Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 22

History of Internet

The internet timeline begins in 1962, before the word


‘internet’ is invented. The world's 10,000 computers are
primitive, although they cost hundreds of thousands of dollars.
They have only few thousand words of magnetic core
memory, and programming them is far from easy.
Domestically, data communication over the phone lines is
an AT and T monopoly. The ‘picture phone’ of 1939, shown
again at the New York World fair in 1964, is still AT&T’s
answer to the future of worldwide communications.
But the four-year old Advanced Research Projects Agency
(ARPA) of the U.S Department of Defense, a future-oriented
funder of ‘high-risk, high-gain research, lays the groundwork
for what becomes the ARPANET and, much later, the Internet.
ARPANET adopted TCP/IP on January 1, 1993, and from
there researches began to assemble the ‘network of network’
that become the modern internet. The online world then took
on a more recognizable form in 1990, when computer
scientist Tim Berners-Lee invented the World Wide Web.
Vint Cerf. Widely known as a ‘Father of the Internet’, Cerf is
the co-designer of the TCP/IP protocols and the architecture
of the internet. In December 1997, President Bill Clinton
presented the U.S National Medal of Technology to Cerf and
his colleague, Robert E. Kahn, for founding and developing
the Internet.
Michael Bauer, the original owner of the internet.org before
Facebook founder and CEO Mark Zuckerberg, discovered
what became of his treasured domain just like anyone else:
while watching Chris Cuomo on CNN
Meaning of Internet
The Internet, sometimes called simply “the Net” is a
worldwide system of computer networks-a network of
networks in which users at any one computer can, if they
have permission, get information from any other computer
(and sometimes talk directly to users at other computers).
It is also a means of connecting a computer to any other
computer anywhere in the world via dedicated routers and
servers. When two computers are connected over the
internet, they can send and receive all kinds of information
such as text, graphics, voice, video, and computer
programs.
Basically, the way the internet works is by connecting
billions of computers together in things called networks.
Networks (“net for short”) are clusters of computers linked
together so that they can send data to each other. That is the
ISP’s network, you are on. The Internet grew out of the
Advanced Research Projects Agency’s Wide Area Network
(then called ARPANET) established by the US Department of
Defense in 1960’s for collaboration in military research
among business and government laboratories.
Later universities and other US Institutions connected to it.
This resulted in ARPANET growing beyond everyone’s
expectations and acquiring the “internet” The development of
hypertext based technology (called World Wide web, WWW,
or just the Web) provided means of displaying text, graphics,
and animations, and easy search and navigation tools that
triggered Internet’s explosive worldwide growth.
Different Types of Internet Connections
There are many ways a personal electronic device can
connect speeds. As technology changes, faster internet
connections are needed to handle those changes, faster
internet connections are needed to handle those changes. I
thought it would be interesting to list some of the different
types of internet connections that are available for home
and personal use, paired with their average speeds.
1. Dial-up (Analog 56k).-Dial up access is cheap but slow.
A modern (Internal or External) connects to the internet
after the computer dials a phone number. This analog
signal is converted to dials a phone number. This analog
signal is converted to digital via the modern and sent over a
land-line serviced by a public telephone network.
Telephone lines are variable in quality and the
connection can be poor at times. The lines regularly
experience interference and this affects the speed,
anywhere from 28k to 56k. Since computer or other device
shares the same line as the telephone, they can’t be active
at the same time.
2. DSL. DSL stands for Digital Subscriber Line. It is an
internet connection that is always “on”. This uses 2 lines so
your phone is not tied up when your computer is
connected. There is also need to dial a phone number to
connect. DSL uses a router to transport data and the range
of connection speed, depending on the service offered, it is
between 128k to 8 Mbps.
3. Cable. Cable provides an internet connection through a
cable modern and operates over cable TV lines. There are
different speeds depending on if you are uploading data
transmissions or downloading. Since the coax dial-up or
DSL telephone lines, you can get faster access. Cable
speeds range from 512K to 20 Mbps.
4. Wireless. Wireless, or Wi-Fi, as the name suggests,
does not use telephone lines or cables to connect to the
internet. Instead, it users radio frequency. Wireless is also
an always on connection and it can be accessed from just
about anywhere. Wireless networks are growing in
coverage areas by the time minute so when I mean access
from just about anywhere, I really meant it. Speeds will
vary, and the range is between 5 Mbps to 20 Mbps.
5. Satellite. Satellite accesses the internet via satellite in
earth’s orbit. The enormous distance that the signal travels
from earth to satellite and back again, provides a delayed
connection compared to cable and DSL. Satellite
connection speeds are around 512k to 2.0 Mbps.
6. Cellular Technology. Cellular technology provides
wireless internet access through cellphones. The speeds
vary depending on the provider, but the most common are
3G and 4G speeds. A 3G is a term that describes a 3rd
generation cellular network obtaining mobiles speeds of
around 2.0 Mbps. 4G is the fourth generation of cellular
wireless standards. The goal of 4G is to achieve peak
mobile speeds of 100 Mbps but the reality is about 21
Mbps currently.
The internet is one of the fastest-growing areas of technical
infrastructure development. Today, information and
communication technologies(ICTs) are omnipresent and the
trend towards digitization is growing. The demand for internet
and computer connectivity has led to the integration of
computer technology into products that have usually functioned
without it, such as cars and buildings. Electricity supply,
transportation infrastructure, military services and logistics-
virtually all modern services depend on the use of ICTs.
Although the development of new technologies is focused
only on meeting consumer demands in western countries,
developing countries can also benefit from new technologies.
With the availability of long-distance wireless communication
technologies such as WiMAX and computer systems that are
now available for less than USD 2006, many more people in
developing countries should have easier access to the internet
and related products and services.
The influence of ICTs on society goes far beyond
establishing basic information infrastructure. The availability
of ICTs is a foundation of development in the creation,
availability and use of network-based services. E-mails
have displaced traditional letters online web representation
is nowadays more important for business than printed
publicity materials; and internet-based communication and
phone services are growing faster than landline
communications.
The availability of ICTs and new network-based services
offer a number of advantages for society in general,
especially for developing countries. ICT applications, such
as e-government, e-commerce, e-education,e-health and
e-environment, are seen as enablers for development, as
they provide an efficient channel to deliver wide range of
basic services in remote and rural areas.
Advantages and Risk of Information and Communication
Technologies (ICTs)
The introduction of ICTs into many aspects of everyday
life has led to the development of the modern concept of
the modern society. This development of the information
society offers great opportunities. Unhindered access to the
information can support democracy, as the flow of
information is taken out of the control of state authorities
(as happened, in Eastern Europe and North America).
Technical developments have improved daily life-for
example, online banking and shopping, the use of mobile
data services and voice over internet protocol (VoIP)
telephony are just some examples of how far the
integration of ICTs into our daily lives advanced.
However, the growth of the information society is
accompanied by new and serious threats. Essential
services such as water and electricity supply now rely on
ICTs. Cars, traffic control, elevators, air conditioning and
telephones also depend on the smooth functioning of ICTs.
Attacks against information infrastructure and internet
services now have the potential to harm society in new and
critical ways. Attacks against information infrastructure and
internet services have already taken place. Online fraud
and hacking attacks are just some examples of computer-
related crimes that are committed on a large scale every
day. The financial damage caused by cybercrime is
reported to be enormous.
In 2003 alone, malicious software caused damages of
up USD 17 billion. By some estimates, revenues from
cybercrime exceeded USD 100 billion in 2007, outstripping
the illegal trade in drugs for the first time. Nearly 60 percent
of businesses in the United States believe that cybercrime
is more costly to them than physical crime. These
estimates clearly demonstrates the importance of
protecting information infrastructures. Most of the above-
mentioned attacks against computer infrastructure are not
necessarily targeting critical infrastructure. However, the
malicious software “Stuxnet” that was discovered in 2010
underlines the threat of attacks focusing on critical
infrastructure. The software, with more than 4000 functions,
focused on computer systems running software that is
typically used to control critical infrastructure.
Committing a cybercrime automatically involves a number of
people and businesses, even if the offender acts alone. Due to
the structure of the internet, the transmission of a simple e-mail
requires the service of a number of providers. In addition to the
e-mail provider, the transmission involves access providers as
well as routers who forward the email to the recipient. The
situation is similar to the downloading of movies containing
child pornography. The downloading process involves the
content provider who uploaded the pictures (for example on a
website), the hosting provider who provided the storage the
storage media for the website, the routers who forwarded the
files to the user, and the finally the access provider who
enabled the user to access the internet. Because of this
involvement by multiple parties, internet service providers have
long since been at the center of criminal investigations
involving offenders who use the ISPs service to commit an
offense.
One of the main reasons for this development is that,
even when the offender is acting from abroad, the providers
located within the country’s national borders are a suitable
subject for criminal investigations without violating the
principle of national sovereignty. The fact that, on the other
hand, cybercrime cannot be committed without the
involvement of providers often do not have the ability to
prevent these crime.
The answer to the question is critical for economic
development of ICT infrastructure. Providers will only
operate their services if they are able to avoid
criminalization within their regular mode of operation. In
addition, law enforcement agencies also have a keen
interest in the question. The law-enforcement agencies
very often depends on cooperation of, and with, internet
providers.
This raises some concern, since limiting the liability of
internet providers for acts committed by their users could
have an impact on the ISPs’ cooperation and support for
cybercrime investigations, as well as on the actual
prevention of crime.
CHAPTER II
What is Cybercrime?
Cybercrime is an activity done using computers and
internet. We can say that it is an unlawful act wherein the
computer either as a tool or target or both.
Cybercrime is any crime that takes place online
primarily online. That can run the gamut from the
aforementioned identity theft and other security breaches to
things like “revenge porn” cyber-stalking, harassment,
bullying and even sexual exploitation. Terrorists are
collaborating more on the internet, moving that most
terrifying of crimes into cyberspace.
History of Cybercrime
The first recorded cybercrime took place in 1820. That is
not surprising considering the fact that the abacus, which is
thought to be the earliest from a computer, has been
around since 3500 B.C in India, Japan and China, the era
of modern computer, however, began with the analytical
engine of Charles Babbage. The first spam email took
place in 1976 when it was sent out over ARPANT. The first
virus was installed on an Apple computer in 1982 when a
high school student, Rich Skrenta, developed the EIK
Cloner.
Cybercrime first started with hackers trying to break into
computer networks. Some did it just for the thrill of
accessing high-level security networks, but others sought
to gain sensitive, classified material. Eventually, criminals
started to infect computer systems with computer viruses,
which led to breakdowns on personal and business
computers.
Banks and other financial institutions were among the fist
large scale computer users in the private sector, for
automate payroll and accounting functions. Therefore,
fraud in a computer scheme emerged. One of the first
cases cited as instance of the computer fraud involved
equity-funding Corporation in the US, fraud was simple.
The frauds succeed because the auditors and regulators
accepted computer as definitive evidence of policies and
did not ask original documentation. When the fraud was
discovered, some 64,000 out of 97,000 policies allegedly
issued by the company proved to be false, almost 1 billion
pounds estimated to be loss.
Therefore as the technological advance the number of
cybercrime cases increased. There is no reliable and
precise statistics of the losses the victims gain as the fact
that victims do not detect many of these crimes. Therefore,
fights against computer crime began.
Several individuals were engage in the fight against
computer crime from the early development. The founder
and father of the knowledge of computer crimes are by
many observers considered to be Donn B. Parker, USA. He
was involved in the research of computer crime and
security from the early 1970.
He served as Senior Computer Security Consultant at the
SRI International (Standard Research Institute), and was
the main author of the first federal manual of law
enforcement in the USA; “Computer Crime-Criminal Justice
Resource Manual” (1979). This manual became soon an
encyclopedia also for law enforcement outside US.

You might also like