to personal or organizational data. Hacking
is not always a malicious activity, but the term has mostly negative connotations due to
its association with cybercrime.

Cyber criminals exploit people and steal confidential and sensitive information through various
email-based strategies. Beware of the following:
Spam is unsolicited email, instant messages, or social media messages. These messages are
fairly easy to spot and can be damaging if you open or respond

Spoofing describes a criminal who impersonates another individual or organization, with


the intent to gather personal or business information.

Phishing is an email sent from an Internet criminal disguised as an email from a


legitimate, trustworthy source. The message is meant to lure you into revealing sensitive
or confidential information.

Pharming is a malicious website that resembles a legitimate website, used to gather


usernames and passwords.

Firewalls

A firewall employs rules to filter incoming and outgoing network traffic. It uses IP addresses and
port numbers to filter traffic. It can be set to either Layer 3 or transparent mode. The firewall
should be the first line of defense and installed inline at the network’s perimeter.

There are also different types of firewalls like proxy firewall, stateful inspection firewall, unified
threat management (UTM) firewall, next-generation firewall (NGFW), threat-focused NGFW,

and a virtual firewall.

Intrusion Prevention System (IPS)


IPS is a device that inspects, detects, classifies, and proactively prevents harmful traffic. It
examines real-time communications for attack patterns or signatures and then blocks attacks
when they have been detected. Placement and configuration in inline mode and generally being
in Layer 2 after the firewall. In inline mode, traffic passes into one of the device’s ethernet ports
and out of the other.

Intrusion Prevention System must work efficiently to avoid decreasing network performance. It
must be quick because exploits might occur anytime. To eliminate threats and false positives, the
IPS must detect and respond accurately.

Some of the actions of IPS include:

 Alerting network administrators (anomaly-based detection)


 Dropping the malicious traffic
 Denying traffic from the source address
 Reset the connection

Internet security precautions:


1. Get the latest anti-virus and firewall software
Download updates regularly to make sure you’re protected against any new online threats.
2. Update your internet browser
The latest versions have built-in protection against fake websites and viruses.
3. Create a strong and easy-to-remember password
Passwords that combine letters and numbers are generally harder to guess.
4. Use a different password to the one you use for other services
You should have a unique password for your HSBC Online Banking.
5. Change your password on a regular basis
It's a good idea to change your password every month.
6. Never share your password
No HSBC employee will ever ask you for your password. If you receive a call or email
from someone claiming to be from HSBC, ignore it and contact us immediately.
7. Don't let your browser remember your log on details
It's much safer to re-enter your details every time you log on, even if it takes slightly
longer.
8. Look after your paper statements
Fraudsters can use information on paper statements to steal someone’s identity. You
should always destroy your paper statements before throwing them away.
9. Learn to spot fake emails and websites
Criminals use them to con people into giving away passwords and bank details – the
technical word is ‘phishing’.
10. Avoid online fraud and con tricks
To protect yourself and your money on the internet, look out for deals that look too good to be
true.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy