Midterm Ite Lesson 7 1 Updated
Midterm Ite Lesson 7 1 Updated
Wide Web
Lesson 8
Lesson Objectives
At the end of this lesson, you will be able to:
• Discuss the use of Internet and how the world wide web works.
• State the applications of the Internet.
• Distinguish the threats in using the Internet.
• Demonstrate understanding of the Internet through a video presentation.
The Internet and the World wide web
• Sometimes referred to as a “network of networks,” the
Internet is the wider network that allows computer
networks around the world run by companies,
governments, universities and other organizations to talk
to one another.
Brief History of the Internet
• February 7, 1958 was the day Secretary of Defense Neil McElroy signed
Department of Defense Directive 5105.15.
• His signature launched the Advanced Research Projects Agency (ARPA),
now known as the Defense Advanced Research Projects Agency (DARPA
They innovated a network came to be known as the ARPA Network, or
ARPAnet.
• Tim Berners-Lee of the European Organization for Nuclear Research
(CERN) created the hypertext transfer protocol (http), a standardization that
gave diverse computer platforms the ability to access the same internet
sites. For this reason, Berners-Lee is widely regarded as the father of the
world wide web (www).
Brief History of the Internet
• The Mosaic web browser, created in 1993 at the National
Center for Supercomputing Applications (NCSA) at the
University of Illinois Urbana-Champaign, was a key
development that emerged from the NSFNET.
• Mosaic was the first to show images in line with text, and
it offered many other graphical user interface norms we’ve
come to expect today.
What is World Wide Web
• The web is a way to view and share information over the
internet. That information, be it text, music, photos or
videos or whatever, is written on web pages served up by
a web browser.
• Google handles more than 40,000 searches per second,
and has 60% of the global browser market through
Chrome.
Internet Applications
• Sending and receiving email
• Searching and browsing information archives
• Copying files between computers
• Conducting financial transactions
• Navigating (in your car, smart scooter, smart bike, or other)
• Playing interactive games
• Video and music streaming
• Chat or voice communication (direct messaging, video conferencing)
Internet Threats
• Malware. Software that performs a malicious task on a target device or network,
e.g. corrupting data or taking over a system.
• Phishing. An email-borne attack that involves tricking the email recipient into
disclosing confidential information or downloading malware by clicking on a
hyperlink in the message.
• Spear Phishing. A more sophisticated form of phishing where the attacker
learns about the victim and impersonates someone he or she knows and trusts.
• “Man in the Middle” (MitM) attack. Where an attacker establishes a position
between the sender and recipient of electronic messages and intercepts them,
perhaps changing them in transit. The sender and recipient believe they are
communicating directly with one another.
Internet Threats
• Trojans. Named after the Trojan Horse of ancient Greek history, the Trojan is
a type of malware that enters a target system looking like one thing, e.g. a
standard piece of software, but then lets out the malicious code once inside
the host system.
• Ransomware. An attack that involves encrypting data on the target system
and demanding a ransom in exchange for letting the user have access to the
data again.
• Denial of Service attack or Distributed Denial of Service Attack (DDoS).
Where an attacker takes over many of devices and uses them to invoke the
functions of a target system, e.g. a website, causing it to crash from an
overload of demand.
Internet Threats
• Attacks on IoT Devices. IoT devices like industrial sensors are vulnerable to multiple
types of cyber threats. These include hackers taking over the device to make it part
of a DDoS attack and unauthorized access to data being collected by the device.
• Data Breaches. A data breach is a theft of data by a malicious actor. Motives for data
breaches include crime (i.e. identity theft), a desire to embarrass an institution (e.g.
Edward Snowden or the DNC hack) and espionage.
• Malware on Mobile Apps. Mobile devices are vulnerable to malware attacks just like
other computing hardware. Attackers may embed malware in app downloads, mobile
websites or phishing emails and text messages. Once compromised, a mobile
device can give the malicious actor access to personal information, location data,
financial accounts and more
The Netiquette
• Netiquette is short for "Internet etiquette." Just like etiquette is a code
of polite behavior in society, netiquette is a code of good behavior on
the Internet.
• This includes several aspects of the Internet, such as email, social
media, online chat, web forums, website comments, multiplayer
gaming, and other types of online communication
2. Fake Identities
• This is a huge problem that we witness every single day on social media.
The show on MTV called “Catfish" has made this issue more public, but it does
not mean we can say goodbye to fake profiles and upsetting stories. The show
deals with people creating fake identities on social media or dating websites.
5 Common Problems in using Social Media
3. Elimination of Face to Face Conversations
Something else to think about is the change in methods of communication.
After phones came out, people tended to stay inside their homes, hiding behind a
screen. There were fewer coffee dates, less group gatherings, and not as many
words spoken in person. Instead, we resorted to texting conversations, chat
rooms/group texts, and a lot of fighting. Since people are not in contact with another,
they tend to lash out more.
4. It Promotes Procrastination
As a student, my life is consumed with studying, homework, and projects.
However, in the modern technology era, my life is also consumed with Twitter,
Instagram, and countless other social media sites. It might seem a bit crazy, but it is
hard to resist the daily scroll on Instagram.
5 Common Problems in using Social Media
5. No More Privacy
This may seem a bit ironic, but, with this new technological
advancement, there is nowhere to hide. Although a bit contradictory to
what I was saying before about hiding behind a screen, being on social
media makes us more prone to being found in the real world. Even
with privacy settings on and everything, the internet makes it easily
accessible to find out personal information about others. Now, you may
be thinking, what if I am not even on the internet? Well, news flash,
you are. You may not have five social media accounts and a million
followers, but you can definitely be found with the click of a button.