Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

Assistant Lecturer Assad H.

Thary Al-Ghrairi

The report talking about two parts:-

1) How to search to internet.


2)
 What is the antivirus program?
 What is the Internet Security?
 What are the differences between them?

1) How to search to internet


Introduction
System on the Internet that will conduct a search of its own database of
websites based on terms you have entered. As a result, you will be shown a list
of web addresses that contain the term you were looking to find. An example of
a popular search engine is www.google.com.
How to do internet research
The internet is a wonderful resource. It has all the information that students are
likely to need about every topic they are studying. Internet research can be a
very effective (and enjoyable) way of finding the information that you need.
However, it is also very easy to spend a lot of time searching on the web and
still not find what you are looking for. If you follow the 'rules' below, you can
be sure to avoid wasting too much of your precious time.

Rule 1 - Be sure you know exactly what information you have to find.

The more exactly you know what you are looking for, the easier it will be to
find it.

Rule 2 - Use multiple-word searches.

This is related to Rule 1. Let's say you have to find out about Shackleton's third
journey to Antarctica. Do not just type in Shackleton. Type Shackleton third
journey Antarctica. You will get fewer results, but you can be confident that
these will be relevant to the information you need.

Rule 3 - Enclose phrases in quotation marks.

~1~
Assistant Lecturer Assad H. Thary Al-Ghrairi

Suppose you had to find out which was the world's most dangerous animal.
Typing the most dangerous animal in Google returns almost 100 million hits. If
you enclose the phrase in quotation marks in "the most dangerous animal", you
get just over 600,000. This is still a huge number, but you can be more sure the
results will be relevant.

Rule 4 - Use the minus sign to filter unwanted results.

Imagine you are searching for information about the Hilton hotel organization.
If you just type in Hilton, you will get a huge number of pages with
information about Paris Hilton, a famous Hollywood star. If, however, you type
in Hilton -Paris, the search results will not include any pages about the actress.

In Google, the Advanced Search will help you use this (Boolean) logic
correctly; or you can read their help page. You could also ask your teacher or
librarian to show you.

Rule 5 - Learn how to skim the search hits for webpages worth
opening.

If you have used good keywords/keyword groups and correct Boolean logic,
you should have a not-too-long list of links that contain the information you are
looking for. These links come with one or two lines of information about the
webpage they lead to. If you read this information with some care, you can
avoid clicking on irrelevant pages. It is very time-wasting to wait a minute or
so for a page to load, only to find that it is useless to your needs.

Rule 6 - Be sure to evaluate the reliability of the information you


find.

Anyone can put information on the internet. Not all of the information is
correct or up-to-date. If you find a webpage that has unusual colors/fonts or
contains many spelling mistakes, you should be very careful about trusting the
information it contains. See if there are details about the author somewhere on
the website, or ask your teacher/librarian to advice.

Rule 7 - Research in your own language.

Much of the information on the web that is in English will be very hard for
ESL students. An excellent idea is to research in your own language. You can
then read the corresponding information in English with a far better chance of
understanding it.

Rule 8 - Remember: you don't always need to use the internet.

School libraries are full of books and other resources containing most of the
information you need. If you use a library book, you can usually be sure of its
reliability (although it may not be up-to-date). Libraries have access to
~2~
Assistant Lecturer Assad H. Thary Al-Ghrairi

excellent reference resources such as the Encyclopedia


Britannica or ProQuestmagazine database. It is often best to start research in
the library and to use a web search engine only if the library does not have
what you are looking for.

Review the reference resources in the Frankfurt International Upper School


Library.

Rule 9 - Filter your results according to their reading level.

You can ask Google to show you only the pages that are written at a basic (or
intermediate, or advanced) level of difficulty. [Watch this video to learn how to
do this.]

Rule 10 - Remember: finding the right information is only the


beginning.

Once you have found the information you are looking for, you will need to do
something with it. Often you will make notes on it before putting it into a piece
of writing of your own. In this case, be sure to keep the URLs (web addresses)
and titles of the web pages.

Rule 11 = Rule 1: Be sure you know exactly what information you


have to find ..

How Search Engines Work


Search engines are online software programs designed to help users locate
relevant Web sites, and are some of the most highly trafficked sites out there.
Understanding how search engines work can help you get the results you want
and sort through the irrelevant, misleading results you’ll undoubtedly
encounter.
Most information is found on the Internet by utilizing search engines. A search
engine is a web service that usesweb robots to query millions of pages on
the Internet and creates an index of those web pages. Internet users can then
use these services to find the information they're looking for. When searching
for information on the Internet keep the below things in mind.
Surround searches in quotes
If you are searching for multiple common words such as computer and help, it
is a good idea to place quotes around the full search to get better results. For
example, "computer help". This trick can also be used in parts of your search
query. For example, Microsoft "computer help" would search for anything
containing 'Microsoft' and that also has "computer help" together. Finally, you
can also do multiple words surrounded in quotes. For example, "Microsoft
Windows" and "computer help" would refine your results even more.

~3~
Assistant Lecturer Assad H. Thary Al-Ghrairi

Insights for How Search Engines Work


 When you enter a keyword (that is, a significant term or phrase related to
the Web site you hope to find) into a search engine, you're not searching the
entirety of the Web. Rather, you're searching the list of Web sites that the
search engine has indexed (which can be in the billions). If the search
engine hasn't added a Web site to its index, it cannot include it in the search
results.

 Search engines sift through text on Web pages using computer programs
called spiders. "Spiders" crawl on the "Web," get it?

 Spiders are very fast but they can travel only through the hyperlinks that
connect Web sites. If a page isn't linked to any other pages, spiders can't
find it. The part of the World Wide Web that is not linked is called the
"invisible Web" or the "deep Web." It may contain information highly
relevant to your search. To find resources on the invisible Web, see "The
Invisible Web" and "Web Directories" sections of this guide.

 Search engines don't know why you want information—they simply find
information according to the words you've entered. These results are not
recommendations; search engines don't rank their results by the content of
each site. They use mathematical equations (or algorithms) to rank them,
and the formula may have little to do with a site's legitimacy or value to
you.

 Companies have gotten wise to the way that search engines work. This has
created an environment where Web pages are created and customized with
the goal of appearing near the top of a search engine’s results list regardless
of their credibility or usefulness. This practice is called "search engine
optimization," and it's one reason that not all of your search results will be
relevant or trustworthy.

 The "Help," "About" or "Preferences" sections of a search engine site often


have helpful tips for using that particular search engine to your advantage.
For example, if you’re looking for a definition, Google tells you to add
“define:” to the beginning of your keyword. Thus, a search for “define:
search engine” in Google will give you a list of definitions for “search
engine” from around the Web. Similar tricks are innumerable, and all
search engines have them. Google has a complete list of “search operators.”

 There is more than one kind of search engine. General search engines, also
called “horizontal” search engines, search for all types of information.
“Vertical” search engines search only within certain topics. “Meta” search
engines search other search engines. Using the kind that does exactly what
you need can improve your search results.

~4~
Assistant Lecturer Assad H. Thary Al-Ghrairi

 If you have trouble finding the information you want, ask yourself: Is my
keyword too general? Too specific? Are there useful synonyms? Could
related topics be more effective?

 Do you get so many results that you can’t find the sites that answer your
question? Here’s how to reduce the number of results:
Use more than one word in your search. For example, type "chicken salad
sandwich" instead of just "sandwich."
Try to be more specific in your terms. If you want a panini, type "panini"
instead of "sandwich."
Use "and" instead of simply typing two words (for example, "soup AND
sandwich"), and your results will include only sites that contain both terms.
Use "not" to exclude certain terms from your results: "sandwich NOT
bologna."

 Want more search results? Try using fewer words when you search. Typing
"Reuben sandwich" instead of "classic Reuben sandwich" will yield more
results. By using the term "or" and trying a few related words at once
("sandwich OR gyro OR panini"), you increase your results exponentially.

Insights for Choosing a Search Engine


 A majority of search engines have features that allow users to search
specifically for images, videos, news, blogs and much more. Links to these
categories are generally found above the search bar, and need only to be
clicked to activate the specialty search features.

 Each search engine’s index of sites is unique; each has a different formula
for spidering through them. This means there can be significant variation in
the results that different engines generate for the same search terms. For
example, visit the site Zuula. Zuula allows you to search across multiple
platforms by putting them all in one location. After entering your search
term, you'll be given a typical-looking results page. What makes it unique is
that by clicking the tabs listed across the top of the page, you'll be given the
results for your search term on each of the search engines listed. Google,
Yahoo, Live, Gig blast, Exalted, Alexia, Entire web, Mahalo and Mojeek
are all in one place.

 Many search engines draw on the technologies of a select few. For


instance, HotBot provides a way to toggle between results on Yahoo, MSN
and the visual search engine Lycos. AOL Search relies on Google, and
according to Search Engine Watch, the results are very similar.

Important!

~5~
Assistant Lecturer Assad H. Thary Al-Ghrairi

You may not always get the results you are looking for so you will need to play
with searchable terms. Using more words in combination, and especially more
specific words will help. Be aware that not all websites that are found in the
results are appropriate to your search. Read the blurb under the result name on
the list before you click. In addition, do not click on anything that seems
inappropriate, too good to be true, or dangerous. Use your gut instinct before
you click. There are many websites out there on the Internet that will mislead
and try to take advantage of beginners. Use caution.

2)
a.What is the antivirus program
Introduction
Antivirus program alternatively referred to as an Antivirus Software, AVS,
antivirus, or just AV. An antivirus program is a software program designed to
protect your computer or network against computer viruses. If and when a
virus is detected, the computer will display a warning asking what action
should be done, often giving the options to remove, ignore, or move the file to
the vault and Anti-virus programs scan for viruses and related malware by
examining the files on your system for patterns of data that have been
identified as being viruses. On some regular basis the database of patterns the
programs use is updated to contain the latest information on known viruses.
What is Anti-Virus Software?
Anti-virus software is a program or set of programs that are designed to
prevent, search for, detect, and remove software viruses, and other malicious
software like worms, Trojans, adware, and more. These tools are critical for
users to have installed and up-to-date because a computer without anti-virus
software installed will be infected within minutes of connecting to the internet.
The bombardment is constant, with anti-virus companies update their detection
tools constantly to deal with the more than 60,000 new pieces of malware
created daily.

There are several different companies that build and offer anti-virus software
and what each offers can vary but all perform some basic functions:

 Scan specific files or directories for any malware or known malicious


patterns
 Allow you to schedule scans to automatically run for you

~6~
Assistant Lecturer Assad H. Thary Al-Ghrairi

 Allow you to initiate a scan of a specific file or of your computer, or of a


CD or flash drive at any time.
 Remove any malicious code detected –sometimes you will be notified of
an infection and asked if you want to clean the file, other programs will
automatically do this behind the scenes.
 Show you the ‘health’ of your computer

Do antivirus companies create computer viruses?

Answer
No. Antivirus companies know the risks involved when dealing with computer
viruses and the potential dangers of viruses getting out in the wild. Antivirus
companies do not hire people who've made viruses, and the whole concept of
antivirus companies creating viruses is a myth, urban legend and conspiracy
theory.

But, creating viruses helps increase antivirus companies profits.


There are plenty of viruses and other malware to justify the needs of
antivirus programs. If antivirus companies really believed that distributing
viruses would help increase profits or sales, they would create viruses and
other malware for other platforms. Such as the Apple Macintosh and *nix
where virus threats are not as high with Microsoft Windows users.
Antivirus companies are able to maintain and increase their products by
staying up-to-date at detecting, and cleaning all computer viruses and other
threats.

Where is your proof that antivirus companies don't do this?


1. Creating computer viruses is not that difficult for someone who's
familiar with computers and programming. Creating viruses would not
help in the detection or prevention of viruses.
2. An antivirus company couldn't protect itself from the virus before it was
released without raising suspicion. Therefore, it would infect its own
product, causing customer dissatisfaction.
3. There are plenty of other users who are not affiliated with antivirus
companies who already do this.
4. The code that makes up a virus is reviewed by dozens of security experts
when a virus gets out in the wild. Analyzing that code could trace its
origins back to the antivirus company.

~7~
Assistant Lecturer Assad H. Thary Al-Ghrairi

5. An antivirus company could be held liable for creating viruses, which


would not only make the company look bad but could cause a lot of
lawsuits.

What are the current available antivirus programs?

Answer
Below is a complete list, in alphabetical order, of companies who provide
antivirus programs and the platforms they provide protection for. Clicking on
the company link will take you to information about that company, including
their web page.

Company Windows Apple Linux Mobile Free?


ACD Systems Yes No No No No
AntiVir Yes No Yes No Yes
AVG Yes No No No Yes
Avast Yes No No Yes Yes
Avira Yes No Yes Yes Yes
BitDefender Yes No Yes Yes No
BullGuard Yes No No Yes No
ClamWin Yes No No No Yes
Comodo Yes Yes Yes No Yes
ESET NOD32 Yes Yes Yes Yes No
F-Prot Yes No Yes No No
Kaspersky Yes Yes Yes Yes No
McAfee Yes Yes Yes Yes No
MSE Yes No No No Yes
Network Associates Yes Yes Yes Yes No
Panda Software Yes No Yes No No
RAV Yes Yes Yes No No
Sophos Yes Yes Yes No No
Symantec (Noton) Yes Yes Yes Yes No
Trend Micro Yes No No Yes No

~8~
Assistant Lecturer Assad H. Thary Al-Ghrairi

Vipre Yes No No No No
Webroot Yes No No No No

b) What is the Internet Security


Internet security is a branch of computer security specifically related to the
Internet, often involving browser security but also network security on a more
general level as it applies to other applications or operating systems on a whole.
Its objective is to establish rules and measures to use against attacks over the
Internet. The Internet represents an insecure channel for exchanging
information leading to a high risk of intrusion or fraud, such as phishing.
Different methods have been used to protect the transfer of data, including
encryption.
Types of security
1) Network layer security
TCP/IP can be made secure with the help of cryptographic methods and
protocols that have been developed for securing communications on the
Internet. These protocols include SSL and TLS for web traffic, PGP for email,
and IPSec for the network layer security.
2) IPSec Protocol
This protocol is designed to protect communication in a secure manner using
TCP/IP. It is a set of security extensions developed by IETF, and it provides
security and authentication at the IP layer by using cryptography. To protect
the content, the data is transformed using encryption techniques. There are
two main types of transformation that form the basis of IPSec: the
Authentication Header (AH) and Encapsulating Security Payload (ESP).
These two protocols provide data integrity, data origin authentication, and
anti-replay service. These protocols can be used alone or in combination to
provide the desired set of security services for the Internet Protocol (IP) layer.
The basic components of the IPsec security architecture are described in terms
of the following functionalities:

 Security protocols for AH and ESP


 Security association for policy management and traffic processing
 Manual and automatic key management for the internet key exchange
(IKE)
 Algorithms for authentication and encryption
The set of security services provided at the IP layer includes access control,
data origin integrity, protection against replays, and confidentiality. The
algorithm allows these sets to work independently without affecting other

~9~
Assistant Lecturer Assad H. Thary Al-Ghrairi

parts of the implementation. The IPsec implementation is operated in a host or


security gateway environment giving protection to IP traffic.
3) Security token
Some online sites offer customers the ability to use a six-digit code which
randomly changes every 30-60 seconds on a security token. The key on the
security token have mathematical computations built-in and manipulate
numbers based on the current time built into the device. This means that
every thirty seconds there's only a certain possible array of numbers which
would be correct to validate access to the online account. The website that
the user is logging into would be made aware of that devices' serial number
and therefore would know the computation and correct time built into the
device to verify that the number given is indeed one of the handful of six-
digit numbers that would work in that given 30-60 second cycle. After the
30-60 seconds the device will present a new random six-digit number
which can log into the website.
4) Electronic mail security (E-mail)
Background
Email messages are composed, delivered, and stored in a multiple step
process, which starts with the message's composition. When the user
finishes composing the message and sends it, the message is transformed
into a standard format: an RFC 2822 formatted message. Afterwards, the
message can be transmitted. Using a network connection, the mail client,
referred to as email (MUA), connects to a mail transfer agent (MTA)
operating on the mail server. The mail client then provides the sender’s
identity to the server. Next, using the mail server commands, the client
sends the recipient list to the mail server. The client then supplies the
message. Once the mail server receives and processes the message, several
events occur: recipient server identification, connection establishment, and
message transmission. Using Domain Name System (DNS) services, the
sender’s mail server determines the mail server(s) for the recipient(s). Then,
the server opens up a connection(s) to the recipient mail server(s) and sends
the message employing a process similar to that used by the originating
client, delivering the message to the recipient(s).
5) Pretty Good Privacy (PGP)
PGP provides confidentiality by encrypting messages to be transmitted or
data files to be stored using an encryption algorithm such Triple
DES or CAST-128. Email messages can be protected by using
cryptography in various ways, such as the following:

 Signing an email message to ensure its integrity and confirm the


identity of its sender.
 Encrypting the body of an email message to ensure its
confidentiality.
~ 10 ~
Assistant Lecturer Assad H. Thary Al-Ghrairi

 Encrypting the communications between mail servers to protect the


confidentiality of both the message body and message header.
The first two methods, message signing and message body encryption,
are often used together; however, encrypting the transmissions between
mail servers is typically used only when two organizations want to
protect emails regularly sent between each other. For example, the
organizations could establish a virtual private network (VPN) to encrypt
the communications between their mail servers over the Internet.
[3] Unlike methods that can only encrypt a message body, a VPN can
encrypt entire messages, including email header information such as
senders, recipients, and subjects. In some cases, organizations may need
to protect header information. However, a VPN solution alone cannot
provide a message signing mechanism, nor can it provide protection for
email messages along the entire route from sender to recipient.
6) Multipurpose Internet Mail Extensions (MIME)
MIME transforms non-ASCII data at the sender's site to Network
Virtual Terminal (NVT) ASCII data and delivers it to client's Simple
Mail Transfer Protocol (SMTP) to be sent through the Internet The
server SMTP at the receiver's side receives the NVT ASCII data and
delivers it to MIME to be transformed back to the original non-ASCII
data.

Secure/Multipurpose Internet Mail Extensions (S/MIME)


S/MIME provides a consistent means to securely send and receive
MIME data. S/MIME is not only limited to email but can be used with
any transport mechanism that carries MIME data, such Hypertext
Transfer Protocol (HTTP).
7) Message Authentication Code
A Message Authentication Code is a cryptography method that uses
a secret key to encrypt a message. This method outputs a MAC value
that can be decrypted by the receiver, using the same secret key used by
the sender. The Message Authentication Code protects both a
message's data integrity as well as its authenticity.
8) Firewalls
A firewall controls access between networks. It generally consists of
gateways and filters which vary from one firewall to another. Firewalls
also screen network traffic and are able to block traffic that is
dangerous. Firewalls act as the intermediate server between SMTP and
HTTP connections.
Understanding how the Internet works and the security
threats you face.

~ 11 ~
Assistant Lecturer Assad H. Thary Al-Ghrairi

When you access the Internet, your computer sends a message over the Web
that uniquely identifies your computer and where it is located. This allows the
Information you’ve requested to be returned to you. Often, this requested
information carries with it unwanted hidden software created by hackers and
Online criminals. This software installs itself on your computer and can either
be just a nuisance or pose a more serious threat to you, your identity and
sensitive financial information. Usually the nuisances are visible and easy to
identify, while the more dangerous threats are typically invisible, silent, and
difficult to detect until it’s too late. The key to a safe, enjoyable Internet
experience understands the difference between what a threat is and what isn’t.

c) What are the difference Antivirus and Internet Security


Antivirus vs. Internet Security
Antivirus applications might be the oldest form of protection from malicious
programs that most people can remember. At the beginning, it simply
scanned for the signatures of any virus that it knows. It cannot prevent any
virus that it does not recognize. Later on, more advanced features like
heuristics were added. Heuristic is a method of monitoring the activities of a
specific program and deciding whether it behaves like a virus. It would then
alert the user and ask for the best course of action. Though, it might not be
100% accurate, it provides more security compared to the old method.
Internet Security software is not a single program, but is usually composed
of more than one application that aims to provide total protection to its user.
Still at its core is an antivirus program. But aside from an antivirus program,
the other applications in the suite provide more security from the threats that
arose along with the internet age. Another application that is essential in an
internet security suite is a firewall. A firewall restricts other people on the
internet from gaining access to your computer or network by refusing
connection requests and any other communications from the outside and
even from applications that are running on your computer. There are also
applications that can protect you from spyware programs that can send your
personal and other information to entities outside and other types of
malware.
For most people who are not that adept at these things, Internet Security
software is the best choice, as it combines everything you need into a neat
single package, though a bit more expensive. But as we all know, some of
the software in the package might be worse than what you can get from
another. Because of this, more advanced users prefer the freedom of
choosing each application separately. Some people might not also need
everything in the Internet Security suite as they already have an alternative
solution; a good example of which is the firewall. Having firewall software

~ 12 ~
Assistant Lecturer Assad H. Thary Al-Ghrairi

would be redundant if you already have hardware with built in firewall.

Conclusion
1. Antivirus is a class of software that detects and cleans out virus infected
files while Internet Security is a suite of applications that aims to
protect users against threats from the internet
2. Internet Security suites usually include an antivirus application among
other programs
3. Internet security suites commonly includes a firewall, anti malware, anti
spyware, and email protection programs
4. Internet Security suites often cost more than stand-alone antivirus
applications
5. Antivirus as its name usually only has protection for virus and other
maliciоus sоftware like Trоjans and wоrms
6. Chооsing internet security оver antivirus is оnly a matter of chоice. But
you should remember that antivirus alоne cannot give you full
protection оver your PC.
7. The right comparison would be to compare an internet security with a
handful оf prоgrams cоmbined tоgether tо build a perfect matchup fоr
the former.
References
1) "What is antivirus software?". Microsoft.
2) Jump up "How Antivirus Software Can Slow down Your Computer".
Support.com Blog. Retrieved 07/26/10.
3) Jump up "Softpedia Exclusive Interview: Avira 10". Ionut Iliescu.
Softpedia. 14 April 2010. Retrieved 2011-09-11.
4) Jump up "Norton AntiVirus ignores malicious WMI instructions".Munir
Kotadia. CBS Interactive. 21 October 2004. Retrieved 2009-04-05.
5) Jump up Jump up Rhee, M. Y. (2003). Internet Security: Cryptographic
Principles, Algorithms and Protocols. Chichester: Wiley. ISBN 0-470-
85285-2.
6) Jump up Jump up Virtual Private Network
7) Jump up Jump up Network Virtual Terminal
8) Jump upJump up "HTTP - Hypertext Transfer Protocol Overview".
W3.org. Retrieved 2013-04-20.
9) Jump upJump up "What Is a Message Authentication Code?".
Wisegeek.com. Retrieved 2013-04-20.

~ 13 ~
Assistant Lecturer Assad H. Thary Al-Ghrairi

10)Jump upJump up Rebbapragada, Narasu. All-in-one Security. Retrieved


19 November 2010.
11)Jump upJump up Larkin, Eric. Build Your Own Free Security Suite.
Retrieved 19 November 2010.
12) Jump up to: Jump up to: a b W3Schools.com. Browser Statistics.
Retrieved 1 August 2011.
13)Jump upJump up Bradly, Tony. "It's Time to Finally Drop Internet
Explorer 6" . Retrieved 19 November 2010.

~ 14 ~

You might also like