Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

Republic of the Philippines

BULACAN AGRICULTURAL STATE COLLEGE


Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010

MEMBERS: COURSE Y&S: BSIT 2A


MACAPAGAL, GLAIZA ANGEL B.
LOBOS, EMILYN
SANTIAGO, ELMAR
ABOLAC, ANDREI JUSTINE

TOPIC 7: INTERNET CONTROL AND PRIVACY

Internet Tools
The internet offers a range of services to its consumers. We can upload and download the files/
data via the internet as it is a pool of knowledge. We have the ability to access or obtain
information as needed. It is quite popular because of the variety of senders available on the
Internet. Web services have grown in popularity as a result of these offerings. To
access/exchange a large amount of data such as software, audio clips, video clips, text files, other
documents, etc., we require internet services. We must use an Internet service in order to connect
to the Internet. Data can be sent from Internet servers to your machine via Internet service. Some
of the internet services are FTP, Telnet, VoIP, etc. In this report, we will learn about different
types of internet services.

Internet services
To access/exchange a large amount of data such as software, audio clips, video clips, text files,
other documents, etc., we need internet services. You must use an Internet service in order to
connect to the Internet. Data can be sent from Internet servers to your machine via Internet
service. Some of the commonly used internet services are :

Communication Services
Information Retrieval Services
File Transfer
World Wide Web Services
Web Services
Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010

Directory Services
Automatic Network Address Configuration
Network Management Services
Time Services
Usenet
NewsGroup
Ecommerce

1. Communication Services: To exchange data/information among individuals or organizations,


we need communication services. Following are some of the common communication services:

 IRC (Internet Relay Chat): Subscribers can communicate in real-time by connecting


numerous computers in public spaces called channels.
 VoIP: It stands for Voice over Internet Protocol, which describes how to make and
receive phone calls over the internet. A larger number of people believe VoIP is a viable
alternative to traditional landlines. VoIP (Voice over Internet Protocol) is a technique that
helps us make voice calls via the Internet rather than over a traditional (or analog) phone
line. Some VoIP services may let you call only other VoIP users, while others may let
you call anyone with a phone number, including long-distance, mobile, and
local/international lines. If you have an internet connection you can easily call anyone
without using a local phone service because VoIP solutions are based on open standards,
they can be used on any computer. More than just setting up calls is what VoIP service
providers do. Outgoing and incoming calls are routed through existing telephone
networks by them.
 List Server (LISTSERV): Delivers a group of email recipient’s content-specific emails.
 E-Mail: Used to send electronic mail via the internet. It is a paperless method for sending
text, images, documents, videos, etc from one person to another via the internet.
 User Network (USENET): It hosts newsgroups and message boards on certain topics,
and it is mostly run by volunteers.
 Telnet: It’s used to connect to a remote computer that’s connected to the internet.
 Video Conferencing: Video conferencing systems allow two or more people who are
generally in different locations to connect live and visually. Live video conferencing
services are necessary for simulating face-to-face talks over the internet. The system can
vary from very simple complex, depending on the live video conferencing vendors. A
Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010

live video-based conference involves two or more individuals in separate locations


utilizing video-enabled devices and by streaming voice, video, text, and presentations in
real-time via the internet. It allows numerous people to connect and collaborate face to
face over large distances. Tools available for this purpose are Zoom, FreeConference,
Google Hangouts, Skype, etc.
2. Information Retrieval Services: It is the procedure for gaining access to information/data
stored on the Internet. Net surfing or browsing is the process of discovering and obtaining
information from the Internet. When your computer is linked to the Internet, you may begin
retrieving data. To get data, we need a piece of software called a Web browser. A print or
computer-based information retrieval system searches for and locates data in a file, database, or
other collection of data. Some sites are:

www.geeksforgeeks.org: Free tutorials, millions of articles, live, online, and classroom courses,
frequent coding competitions, industry expert webinars, internships, and job possibilities are all
available. A computer-based system for searching and locating data in a file, database, or another
source.
www.crayola.com: It includes advice for students, parents, and educators on how to be more
creative.
3. File Transfer: The exchange of data files across computer systems is referred to as file
transfer. Using the network or internet connection transferring or shifting a file from one
computer to another is known as file transfer. To share, transfer, or send a file or logical data
item across several users and/or machines, both locally and remotely, we use file transfer. Data
files include – documents, multimedia, pictures, text, and PDFs and they can be shared by
uploading or downloading them. To retrieve information from the internet, there are various
services available such as:

 Gopher: A file retrieval application based on hierarchical, distributed menus that is


simple to use.
 FTP (File Transfer Protocol): To share, transfer, or send a file or logical data item
across several users and/or machines, both locally and remotely.
 Archie: A file and directory information retrieval system that may be linked to FTP
4. Web services: Web services are software that uses defined messaging protocols and is made
accessible for usage by a client or other web-based programs through an application service
provider’s web server. Web services allow information to be exchanged across web-based
applications. Using Utility Computing, web services can be provided.
Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010

5. World Wide Web: The internet is a vast network of interconnected computers. Using this
network, you can connect to the world wide web (abbreviated as ‘www’ or ‘web’) is a collection
of webpages. The web browser lets you access the web via the internet.

6. Directory Services: A directory service is a set of software that keeps track of information
about your company, customers, or both. Network resource names are mapped to network
addresses by directory services. A directory service provides users and administrators with full
transparent access to printers, servers, and other network devices. The directory services are :

 DNS (Domain Number System): This server provides DNS. The mappings of computer
hostnames and other types of domain names to IP addresses are stored on a DNS server.
 LDAP (Lightweight Directory Access Protocol): It is a set of open protocols that are
used for obtaining network access to stored data centrally. It is a cross-platform
authentication protocol for directory services and also allows users to interact with other
directory services servers.
7. Automatic Network Address Configuration: Automatic Network Addressing assigns a
unique IP address to every system in a network. A DHCP Server is a network server that is used
to assigns IP addresses, gateways, and other network information to client devices. It uses
Dynamic Host Configuration Protocol as a common protocol to reply to broadcast inquiries from
clients.

8. Network Management Services: Network management services are another essential internet
service that is beneficial to network administrators. Network management services aid in the
prevention, analysis, diagnosis, and resolution of connection problems. The two commands
related to this are:

 ping: The ping command is a Command Prompt command that is used to see if a source
can communicate with a specific destination & get all the possible paths between them.
 traceroute: To find the path between two connections, use the traceroute command.
9. Time Services: Using facilities included in the operating system, you may set your computer
clock via the Internet. Some services are :
Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010

 Network Time Protocol (NTP): It is a widely used internet time service that allows you
to accurately synchronize and adjust your computer clock.
 The Simple Network Time Protocol (SNTP): It is a time-keeping protocol that is used
to synchronize network hardware. When a full implementation of NTP is not required,
then this simplified form of NTP is typically utilized.
10. Usenet: The ‘User’s Network’ is also known as Usenet. It is a network of online discussion
groups. It’s one of the first networks where users may upload files to news servers and others can
view them.

11. News Group: It is a lively Online Discussion Forum that is easily accessible via Usenet.
Each newsgroup contains conversations on a certain topic, as indicated by the newsgroup name.
Users can use newsreader software to browse and follow the newsgroup as well as comment on
the posts. A newsgroup is a debate about a certain topic made up of notes posted to a central
Internet site and distributed over Usenet, a global network of news discussion groups. It uses
Network News Transfer Protocol (NNTP).

12. E-commerce: Electronic commerce, also known as e-commerce or e-Commerce, is a


business concept that allows businesses and individuals to buy and sell goods through the
internet. Example: Amazon, Flipkart, etc. websites/apps.

SECURITY ISSUES

Although Internet led to many benefits, it also poses a greater potential for security
threats. Below are a number of common Internet security issues.

Hacker
Refers to a person who can gain unauthorized access to (break into) a computer or a
network to commit crimes.

Some things a skilled hacker can do to your computer:

 Hijack your usernames and passwords;


Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010

 Gain access to the personal information (credit card numbers, bank account, Social
Insurance Number, etc.);
 Steal, change, exploit, sell, or destroy data;
 Damage or bring down the system;
 Hold the system hostage to collect ransom;

Malware
Malware (short for malicious software) – a software that is designed to damage, disrupt,
or infect computers.

 Malware is a single term that refers to all the different types of threats to your computer
safety such as virus, Trojan horse, worm, spyware, etc.
 Malware can gain unauthorized access to a computer and continuously run in the
background without the owner’s knowledge.

Computer virus
A specific type of malware that is designed to replicate (copy) and spread from one
computer to another.

 A virus can make a copy of itself over and over again.


 A virus can spread from one computer to another through email attachments, removable
storage devices, networks (Internet messaging services, download infected files …), etc.
 A virus can damage your computer by corrupting system files, sending spam, stealing
data and personal information from your computer, destroying data, deleting everything
on your hard drive, etc.

Trojan horse
A type of malware that looks harmless but can cause harm to a computer system.

 A Trojan misleads users of its true intent.


 A Trojan may claim to get rid of your computer viruses but instead introduce viruses onto
your computer.
 A Trojan can take the form of innocent-looking email attachments, downloads, etc.
 It can be compared to Trojan Horse Virus in a similar way.
 It can be a great way to get behind a tight set of defenses in a system.
Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010

 The Trojan horse appears to be a legitimate gift comparable to a Trojan virus, which
looks like legitimate software.
 The virus will take control of a system and possibly leave it vulnerable to other
"invaders."

Worm
It is similar to a virus (a sub-class of a virus). It is designed to quickly self-replicate and
spread copies of itself from one computer to another.

 The key difference between a worm and a virus is that a worm does not require any
human action to replicate while a virus does. A virus only spreads when a user opens an
affected file whereas a worm spreads without the use of a host file.

Phishing
A scammer uses deceptive emails or websites and tries to obtain valuable personal
information (i.e., username, password, account number, etc.).

 Phishing is a common online scam used by cyber criminals.


 A scammer may use a deceptive email or website appearing to represent a legitimate
firm.

Spyware
A software that secretly monitors (spies) user’s online behaviour and gets sensitive
information about a person or organization without the user’s knowledge.

It is a sort of malicious software or malware that gathers information about a person or


organization and sends it to others in a harmful way to the user. It quietly infiltrates your
devices and begins to control and capture crucial information and data that you save on
your computer. It can also report all your actions, activities etc., to third parties.

 A spyware can record a user’s Web browsing habits, email messages, keystrokes on
online advertisements, personal information, etc., and forward it to a third party.
 Advertisers can use spyware to target specific advertisements to your tastes.
 Criminal organizations can use spyware to collect financial information (banking
accounts, credit card information, password, etc.).
Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010

Social Engineering 
Encompasses all of the non-technical ways an attacker may use to gain access or do
damage to your systems or data. The most common method is the oldest: lying or using
fabricated information to gain trust.

 Obtain confidential contact details.


 Obtain account or credit card numbers.
 Obtain or reset passwords.
 Persuade staff to suspend or cancel essential services.
 Persuade staff to disable critical infrastructure.
 Persuade staff to upload or install malicious software.

Password Attacks
Attacking or maliciously authenticating password-protected accounts is what this term
refers to. This is generally aided by the use of software that accelerates the cracking or guessing
of passwords. Brute forcing, dictionary attacks, password spraying, and credential filling are the
most common methods of attack.
• Brute Forcing – It is a hacking method in which all passwords and data stored on your
computer are cracked thru trial and error. It is an effective method for getting
unauthorized access to individual accounts, as well as systems and networks within
businesses.
 Dictionary Attacks – It is a systematic way of attempting to guess passwords by using
familiar words or phrases.
• Password Spraying – It is a hacking method in which someone attempts the same
password on numerous accounts before switching to another and repeating the procedure
until the account is successfully accessed by the attackers.
• Credential Filling - It is a hacking method in which attackers obtain access to a system or
account by using a list of compromised user credentials. Bots are used by attackers to
accelerate the assumption that many users reuse usernames and passwords across various
platforms.

Tips on how to prevent malware from infecting your computer


 Backup files and store in different locations.
Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010

 Don’t open any suspicious/unknown emails or the websites.


 The second part (the part after the @) of an email should represent the company that
owns the email (domain).
 Don’t download an unknown or suspicious attachment (document, picture, music, game,
video, etc.).
 Do not call fake tech support numbers (tech support scams).
 If you get pop-up window from fake companies offering to help you with a malware
infection, don’t call the number.
 Use a secure and strong password (unique, hard to guess, etc.).
 Install anti-malware/virus software (keep it up to date).
 Scan with antivirus software on a regular basis.

Some free antivirus software

 Comodo Antivirus
 AVAST Free Antivirus
 AVG Antivirus Free
 Avira Antivirus
 Bitdefender Antivirus
 Sophos Home Free
 Kaspersky Free

Some of the ways to prevent and keep your devices safe from malware:

• Keep your devices and software updated - Devices (smartphones, computers, laptops, etc.)
often release updates for their operating systems and software. These updates include fixes that can
improve the security of your system and prevent malware attacks.

• Think carefully before clicking links or downloading anything on the internet - Downloads are
one of the main ways why a person gets malware on his devices. Clicking or opening an unknown link
and attachment to an unknown sender can install malware, such as viruses, spyware or ransomware, on
your device.

• Don't trust pop-up windows asking you to download this software - Open or downloading from
one of these popups (for example, a virus warning) can result in viruses, malicious software called
"trojans," and "keyloggers" that gather and collect passwords and sensitive data. It can cause severe
damage and the inability to use your computer.

• Use antivirus software - When downloading something, always use an antivirus program to scan
your downloaded software or whatever you have downloaded. Antivirus software can also scan your
entire computer for malware. A nice and effective idea to catch malware early and prevent it from
spreading is to run regular scans of your computer.
Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010
Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010

You might also like