Professional Documents
Culture Documents
Lec 4 - Online Essentials
Lec 4 - Online Essentials
Lec 4 - Online Essentials
• Thus internet helps in transfer of messages through mail, chat, video & audio
conference, etc.
• Indeed, the term computer network is beginning to sound a bit dated, given the many
nontraditional devices that are being hooked up to the Internet.
• In Internet jargon, all of these devices are called hosts or end systems.
• There are many types of communication links, which are made up of different types of
physical media, including coaxial cable, copper wire, optical fiber, and radio spectrum.
• Different links can transmit data at different rates, with the transmission rate of a link
measured in bits/second.
• When one end system has data to send to another end system, the sending end system
segments the data and adds header bytes to each segment.
▸ An Internet client is a client who access services provided by the servers in the
Internet.
12
13
Mail service
▸ Also known as webmail, online email service providers enable users to send,
receive and review e-mail from their Web browsers.
▸ Email services offer easy access and storage of e-mail messages for users who are
not connected to the Internet from their usual location.
▸ In contrast with postal mail, electronic mail is fast, easy to distribute, and
inexpensive.
▸ Modern mails can include hyperlinks, HTML, formatted text, images, sound and
video etc.
14
A high-level view of the Internet e-mail system
15
16
Email
• Electronic mail is a method of exchanging messages between people
using electronic devices.
▸ Webmail means emails can be sent and received from any computer, anywhere in the
world, that has an internet connection.
▸ Cheap - when using broadband, each email sent is effectively free. Dial-up users are
charged at local call rates but it only takes a few seconds (for conventional email, eg
text only) to send an email.
20
Disadvantages of emails
▸ The recipient needs access to the internet to receive email.
▸ Viruses are easily spread via email attachments (most email providers scan emails
for viruses on your behalf).
▸ No guarantee the mail will be read until the user logs on and checks their email.
21
Email and Calendars
▸ How to Use Gmail + Keep Notes + Google Calendar Together:
https://youtu.be/pgp73l1MGaI
▸ Outlook Calendar Tips & Tricks : https://youtu.be/6BU_ELSsDLc
▸ Outlook Tips & Tricks to Take Control of your Inbox :
https://youtu.be/_DTI-9DnV_g
22
INTERNET TERMS
• URL (Uniform Resource Locator)
• All the information that is contained on the web is held within web sites. Each
web site has a unique internet address, for easy identification. These addresses
are known as Uniform Resource Locators(URLs).
▸ In simple terms, The World Wide Web is a way of exchanging information between
computers on the Internet, tying them together into a vast collection of interactive
multimedia resources.
Note
Internet and Web is not the same thing: Web uses internet to pass over the information.
The internet is a massive network of networks, a networking infrastructure. The World Wide Web, or simply web, is a way of
accessing information over the medium of the internet.
24
Evolution
25
WWW Operation
26
Web Browser
▸ Web Browser is an application software that allows us to view and explore information
on the web.
▸ User can request for any web page by just entering a URL into address bar.
▸ Web browser can show text, audio, video, animation and more. It is the responsibility
of a web browser to interpret text and commands contained in the web page.
▸ Earlier the web browsers were text-based while now a days graphical-based or voice-
based web browsers are also available.
27
Browser Vendor
Safari Apple
28
Web page
▸ Web page is a document available on world wide web.
▸ Web Pages are stored on web server and can be viewed using a web browser.
▸ A web page can contain huge information including text, graphics, audio, video and
hyper links. These hyper links are the link to other web pages.
▸ There is unique Uniform Resource Locator (URL) is associated with each web page.
29
▸ There are two types of web pages.
Static Web page
Dynamic Web page
Static
Dynamic
30
Static web pages
▸ Static web pages are also known as flat or stationary web page.
▸ They are loaded on the client’s browser as exactly they are stored on the web
server.
▸ User can only read the information but can’t do any modification or interact with
the information.
▸ Static web pages are only used when the information is no more required to be
modified.
31
Dynamic Web page
▸ Dynamic web page shows different information at different point of time.
▸ It is possible to change a portion of a web page without loading the entire web
page.
▸ Basically web server is used to host the web sites but there exists other web
servers also such as gaming, storage, FTP, email etc.
33
Search Engine
▸ Search Engine refers to a huge database of internet resources such as web
pages, newsgroups, programs, images etc.
▸ User can search for any information by passing query in form of keywords or
phrase.
▸ It then searches for relevant information in its database and return to the user.
34
Search Engine
• What is search engine?
• Is a tool helping us to search information.
A program that searches for and identifies items in a database that correspond to keywords or
characters specified by the user, used especially for finding particular sites on the World Wide Web .
• Domain Name, System or DNS, is the most recognized system for assigning addresses to Internet web servers.
• Domain names are used to identify one or more IP addresses. Domain names are used in URLs to identify particular
Web pages. For example, in the URL http://www.gmail.com/index.html, the domain name is gmail.com
HYPERLINK
• A Hyperlink is a link from a hypertext document to another location, activated by clicking on a
highlighted word or image.
• SMS
• Short Message Service (SMS) is a text messaging service component of phone, Web, or mobile
communication systems.
• MMS
• Multimedia Messaging Service (MMS) is a standard way to send messages that include multimedia content
to and from mobile phones.
45
46
▸ Amazon drive
47
▸ box
48
▸ Citrix share file
49
▸ Dropbox
▸ Google drive
▸ MediaFire
▸ OneDrive
50
Online security
▸ Security attack: Any action that compromises the security of information owned by
an organization.
51
Threat
Attack
▸ An assault on system security that derives from an intelligent threat; that is, an
intelligent act that is a deliberate attempt (especially in the sense of a method or
technique) to evade security services and violate the security policy of a system.
52
Security Attacks
▸ A useful means of classifying security attacks, is in terms passive attacks and active
attacks.
▸ A passive attack attempts to learn or make use of information from the system but
does not affect system resources.
53
54
Viruses
▸ Virus (Vital Information Resource Under Siege): Computer viruses are the malicious
programs having the ability to replicate and execute themselves. They can attach
themselves to the other program, files or data stored in the system automatically
without any instructions from the user.
▸ It can enter in a computer by different means like when one copies some data from the
virus infected system to another uninfected system or while downloading some
programs from the Internet or it can come to system as an e-mail message.
55
What Is a Trojan horse?
▸ A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after.
▸ The Trojan Horse, at first glance will appear to be useful software but will actually do damage once
installed or run on your computer.
▸ Those on the receiving end of a Trojan Horse are usually tricked into opening them because they
appear to be receiving legitimate software or files from a legitimate source.
▸ When a Trojan is activated on your computer, the results can vary.
▸ Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding
silly active desktop icons) or they can cause serious damage by deleting files and destroying
information on your system.
▸ Trojans are also known to create a backdoor on your computer that gives malicious users access to
your system, possibly allowing confidential or personal information to be compromised.
▸ Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate .
56
Trojan Horse
▸ A computer program that appears to be useful software but actually causes damage
once installed or executed on the computer system is known as a Torjan horse.
▸ Torjan effects are very dangerous as they allow the computer to be remotely
controlled by someone else and can cause loss of the personal and confidential
information.
▸ They are not self-replicating and the only way, they can spread is copying to the other
system, e.g. Zeus, Beast, Back Orifice, The Blackhole Exploit Kit etc.
57
How do Trojans work?
▸ Here’s a Trojan malware example to show how it works.
▸ You might think you’ve received an email from someone you know and click on what
looks like a legitimate attachment. But you’ve been fooled.
▸ The email is from a cybercriminal, and the file you clicked on — and downloaded and
opened — has gone on to install malware on your device.
▸ When you execute the program, the malware can spread to other files and damage
your computer.
▸ How? It varies. Trojans are designed to do different things. But you’ll probably wish
they weren’t doing any of them on your device.
58
Phishing
▸ The goal is to trick the email recipient into believing that the message is something
they want or need.
▸ Phishing is a type of social engineering attack often used to steal user data,
including login credentials and credit card numbers. It occurs when an attacker,
masquerading as a trusted entity, dupes a victim into opening an email, instant
message, or text message.
59
There are various phishing techniques used by
attackers:
▸ Embedding a link in an email that redirects your employee to an unsecure website
that requests sensitive information
▸ Installing a Trojan via a malicious email attachment or ad which will allow the
intruder to exploit loopholes and obtain sensitive information
▸ Spoofing the sender address in an email to appear as a reputable source and request
sensitive information
60
Few steps that can take to protect against phishing:
▸ Deploy a SPAM filter that detects viruses, blank senders, etc.
▸ Keep all systems current with the latest security patches and updates.
▸ Install an antivirus solution, schedule signature updates, and monitor the antivirus status on all
equipment.
▸ Develop a security policy that includes but isn't limited to password expiration and complexity.
▸ Convert HTML email into text only email messages or disable HTML email messages.
61
Hacking
▸ Hacking refers to activities that seek to compromise digital devices, such as
computers, smart phones, tablets, and even entire networks.
▸ Hacking might not always be for malicious purposes. Thus kind of hacking used
for fruitful purposes is mostly referred to as Ethical hacking.
62
Types of hacking
▸ Social Engineering & Phishing
Many types of social engineering bait come in the form of phishing emails, whereas
a clever hacker sends you a message that looks like it’s from someone you know,
asking you to do something, like wire them money, or to click/download an infected
63
▸ Malware-Injecting Devices
Cybercriminals can use hardware to sneak malware onto your computer. You may
have heard of infected USB sticks, which can give hackers remote access to your
device as soon as they’re plugged into your computer.
All it takes is for one person to give you a malware-ridden USB stick, and by simply
plugging it into your computer, you’re infected.
64
▸ Missing Security Patches
Security tools can become outdated as the hacking landscape advances, and require
frequent updates to protect against new threats. However, some users ignore update
notifications or security patches, leaving themselves vulnerable.
65
▸ Cracking Passwords
Hackers can obtain your credentials through a number of means, but commonly
they do so through a practice called keylogging. Through a social engineering
attack, you could accidentally download software that records your keystrokes,
saving your usernames and passwords as you enter them. This and other forms of
“spyware” are malware that track your activity until a hacker has what they need
to strike.
There are also password cracking programs that can run letter and character
combinations, guessing passwords in a matter of minutes, even seconds.
66
▸ Distributed Denial-of-Service (DDoS)
This hacking technique is aimed at taking down a website, so that a user cannot access
it or deliver their service. DoS attacks work by inundating the target’s server with large
influxes of traffic. The amount is so frequent and high that it overloads the server by
giving it more requests than it can handle. Ultimately, your server crashes and your
website goes down with it.
Larger businesses can get hit by a Distributed Denial of Service (DDoS) attack, which is
a synchronized attack on more than one server or website, potentially taking down
numerous online assets.
67
68
Shortcuts
Key Purpose
Ctrl + A Select all
Ctrl + X Cut
Ctrl + C Copy
Ctrl + V Paste
Ctrl + Home Go to the beginning of a document
Ctrl + End Go to the end of a document
Ctrl + G Go to a specific point in a file
Ctrl + H Find and replace text in a file
Ctrl + F Find character or characters in a file