0% found this document useful (0 votes)
24 views

Midterm Ite Lesson 7 1 Updated

Uploaded by

mglagarde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Midterm Ite Lesson 7 1 Updated

Uploaded by

mglagarde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

The Internet and World

Wide Web
Lesson 8
Lesson Objectives
At the end of this lesson, you will be able to:
• Discuss the use of Internet and how the world wide web works.
• State the applications of the Internet.
• Distinguish the threats in using the Internet.
• Demonstrate understanding of the Internet through a video presentation.
The Internet and the World wide web
• Sometimes referred to as a “network of networks,” the
Internet is the wider network that allows computer
networks around the world run by companies,
governments, universities and other organizations to talk
to one another.
Brief History of the Internet
• February 7, 1958 was the day Secretary of Defense Neil McElroy signed
Department of Defense Directive 5105.15.
• His signature launched the Advanced Research Projects Agency (ARPA),
now known as the Defense Advanced Research Projects Agency (DARPA
They innovated a network came to be known as the ARPA Network, or
ARPAnet.
• Tim Berners-Lee of the European Organization for Nuclear Research
(CERN) created the hypertext transfer protocol (http), a standardization that
gave diverse computer platforms the ability to access the same internet
sites. For this reason, Berners-Lee is widely regarded as the father of the
world wide web (www).
Brief History of the Internet
• The Mosaic web browser, created in 1993 at the National
Center for Supercomputing Applications (NCSA) at the
University of Illinois Urbana-Champaign, was a key
development that emerged from the NSFNET.
• Mosaic was the first to show images in line with text, and
it offered many other graphical user interface norms we’ve
come to expect today.
What is World Wide Web
• The web is a way to view and share information over the
internet. That information, be it text, music, photos or
videos or whatever, is written on web pages served up by
a web browser.
• Google handles more than 40,000 searches per second,
and has 60% of the global browser market through
Chrome.
Internet Applications
• Sending and receiving email
• Searching and browsing information archives
• Copying files between computers
• Conducting financial transactions
• Navigating (in your car, smart scooter, smart bike, or other)
• Playing interactive games
• Video and music streaming
• Chat or voice communication (direct messaging, video conferencing)
Internet Threats
• Malware. Software that performs a malicious task on a target device or network,
e.g. corrupting data or taking over a system.
• Phishing. An email-borne attack that involves tricking the email recipient into
disclosing confidential information or downloading malware by clicking on a
hyperlink in the message.
• Spear Phishing. A more sophisticated form of phishing where the attacker
learns about the victim and impersonates someone he or she knows and trusts.
• “Man in the Middle” (MitM) attack. Where an attacker establishes a position
between the sender and recipient of electronic messages and intercepts them,
perhaps changing them in transit. The sender and recipient believe they are
communicating directly with one another.
Internet Threats
• Trojans. Named after the Trojan Horse of ancient Greek history, the Trojan is
a type of malware that enters a target system looking like one thing, e.g. a
standard piece of software, but then lets out the malicious code once inside
the host system.
• Ransomware. An attack that involves encrypting data on the target system
and demanding a ransom in exchange for letting the user have access to the
data again.
• Denial of Service attack or Distributed Denial of Service Attack (DDoS).
Where an attacker takes over many of devices and uses them to invoke the
functions of a target system, e.g. a website, causing it to crash from an
overload of demand.
Internet Threats
• Attacks on IoT Devices. IoT devices like industrial sensors are vulnerable to multiple
types of cyber threats. These include hackers taking over the device to make it part
of a DDoS attack and unauthorized access to data being collected by the device.
• Data Breaches. A data breach is a theft of data by a malicious actor. Motives for data
breaches include crime (i.e. identity theft), a desire to embarrass an institution (e.g.
Edward Snowden or the DNC hack) and espionage.
• Malware on Mobile Apps. Mobile devices are vulnerable to malware attacks just like
other computing hardware. Attackers may embed malware in app downloads, mobile
websites or phishing emails and text messages. Once compromised, a mobile
device can give the malicious actor access to personal information, location data,
financial accounts and more
The Netiquette
• Netiquette is short for "Internet etiquette." Just like etiquette is a code
of polite behavior in society, netiquette is a code of good behavior on
the Internet.
• This includes several aspects of the Internet, such as email, social
media, online chat, web forums, website comments, multiplayer
gaming, and other types of online communication

• While there is no official list of netiquette rules or guidelines, the


general idea is to respect others online. Below are ten examples of
rules to follow for good netiquette:
The Netiquette
• Avoid posting inflammatory or offensive comments online (a.k.a flaming).
• Respect others' privacy by not sharing personal information, photos, or videos that
another person may not want
• published online.
• Never spam others by sending large amounts of unsolicited email.
• Show good sportsmanship when playing online games, whether you win or lose.
• Don't troll people in web forums or website comments by repeatedly nagging or
annoying them.
• Stick to the topic when posting in online forums or when commenting on photos or
videos, such as YouTube or Facebook comments.
The Netiquette
• Don't swear or use offensive language.
• Avoid replying to negative comments with more negative
comments. Instead, break the cycle with a positive post.
• If someone asks a question and you know the answer,
offer to help.
• Thank others who help you online
The Social Media and Networking
What is Social Media?
• Social media is any digital tool that allows users to
quickly create and share content with the public. Social
media encompasses a wide range of websites and apps.
Some, like Twitter, specialize in sharing links and short
written messages. Others, like Instagram and TikTok, are
built to optimize the sharing of photos and videos
How Social Media Works
Since social media covers so many different kinds of
websites and applications, the function of these tools also
varies. However, most social media sites start with a user
creating a profile, usually by providing a name and an email
address. Once a profile has been created, users can create
and share content. For instance, an Instagram user with a
new account can take a picture and share it on their profile
with a caption.
Types of Social Media
• Social Networks (Facebook, Twitter, LinkedIn)
• Media Networks (Instagram, YouTube)
• Discussion Networks (WordPress, Reddit)
• Review Networks (Yelp, TripAdvisor
What is a Social Network?
• Alternatively referred to as a virtual community or profile
site, a social network is a website that brings people
together to talk, share ideas and interests, or make new
friends.
• This type of collaboration and sharing is known as social
media. Unlike traditional media that is created by no
more than ten people, social media sites contain content
created by hundreds or even millions of different people.
Different Social Networking Sites
• Classmates (http://www.classmates.com ) - One of the largest
websites for connecting high school friends and keeping in touch
with them and future reunions.
• DeviantArt ( https://www.deviantart.com ) - A social media platform
for sharing original artwork.
• Facebook ( https://www.facebook.com ) - The most popular social
networking websites on the Internet. Facebook is a popular
destination for users to set up personal space and connect with
friends, share pictures, share movies, talk about what you're doing,
etc.
Different Social Networking Sites
• Google+ (https://plus.google.com ) - The latest social networking service from
Google.
• Mastodon ( https://joinmastodon.org ) - A free, federated, social microblogging
service with over two million users.
• Any Mastodon user can operate a node (social subdomain) with its own theme
and set of rules.
• Mix ( https://mix.com ) - Another very popular community of Internet user who
vote for web pages they like and dislike. Mix also allows users to create
personal pages of interesting sites they come across.
• MySpace ( https://myspace.com ) - Once one of the most popular social
networks and viewed website on the Internet.
5 Common Problems in using Social Media
1. Number of Likes/Comments
• The question that you have to ask yourself is, am I posting to show
everyone what is going on in my life or am I just posting to get a lot of likes?
People, especially teens, have become obsessed with the idea of receiving
“likes" on their pictures.

2. Fake Identities
• This is a huge problem that we witness every single day on social media.
The show on MTV called “Catfish" has made this issue more public, but it does
not mean we can say goodbye to fake profiles and upsetting stories. The show
deals with people creating fake identities on social media or dating websites.
5 Common Problems in using Social Media
3. Elimination of Face to Face Conversations
Something else to think about is the change in methods of communication.
After phones came out, people tended to stay inside their homes, hiding behind a
screen. There were fewer coffee dates, less group gatherings, and not as many
words spoken in person. Instead, we resorted to texting conversations, chat
rooms/group texts, and a lot of fighting. Since people are not in contact with another,
they tend to lash out more.
4. It Promotes Procrastination
As a student, my life is consumed with studying, homework, and projects.
However, in the modern technology era, my life is also consumed with Twitter,
Instagram, and countless other social media sites. It might seem a bit crazy, but it is
hard to resist the daily scroll on Instagram.
5 Common Problems in using Social Media
5. No More Privacy
This may seem a bit ironic, but, with this new technological
advancement, there is nowhere to hide. Although a bit contradictory to
what I was saying before about hiding behind a screen, being on social
media makes us more prone to being found in the real world. Even
with privacy settings on and everything, the internet makes it easily
accessible to find out personal information about others. Now, you may
be thinking, what if I am not even on the internet? Well, news flash,
you are. You may not have five social media accounts and a million
followers, but you can definitely be found with the click of a button.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy