The document provides an overview of the internet, including its history and components. It discusses the world wide web and how browsers are used to access web pages. It also mentions some popular search engines and describes common internet services like email, file sharing, online shopping, and games/videos. The document outlines some security threats like viruses, trojans, spyware and hacking. It provides examples of basic attacks such as intrusion, denial of service, and phishing. Finally, it offers tips for staying safe online like using antivirus software, avoiding unsafe websites, and keeping systems updated.
5. • World Wide Web (www)
• World Wide Web or W3 is the most popular
and promising method of organizing and
accessing information on the INTERNET.
• Hypertext is a new way of information
storage and retrieval that enables authors to
structure information in novel ways.
6. • WWW Browsers
• To use a computer as a Web client, a user
needs to load on it a special software tool
known as WWW Browser.
• Maintain a history of server computers visited
by user in a surfing session.
• Enable a user to download information in
various formats.
8. • Uniform Resource Locator
(URL)
• URL is the standard for specifying the
whereabouts of a resource (such as a web
page) on the Internet
9.
10. • Uses of INTERNET
• On-line communication
• Software sharing
• Exchange of views on topics of common
interest
• Posting of information of general interest
• On-line
journals, magazines, Encyclopedia, and
dictionary
• On-line shopping
• World-wide conferencing
11. • Threats
• What is it?
• Virus : small piece of software affecting computer
• Trojans : small piece of software that damages your
software and may erase your hard drive
• Spywares/malwares : any unwanted software that
detects your activity on computer
• Worms : small piece of software that uses computer
networks and security holes to replicate itself.
12. • Hacking :
• What is it ?
• How do they do ?
• Tools
13. • Basic Attacks
• Intrusion - unauthorized access and use of systems.
• Denial of service - an attack aimed at preventing
use of computers.
• Phishing - attack aimed for the theft of personal
information like username,passwords,credit card
numbers etc.
14. • Keyloggers – used to detect every activity done on
the computer.
• SQL Injection – used to steal the data from the
databases.
• Adwares – used by the marketing companies to
target particular customers.
15. • How to be safe ?
• Use of Antivirus
• Avoid visiting any unsafe website and don’t use any
malicious software
• Keep your personal data confidential
• Type from online screen keyboard
• Avoid getting trapped by phishing scams
16. • Keep your computer and softwares up to date
• Use FIREWALLS.
• Apply common sense.