SlideShare une entreprise Scribd logo
1  sur  17
• Contents
• Introduction
• Services
• The World Wide Web (www)
• Browsers
• Search engines
• Uses of internet
• Your security
• Introduction
• What is the Internet?
• History
• Who own’s internet ?
• Services
• E-mail
• File sharing
• Searching
• Shopping
• Playing games,watching videos etc
• World Wide Web (www)
• World Wide Web or W3 is the most popular
and promising method of organizing and
accessing information on the INTERNET.
• Hypertext is a new way of information
storage and retrieval that enables authors to
structure information in novel ways.
• WWW Browsers
• To use a computer as a Web client, a user
needs to load on it a special software tool
known as WWW Browser.
• Maintain a history of server computers visited
by user in a surfing session.
• Enable a user to download information in
various formats.
• INTERNET SEARCH
ENGINES
• Google
• Yahoo
• bing
• Uniform Resource Locator
(URL)
• URL is the standard for specifying the
whereabouts of a resource (such as a web
page) on the Internet
• Uses of INTERNET
• On-line communication
• Software sharing
• Exchange of views on topics of common
interest
• Posting of information of general interest
• On-line
journals, magazines, Encyclopedia, and
dictionary
• On-line shopping
• World-wide conferencing
• Threats
• What is it?
• Virus : small piece of software affecting computer
• Trojans : small piece of software that damages your
software and may erase your hard drive

• Spywares/malwares : any unwanted software that
detects your activity on computer

• Worms : small piece of software that uses computer
networks and security holes to replicate itself.
• Hacking :
• What is it ?
• How do they do ?

• Tools
• Basic Attacks
• Intrusion - unauthorized access and use of systems.
• Denial of service - an attack aimed at preventing
use of computers.

• Phishing - attack aimed for the theft of personal
information like username,passwords,credit card
numbers etc.
• Keyloggers – used to detect every activity done on
the computer.

• SQL Injection – used to steal the data from the
databases.

• Adwares – used by the marketing companies to
target particular customers.
• How to be safe ?
• Use of Antivirus
• Avoid visiting any unsafe website and don’t use any
malicious software
• Keep your personal data confidential
• Type from online screen keyboard
• Avoid getting trapped by phishing scams
• Keep your computer and softwares up to date
• Use FIREWALLS.

• Apply common sense.
• Questions :

Contenu connexe

Tendances

Encryption Alone Isn't Enough - Next Gen Digital Security Revealed
Encryption Alone Isn't Enough - Next Gen Digital Security RevealedEncryption Alone Isn't Enough - Next Gen Digital Security Revealed
Encryption Alone Isn't Enough - Next Gen Digital Security RevealedAndrew J. Polcha
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry
 
The cloud is as secure as you want it to be
The cloud is as secure as you want it to beThe cloud is as secure as you want it to be
The cloud is as secure as you want it to beDebashis Banerjee
 
Msgovern (tour)wiki.ppt
Msgovern (tour)wiki.pptMsgovern (tour)wiki.ppt
Msgovern (tour)wiki.pptMS Govern
 
Case Study for Opensource Social Network for Music Event guides & Exclusive D...
Case Study for Opensource Social Network for Music Event guides & Exclusive D...Case Study for Opensource Social Network for Music Event guides & Exclusive D...
Case Study for Opensource Social Network for Music Event guides & Exclusive D...Mike Taylor
 

Tendances (10)

Cookie Jar
Cookie JarCookie Jar
Cookie Jar
 
Encryption Alone Isn't Enough - Next Gen Digital Security Revealed
Encryption Alone Isn't Enough - Next Gen Digital Security RevealedEncryption Alone Isn't Enough - Next Gen Digital Security Revealed
Encryption Alone Isn't Enough - Next Gen Digital Security Revealed
 
Online bankingsecurity
Online bankingsecurityOnline bankingsecurity
Online bankingsecurity
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for Government
 
Security chapter6
Security chapter6Security chapter6
Security chapter6
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
The cloud is as secure as you want it to be
The cloud is as secure as you want it to beThe cloud is as secure as you want it to be
The cloud is as secure as you want it to be
 
Msgovern (tour)wiki.ppt
Msgovern (tour)wiki.pptMsgovern (tour)wiki.ppt
Msgovern (tour)wiki.ppt
 
Case Study for Opensource Social Network for Music Event guides & Exclusive D...
Case Study for Opensource Social Network for Music Event guides & Exclusive D...Case Study for Opensource Social Network for Music Event guides & Exclusive D...
Case Study for Opensource Social Network for Music Event guides & Exclusive D...
 
Internet security
Internet securityInternet security
Internet security
 

En vedette

Cctv delhi cctv wala
Cctv delhi cctv walaCctv delhi cctv wala
Cctv delhi cctv walaptechies
 
Latest CCTV Camera Shop
Latest CCTV Camera ShopLatest CCTV Camera Shop
Latest CCTV Camera ShopSecuritycctv
 
Network Essentials
Network EssentialsNetwork Essentials
Network EssentialsIffu Slides
 
Networking Cables
Networking CablesNetworking Cables
Networking CablesNetwax Lab
 
Ip Cctv Presentation
Ip Cctv PresentationIp Cctv Presentation
Ip Cctv Presentationwillyaoll
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV CamerasSachin Sharma
 
Detailed study of_cctv_cameras
Detailed study of_cctv_camerasDetailed study of_cctv_cameras
Detailed study of_cctv_camerasYaser Al-Abdali
 
Dell networking optics and cables connectivity guide
Dell networking optics and cables connectivity guideDell networking optics and cables connectivity guide
Dell networking optics and cables connectivity guideDavid Pasek
 
Home automation and securty using wireless networks
Home automation and securty using wireless networksHome automation and securty using wireless networks
Home automation and securty using wireless networksArun Kumar
 
Concepts of networking
Concepts of networkingConcepts of networking
Concepts of networkingMohan Yadav
 
How to connect networking cables
How to connect networking cablesHow to connect networking cables
How to connect networking cablesSwati Sharma
 

En vedette (11)

Cctv delhi cctv wala
Cctv delhi cctv walaCctv delhi cctv wala
Cctv delhi cctv wala
 
Latest CCTV Camera Shop
Latest CCTV Camera ShopLatest CCTV Camera Shop
Latest CCTV Camera Shop
 
Network Essentials
Network EssentialsNetwork Essentials
Network Essentials
 
Networking Cables
Networking CablesNetworking Cables
Networking Cables
 
Ip Cctv Presentation
Ip Cctv PresentationIp Cctv Presentation
Ip Cctv Presentation
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV Cameras
 
Detailed study of_cctv_cameras
Detailed study of_cctv_camerasDetailed study of_cctv_cameras
Detailed study of_cctv_cameras
 
Dell networking optics and cables connectivity guide
Dell networking optics and cables connectivity guideDell networking optics and cables connectivity guide
Dell networking optics and cables connectivity guide
 
Home automation and securty using wireless networks
Home automation and securty using wireless networksHome automation and securty using wireless networks
Home automation and securty using wireless networks
 
Concepts of networking
Concepts of networkingConcepts of networking
Concepts of networking
 
How to connect networking cables
How to connect networking cablesHow to connect networking cables
How to connect networking cables
 

Similaire à Understanding the Internet

Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source IntelligenceOsama Ellahi
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingRavi Sankar
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacksSugirtha Jasmine M
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on societyPratik Gupta
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 

Similaire à Understanding the Internet (20)

Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
INTERNT.ppt
INTERNT.pptINTERNT.ppt
INTERNT.ppt
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Privacy in private browsing mode
Privacy in private browsing modePrivacy in private browsing mode
Privacy in private browsing mode
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Understanding the Internet

  • 1.
  • 2. • Contents • Introduction • Services • The World Wide Web (www) • Browsers • Search engines • Uses of internet • Your security
  • 3. • Introduction • What is the Internet? • History • Who own’s internet ?
  • 4. • Services • E-mail • File sharing • Searching • Shopping • Playing games,watching videos etc
  • 5. • World Wide Web (www) • World Wide Web or W3 is the most popular and promising method of organizing and accessing information on the INTERNET. • Hypertext is a new way of information storage and retrieval that enables authors to structure information in novel ways.
  • 6. • WWW Browsers • To use a computer as a Web client, a user needs to load on it a special software tool known as WWW Browser. • Maintain a history of server computers visited by user in a surfing session. • Enable a user to download information in various formats.
  • 7. • INTERNET SEARCH ENGINES • Google • Yahoo • bing
  • 8. • Uniform Resource Locator (URL) • URL is the standard for specifying the whereabouts of a resource (such as a web page) on the Internet
  • 9.
  • 10. • Uses of INTERNET • On-line communication • Software sharing • Exchange of views on topics of common interest • Posting of information of general interest • On-line journals, magazines, Encyclopedia, and dictionary • On-line shopping • World-wide conferencing
  • 11. • Threats • What is it? • Virus : small piece of software affecting computer • Trojans : small piece of software that damages your software and may erase your hard drive • Spywares/malwares : any unwanted software that detects your activity on computer • Worms : small piece of software that uses computer networks and security holes to replicate itself.
  • 12. • Hacking : • What is it ? • How do they do ? • Tools
  • 13. • Basic Attacks • Intrusion - unauthorized access and use of systems. • Denial of service - an attack aimed at preventing use of computers. • Phishing - attack aimed for the theft of personal information like username,passwords,credit card numbers etc.
  • 14. • Keyloggers – used to detect every activity done on the computer. • SQL Injection – used to steal the data from the databases. • Adwares – used by the marketing companies to target particular customers.
  • 15. • How to be safe ? • Use of Antivirus • Avoid visiting any unsafe website and don’t use any malicious software • Keep your personal data confidential • Type from online screen keyboard • Avoid getting trapped by phishing scams
  • 16. • Keep your computer and softwares up to date • Use FIREWALLS. • Apply common sense.