Internet and Internet Application Introduction
Internet and Internet Application Introduction
Internet and Internet Application Introduction
application introduction
What is INTERNET?
It is a world-wide global system of
interconnected computer networks and
devices
What is INTERNET ?
It
connects
millions
of
computers
What is INTERNET ?
The Internet acts as a pipeline to transport
electronic messages from one network to another
network. At the heart of most networks, there is a
SERVER,
SERVER is a fast computer with large amounts
of memory and storage space. The server controls
the communication of information between the
devices
attached
to
network,
such
as
Internet history
The precursor to the Internet was
jumpstarted in the early days of computing
history, in 1969 with the U.S. Defense
Department's Advanced Research Projects
Agency Network (ARPANET).
ARPANETwas a secret military project
developed by United States Department of
Defense
Internet history
Advanced Research Projects Agency (ARPA)
hosted a program with several research
institutions called Resource Sharing Computer
Networks.
ARPA's goal was
1. link different computers together,
2. increase overall computer power
3. decentralize information storage.
The U.S. government wanted to find a way to
access and distribute information in the case of a
catastrophic event, such as a nuclear attack. If a
bomb hit an important computer line, information
transfers would stop immediately. But if there
were a way to network computers, other parts of
Internet history
the purpose of ARPANET was to provide communication
among
the various bodies of government and military
facilities
In 1972, theARPANETspread over the globe with 23
nodes located at different countries and thus became known
asInternet
By the time, with invention of new technologies such as
TCP/IP protocols, DNS, WWW, browsers, scripting languages
etc.,Internet provided a medium to publish and access
information over the web.
over
the
medium
of
the
Internet.
It
is
an
DEVELOPMENT OF INTERNET
BROWSERS
Shortly afterwards other browsers were
released, each bringing differences and
improvements
Line Mode Browser
released on feb 1992.
This was also brought
to us by Tim Berners
Lee. It was the first
browser to support
multiple platforms.
DEVELOPMENT OF INTERNET
BROWSERS
DEVELOPMENT OF INTERNET
BROWSERS
Mosaic Browser
released - Jan 5th
1993. Mosaic was
really highly rated
when it first came out.
It was developed at
University of Illinois
DEVELOPMENT OF INTERNET
BROWSERS
Disadvantages of the
internet
1. THREAT TO PERSONAL INFORMATION hacking
personal accounts, passwords, documents
2. SPAMMING sending unsolicited or junk mails,
annoying advertisements
3. VIRUS ATTACKS destroying and corrupting data
and files , malicious activities in your PC
4. CYBERCRIME criminal activities, pornography,
fake websites and accounts, software copyright
infringement
Internet Security
Introduction
Internet security relies on specific resources and
standards for protecting data that gets sent through
the internet. This includes various kinds of encryption
such as other aspects of a secure web setup includes
firewalls, which block unwanted traffic, anti-malware,
anti-spyware & anti-virus programs that work from
specific networks or devices to monitor internet traffic
for dangerous attachments.
Insufficient internet security can threaten to collapse
an e-commerce business or any other operation
where data gets routed over the web.
Concept of Internet
Security :
Three basics security concepts important to
information on the internet are:
1. INTEGRITY
2. CONFIDENTIALITY
3. AVAILABILITY
Concept of Internet
Security :
Three basics security concepts important to information on the
internet are:
1. INTEGRITY
The concept of integrity is divided in 2 forms:
A.) Data integrity:
this property, that data has not been altered in an
unauthorized manner while in storage, during processing or
while in transit. another aspect of data integrity is the
assurances that data can only be accessed and altered by
those authorized to do so. often such integrity is insured by
use of a number referred to as message integrity code or
message authentication code
Concept of Internet
Security :
Three basics security concepts important to information on the
internet are:
1. INTEGRITY
The concept of integrity is divided in 2 forms:
B.) System integrity:
This quality states that a system has when performing the
intended function in an unimpaired manner, is free from
unauthorized manipulation. Integrity is commonly an
organizations most important security objective, after
availability. Integrity is particularly important for critical safety
and financial data used for activities such as electronic funds
transfers ,air traffic control ,and financial accounting.
Concept of Internet
Security :
Three basics security concepts important to information on the internet
are:
2. CONFIDENTIALITY:
Confidentiality is the requirement that private or confidential
information should not be disclosed to unauthorized individuals.
Confidentiality protection is applies to data in storage, during
processing ,and while in transit. For many organizations ,
confidentiality is frequently behind availability and integrity in
terms
of importance. For some types of information,
confidentiality is a very
important attribute. Examples includes
research data ,medical and
insurance records ,new product specifications ,and corporate
investments strategies
.
Concept of Internet
Security :
Three basics security concepts important to information on the internet
are:
3. AVAILABILITY:
Confidentiality is the requirement that private or confidential
information should not be disclosed to unauthorized individuals.
Confidentiality protection is applies to data in storage, during
processing ,and while in transit. For many organizations ,
confidentiality is frequently behind availability and integrity in
terms
of importance. For some types of information,
confidentiality is a very
important attribute. Examples includes
research data ,medical and
insurance records ,new product specifications ,and corporate
investments strategies
.
NETIQUETTE:
Respecting privacy
end
Hub