Pre-Computer Skills Internet 1. General Concepts Internet A system of connected computers that allows your computer to exchange data, messages and files.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Intermediate 2 Computing
Working with the Internet
Thank you to IT Training at Indiana University Computer Malware.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Chapter 9: Privacy, Crime, and Security
Internet, Intranet and Extranets
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
ADMINISTRATION Sources of Information REVISION – BLOCK 6.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Introduction 2: Internet, Intranet, and Extranet J394 – Perancangan Situs Web Program Sudi Manajemen Universitas Bina Nusantara.
1Lecturer: Dalia Mirghani Saadabi. 2 A set of computers connected together so that they can communicate is called a computer network. This involves installing.
Video Following is a video of what can happen if you don’t update your security settings! security.
INTERNET CHAPTER 12 Information Available The INTERNET contains a huge amount of information a huge amount of information information on any topic you.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
Internet.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
The Internet A Wide Area Network across the world The network of networks –Lots of smaller networks joined together.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 Chapter 2 & Chapter 4 §Browsers. 2 Terms §Software §Program §Application.
WHAT IS A WEBSITE AND HOW TO GET YOUR BUSINESS ONLINE Anna Gabali – 30/07/ MKLC.
HTML, XHTML, and CSS Sixth Edition Chapter 1 Introduction to HTML, XHTML, and CSS.
The Role of Communication Systems Karen Cheesbrough.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
Types of Electronic Infection
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Communication, Networks, The internet and the Worldwide Web.
ACM 511 Introduction to Computer Networks. Computer Networks.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
SETTING UP AN INTERNET NETWORK What you’ll need Your options How does data travel the Internet? Different terminology.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
Topic 5: Basic Security.
The Internet Teaching Learning Seminar Computer Studies.
Web Design. What is the Internet? A worldwide collection of computer networks that links millions of computers by – Businesses (.com.net) – the government.
What is the Internet? A world-wide computer network made up of tens of thousands of smaller networks. It’s the biggest network of all! So, what is a network?
Newsgroup World Wide Web (WWW) Conservation Over the Internet e.g.ICQ File Transfer Protocol (FTP) Includes 6 main services: Electronic Mail Remote.
Access : connection to the Internet account : an arrangement you have with a company or Internet provider to use a service they provide. browse : to look.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
INTERNET Communications & Networks. The Internet èThe Internet is a Wide Area Network that covers the entire world èIt can be thought of as many different,
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Pre-Computer Skills Chapter 4 1. General Concepts Internet A system of connected computers that allows your computer to exchange data, messages and files.
Chapter 1 Introduction to HTML, XHTML, and CSS HTML5 & CSS 7 th Edition.
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
The Internet What is the Internet? The Internet is a lot of computers over the whole world connected together so that they can share information. It.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
The Internet. The Internet and Systems that Use It Internet –A group of computer networks that encircle the entire globe –Began in 1969 Protocol –Language.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Internet The internet is the largest computer network system in the world. It consists of many smaller networks connected together by a global public.
Web Page Programming Terms. Chapter 1 Objectives Describe Internet and Understand Key terms Describe World Wide Web and its Key terms Identify types and.
ICT in Product Manufacture ISDN, LAN, WAN, Intranets and extranets, global networks
Pre-Computer Skills Chapter 4.
Internet, Intranet and Extranets
Pre-Computer Skills Internet.
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Internet, Intranet and Extranets
Pre-Computer Skills Internet.
Pre-Computer Skills Chapter 4.
Information Technology Ms. Abeer Helwa
Unit# 5: Internet and Worldwide Web
Presentation transcript:

Pre-Computer Skills Internet 1

General Concepts Internet A system of connected computers that allows your computer to exchange data, messages and files with any of the millions of other connected computers. World Wide Web (www) A collection of Web pages and related resources which are linked together across the Internet 2

General Concepts Intranet A private network that is contained within an enterprise, and used to share company information among employees. Extranet A private network that uses Internet technology to share part of business information with suppliers, partners, customers or other businesses. 3

General Concepts Hyperlink A piece of text that can perform an action when the users clicks on it. Web Browsers Are computer programs that allow people to access information on the World Wide Web (WWW), e.g. Microsoft Internet Explorer and Netscape Navigator 4

General Concepts Web Site A computer storage area that contains one or more Web pages. Home Page The first Web page you see when you launch Internet Explorer. Uniform Resource Location (URL) A unique address given to every web page 5

General Concepts Protocol A set of instructions for transferring data between computers over the network Site Map or Site Index is similar to a table of contents in a book; it tells you where you can find information by category. Internet Service Provider (ISP) A company that offers their customers access to the Internet 6

General Concepts Hyper Text Markup Language (HTML) A set of formatting commands that you place around a text or pictures to create a Web page. 7

Internet Connection Services There are different Internet connection services, such as: Dial-UP Connection: –Early days of the Internet –Computer  Modem  Phone Line –To connect, user should dial up the ISP. –Disadvantages: Very slow To make a phone call, you should disconnect the Internet. 8

Internet Connection Services BroadBand Connection: –Permanent connection to the internet –No need to disconnect to make a phone call –Immediate access to your –Fast service –Paid on monthly basis, not by seconds. 9

Options for Internet Connection Phone Line –Most common option –Uses your phone line for connection –It needs a computer, a modem, a phone and an account with an ISP. The mobile phone –Wireless Technology –Uses the existing cellular telephone networks –Available anywhere there is a cellular coverage –Portable and perfect for traveling 10

Options for Internet Connection Satellite –Delivers the Internet via satellite dish –Speed quite high –Requires special equipment –High cost Wireless Hot Spots –Wireless and high speed Internet connections –Often provided in airports, hotels, cafes, shopping centers and restaurants –Free for web browsing, but no downloading permitted. 11

Characteristics of BroadBand Fast connection to the Internet –Rapid loading of web pages –Fast downloading of files and attachments –Ability to talk to others (audio and video chatting) and attend video conferences at real time An Always-On connection –Available 24 hours 12

Characteristics of BroadBand Flat Fee Payment –Cost depends on the speed of the service you require, and the amount of downloads and uploads Risk of Intruder Attack –Your computer is in constant contact, which enable hackers to invade your computer connection –Anti-virus programs should be up-to-date –Firewalls are need to prevent unauthorized external users from accessing the system. 13

Security Consideration Identification (تحديد هوية المستخدم) –A User ID is used to logon to a computer or a computer network. It uniquely identifies you to the network Authorization (اثبات هوية المستخدم - التوثيق) –A proof that the user is authorized, either a signature or a password. Authentication (تحديد صلاحيات المستخدم - التفويض) –Specifies the privileges given to users to access certain resources or data. 14

Security Considerations – Password Policies Passwords: are secret words or numbers that must be keyed into a computer system to gain access. To make a password more effective: –Do not share it with others –Change it regularly –Choose your password from a combination of letters and numbers that are difficult to be guessed by others. 15

Security Considerations Data Security Data Security: is a system of safeguards for protecting information technology against disasters, system failure, or unauthorized access that can result in damage or loss. 16

Security Considerations Backups They are copies of all software, files and information which you have in your computer systems. You can use those copies when the original copies are damaged because of physical failure, user errors, accidents or carelessness. 17

Security Considerations Firewall A Firewall, is a set of related programs located at a network server that protects the resources of a private network from users from other networks 18

Security Considerations Viruses Viruses are software programs which are written with the intention of causing inconvenience and disruption or serious damage in a computer system. Files on floppies can spread viruses across a network or via and the internet. There are several types of viruses, some targets specific types of files, others targets the main memory, and others effect the booting of the computer system. 19

Security Considerations How can Viruses enter a computer system Viruses hide on disks. When you access the disk, the virus will infect your computer. It then can spread from one computer to another. When you connect to Internet, you have to make sure that AntiVirus programs are working and are updated. 20

Security Considerations Indicators of Virus infection There are some indicators that show you that your computer might be infected by a virus, such as: –When it runs slower than normal –When it crashes and restarts every few minutes –It restarts on its own and then fails to run normally –When you see unusual error messages 21

Security Considerations Protection against viruses To protect your computer against viruses, do the following: –Use a high-quality anti-virus program such as (Norton and McAfee), and be sure to update it regularly –Always scan your disks and files after using them on other computers –Always scan the files you download from the Internet. The same applies to attachments downloaded from s –Make back-up copies of important documents or files and store them on separate disk 22

Security Considerations Illegal Access Illegal access to the computer information includes copying, modification and locking of the data on the single computer, computer systems and networks. The main object of the illegal access to the computer information is reaching the owner’s information and invading his or her privacy right. 23

Security Considerations Illegal Access Illegal access may cause the following: –The web site is deleted, modified or corrupted –Corporate networks will end up experiencing virus attacks –You will receive threats –Your mail will become available to an unauthorized party –Others will own your private information –Modifications or corruption of the data bases and documents 24

Security Considerations Hacking Hackers are people who create or improve programs and share them with fellow hackers to gain unauthorized access to computer systems. 25

Security Considerations Password Cracker Password Cracking: is the process of recovering passwords from data that has been stored in a computer system. A common approach is to repeatedly try to guess the password. The purpose of password cracking: –Help a user recover a forgotten password –Gain unauthorized access to a system –Check for easily cracked passwords (Used by administrators) 26

Security Considerations Encryption and Decryption Encryption: is the conversion of data into a form that cannot be easily understood by unauthorized people. Decryption: is the process of converting encrypted data back into its original form, so it can be understood. In order to do that, a correct decryption key is required. 27