Lec 4 - Online Essentials

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 72

Online essentials

INFORMATION TECHNOLOGY (BMS 1143)

FACLUTY OF HEALTH SCIENCES


Conducted by : Dharani Abeysinghe
(Department of IT)
Email: dharani.abeysinghe@cinec.edu
INFORMATION TECHNOLOGY (BMS 1143) 1
Learning outcomes
• At the end of the lesson you will be able to :

 Understand about the cyber environment.


 Learn about different threads and security concerns in the
cyber environment.

INFORMATION TECHNOLOGY (BMS 1143) 2


Chapter 4
Online essentials

INFORMATION TECHNOLOGY (BMS 1143) 3


Introduction to internet, web and emails

INFORMATION TECHNOLOGY (BMS 1143) 4


Internet
• Internet is a global communication system that links together thousands of
individual networks.

• It allows exchange of information between two or more computers on a network.

• Thus internet helps in transfer of messages through mail, chat, video & audio
conference, etc.

• The Internet is a computer network that interconnects billions of computing devices


throughout the world.

INFORMATION TECHNOLOGY (BMS 1143) 5


• Not too long ago, these computing devices were primarily traditional desktop PCs, Linux
workstations, and so-called servers.

• Increasingly, however, nontraditional Internet “things” such as laptops, smartphones,


tablets, TVs, gaming consoles, thermostats, home security systems, home appliances,
watches, eye glasses, cars, traffic control systems and more are being connected to the
Internet.

• Indeed, the term computer network is beginning to sound a bit dated, given the many
nontraditional devices that are being hooked up to the Internet.

• In Internet jargon, all of these devices are called hosts or end systems.

INFORMATION TECHNOLOGY (BMS 1143) 6


• End systems are connected together by a network of communication links and networking
devices.

• There are many types of communication links, which are made up of different types of
physical media, including coaxial cable, copper wire, optical fiber, and radio spectrum.

• Different links can transmit data at different rates, with the transmission rate of a link
measured in bits/second.

• When one end system has data to send to another end system, the sending end system
segments the data and adds header bytes to each segment.

INFORMATION TECHNOLOGY (BMS 1143) 7


Advantages of Internet
• Connectivity, communication, and sharing
• Information, knowledge, and learning
• Address, mapping, and contact information
• Selling and making money
• Banking, bills, and shopping
• Donations and funding
• Entertainment
• Work from home, collaboration, and access to a global workforce.

INFORMATION TECHNOLOGY (BMS 1143) 8


INFORMATION TECHNOLOGY (BMS 1143) 9
Disadvantages of Internet
• Bullying, trolls, stalkers, and crime
• Pornographic and violent images
• Addiction, time waster, and causes distractions
• Never being able to disconnect from work
• Identity theft, hacking, viruses, and cheating
• Spam and advertising
• Affects focus and patience
• Depression, loneliness, and social isolation

INFORMATION TECHNOLOGY (BMS 1143) 10


INFORMATION TECHNOLOGY (BMS 1143) 11
Internet clients
▸ The Internet is the global system of interconnected computer networks that
communicate between networks and devices.

▸ In Internet there are two parties as servers and clients.

▸ Servers are the service providers.

▸ A client is a piece of hardware or software that access a service made available by a


server.

▸ An Internet client is a client who access services provided by the servers in the
Internet.

12
13
Mail service
▸ Also known as webmail, online email service providers enable users to send,
receive and review e-mail from their Web browsers.

▸ Email services offer easy access and storage of e-mail messages for users who are
not connected to the Internet from their usual location.

▸ In contrast with postal mail, electronic mail is fast, easy to distribute, and
inexpensive.

▸ Modern mails can include hyperlinks, HTML, formatted text, images, sound and
video etc.

14
A high-level view of the Internet e-mail system

15
16
Email
• Electronic mail is a method of exchanging messages between people
using electronic devices.

INFORMATION TECHNOLOGY (BMS 1143) 17


How to send an email
• Open email application.
• In the "To" field, add recipients. You can also add recipients: In the "Cc" and
"Bcc" fields. ...
• Add a subject.
• Write your message.
• Tap Send .

• Sending a file more than 25 MB??


• Is that all what you have to consider?

INFORMATION TECHNOLOGY (BMS 1143) 18


Email Ethics
• Include a clear, direct subject line.

• Use a professional email address.

• Think twice before hitting "Reply all."

• Include a signature block.

• Use professional salutations.

• Proofread every message.

• Be polite with your words and in communication.

INFORMATION TECHNOLOGY (BMS 1143) 19


Advantages of emails
▸ Emails are delivered extremely fast when compared to traditional post.

▸ Emails can be sent 24 hours a day, 365 days a year.

▸ Webmail means emails can be sent and received from any computer, anywhere in the
world, that has an internet connection.

▸ Cheap - when using broadband, each email sent is effectively free. Dial-up users are
charged at local call rates but it only takes a few seconds (for conventional email, eg
text only) to send an email.

▸ Emails can be sent to one person or several people.

20
Disadvantages of emails
▸ The recipient needs access to the internet to receive email.

▸ Viruses are easily spread via email attachments (most email providers scan emails
for viruses on your behalf).

▸ Phishing - sending an email to a user falsely claiming to be a legitimate company to


scam the user into providing information, such as personal information and bank
account numbers on a bogus website. The details will then be used for identity
theft.

▸ No guarantee the mail will be read until the user logs on and checks their email.

▸ Spam - unsolicited email, i.e. junk mail.

21
Email and Calendars
▸ How to Use Gmail + Keep Notes + Google Calendar Together:
https://youtu.be/pgp73l1MGaI
▸ Outlook Calendar Tips & Tricks : https://youtu.be/6BU_ELSsDLc
▸ Outlook Tips & Tricks to Take Control of your Inbox :
https://youtu.be/_DTI-9DnV_g

22
INTERNET TERMS
• URL (Uniform Resource Locator)
• All the information that is contained on the web is held within web sites. Each
web site has a unique internet address, for easy identification. These addresses
are known as Uniform Resource Locators(URLs).

• ISP (Internet Service Provider)


• Some commercial companies offered a third party connection to the
internet .These companies are now known as Internet service
providers(ISPs),and enable individuals to connect to the Internet.

INFORMATION TECHNOLOGY (BMS 1143) 23


Web
▸ The Web, also known as World Wide Web (www), began in 1989 at CERN.

▸ It is an architectural framework for accessing linked documents spread out over


millions of machines all over the internet.

▸ In simple terms, The World Wide Web is a way of exchanging information between
computers on the Internet, tying them together into a vast collection of interactive
multimedia resources.
Note
Internet and Web is not the same thing: Web uses internet to pass over the information.
The internet is a massive network of networks, a networking infrastructure. The World Wide Web, or simply web, is a way of
accessing information over the medium of the internet.

24
Evolution

25
WWW Operation

26
Web Browser
▸ Web Browser is an application software that allows us to view and explore information
on the web.

▸ User can request for any web page by just entering a URL into address bar.

▸ Web browser can show text, audio, video, animation and more. It is the responsibility
of a web browser to interpret text and commands contained in the web page.

▸ Earlier the web browsers were text-based while now a days graphical-based or voice-
based web browsers are also available.

27
Browser Vendor

Internet Explorer Microsoft

Google Chrome Google

Mozilla Firefox Mozilla

Netscape Navigator Netscape Communications Corp.

Opera Opera Software

Safari Apple

28
Web page
▸ Web page is a document available on world wide web.

▸ Web Pages are stored on web server and can be viewed using a web browser.

▸ A web page can contain huge information including text, graphics, audio, video and
hyper links. These hyper links are the link to other web pages.

▸ Collection of linked web pages on a web server is known as website.

▸ There is unique Uniform Resource Locator (URL) is associated with each web page.

29
▸ There are two types of web pages.
 Static Web page
 Dynamic Web page

Static
Dynamic
30
Static web pages
▸ Static web pages are also known as flat or stationary web page.

▸ They are loaded on the client’s browser as exactly they are stored on the web
server.

▸ Such web pages contain only static information.

▸ User can only read the information but can’t do any modification or interact with
the information.

▸ Static web pages are only used when the information is no more required to be
modified.

31
Dynamic Web page
▸ Dynamic web page shows different information at different point of time.

▸ It is possible to change a portion of a web page without loading the entire web
page.

▸ Server-side dynamic web page

It is created by using server-side scripting. There are server-side scripting


parameters that determine how to assemble a new web page which also
include setting up of more client-side processing.

▸ Client-side dynamic web page

It is processed using client side scripting such as JavaScript.


32
Web server
▸ Web server is a computer where the web content is stored.

▸ Basically web server is used to host the web sites but there exists other web
servers also such as gaming, storage, FTP, email etc.

▸ Apache HTTP Server


This is the most popular web server in the world developed by the Apache
Software Foundation. Apache web server is an open source software and can be
installed on almost all operating systems including Linux, UNIX, Windows, FreeBSD,
Mac OS X and more.

33
Search Engine
▸ Search Engine refers to a huge database of internet resources such as web
pages, newsgroups, programs, images etc.

▸ It helps to locate information on World Wide Web.

▸ User can search for any information by passing query in form of keywords or
phrase.

▸ It then searches for relevant information in its database and return to the user.

▸ Ex: Google, Bing, Yahoo etc.

34
Search Engine
• What is search engine?
• Is a tool helping us to search information.
A program that searches for and identifies items in a database that correspond to keywords or
characters specified by the user, used especially for finding particular sites on the World Wide Web .

INFORMATION TECHNOLOGY (BMS 1143) 35


Domain Name

• Domain Name, System or DNS, is the most recognized system for assigning addresses to Internet web servers.

• Domain names are used to identify one or more IP addresses. Domain names are used in URLs to identify particular
Web pages. For example, in the URL http://www.gmail.com/index.html, the domain name is gmail.com

• Understand Parts of Web Addresses


• Prefix :- http://www.ecdl.com

• Domain name :-http://www.ecdl.com

• Dot extension :- http://www.ecdl.com

• Page names :- http:-//www.ecdl.com/main

INFORMATION TECHNOLOGY (BMS 1143) 36


• There are only a limited number of such domains. For example:
• gov - Government agencies
• edu - Educational institutions
• org - Organizations (nonprofit)
• mil - Military
• com - commercial business
• net - Network organizations
• ca - Canada
• th - Thailand
• lk – Sri Lanka

HYPERLINK
• A Hyperlink is a link from a hypertext document to another location, activated by clicking on a
highlighted word or image.

INFORMATION TECHNOLOGY (BMS 1143) 37


How to use advances search ?
• https://youtu.be/Ohvmn8OZFAM

INFORMATION TECHNOLOGY (BMS 1143) 38


Cookie
• What is a cookie?
• Cookies are usually small text files, given ID tags that are stored on your computer's browser directory
or program data subfolders.
• Cookies are created when you use your browser to visit a website that uses cookies to keep track of
your movements within the site, help you resume where you left off, remember your registered login,
theme selection, preferences, and other customization functions.
• A message given to a Web browser by a Web server. The browser stores the message in a text file. The
message is then sent back to the server each time the browser requests a page from the server.

INFORMATION TECHNOLOGY (BMS 1143) 39


Online Information
• The information that can be used on online search it is called as
online information.
• For these procedures there are different search engines.
• Ex. Information , entertainment, opinions, sales.
scholar.google.com

INFORMATION TECHNOLOGY (BMS 1143) 40


• Intellectual property
• Intellectual property (refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and
images used in commerce.
• Copy Right
• Copyright protects the rights of the authors of literary and artistic works and ensures them the economic benefits and recognition thereby
promoting creativity in literary and artistic fields and investment. Such creations enhances economic development, education, culture, and
enjoyment of life.
• Copyright in Sri Lanka is generally protected during the life of the author and 70 years after his death.
• http://www.nipo.gov.lk/copy.htm

INFORMATION TECHNOLOGY (BMS 1143) 41


Online communities
• An online communities are network of people who communicate with one another and with an organization
through interactive tools such as e-mail, discussion boards and chat systems

• Example : Gmail, ymail, internet forums


video conferencing
Facebook, online computer games
Google+ etc..

INFORMATION TECHNOLOGY (BMS 1143) 42


Privacy setting
• Don’t share your personal information.
• Use strength password for your accounts.
• always use in private windows.
• Don’t communicate with non authorized person.
• Use updated virus guards.
• Use firewall.

INFORMATION TECHNOLOGY (BMS 1143) 43


• IM(Instant Message)
• IM mean an Instant messaging that is a type of online chat which offers real-time text
transmission over the Internet.
• Ex:- online chat room
• VoIP(voice over IP)
• VoIP (voice over IP) is an IP telephony term for a set of facilities used to manage the delivery of voice
information over the Internet.
• Ex:- Skype, ichat, Tokbox, Yugma

• SMS
• Short Message Service (SMS) is a text messaging service component of phone, Web, or mobile
communication systems.
• MMS
• Multimedia Messaging Service (MMS) is a standard way to send messages that include multimedia content
to and from mobile phones.

INFORMATION TECHNOLOGY (BMS 1143) 44


File sharing and Multimedia over
internet
▸ File sharing is the practice of distributing or providing access to digital media,
such as computer programs, multimedia (audio, images and video), documents
or electronic books.

45
46
▸ Amazon drive

47
▸ box

48
▸ Citrix share file

49
▸ Dropbox

▸ Google drive

▸ MediaFire

▸ OneDrive

50
Online security
▸ Security attack: Any action that compromises the security of information owned by
an organization.

▸ Security mechanism: A process (or a device incorporating such a process) that is


designed to detect, prevent, or recover from a security attack.

▸ Security service: A processing or communication service that enhances the


security of the data processing systems and the information transfers of an
organization. The services are intended to counter security attacks, and they make
use of one or more security mechanisms to provide the service.

51
Threat

▸ A potential for violation of security, which exists when there is a circumstance,


capability, action, or event that could breach security and cause harm. That is, a
threat is a possible danger that might exploit vulnerability.

Attack

▸ An assault on system security that derives from an intelligent threat; that is, an
intelligent act that is a deliberate attempt (especially in the sense of a method or
technique) to evade security services and violate the security policy of a system.

52
Security Attacks
▸ A useful means of classifying security attacks, is in terms passive attacks and active
attacks.

▸ A passive attack attempts to learn or make use of information from the system but
does not affect system resources.

▸ An active attack attempts to alter system resources or affect their operation.

53
54
Viruses
▸ Virus (Vital Information Resource Under Siege): Computer viruses are the malicious
programs having the ability to replicate and execute themselves. They can attach
themselves to the other program, files or data stored in the system automatically
without any instructions from the user.

▸ It can enter in a computer by different means like when one copies some data from the
virus infected system to another uninfected system or while downloading some
programs from the Internet or it can come to system as an e-mail message.

55
What Is a Trojan horse?
▸ A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after.
▸ The Trojan Horse, at first glance will appear to be useful software but will actually do damage once
installed or run on your computer.
▸ Those on the receiving end of a Trojan Horse are usually tricked into opening them because they
appear to be receiving legitimate software or files from a legitimate source.
▸ When a Trojan is activated on your computer, the results can vary.
▸ Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding
silly active desktop icons) or they can cause serious damage by deleting files and destroying
information on your system.
▸ Trojans are also known to create a backdoor on your computer that gives malicious users access to
your system, possibly allowing confidential or personal information to be compromised.
▸ Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate .

56
Trojan Horse
▸ A computer program that appears to be useful software but actually causes damage
once installed or executed on the computer system is known as a Torjan horse.

▸ After getting installed, it allows unauthorized access to the computer.

▸ Torjan effects are very dangerous as they allow the computer to be remotely
controlled by someone else and can cause loss of the personal and confidential
information.

▸ They are not self-replicating and the only way, they can spread is copying to the other
system, e.g. Zeus, Beast, Back Orifice, The Blackhole Exploit Kit etc.

57
How do Trojans work?
▸ Here’s a Trojan malware example to show how it works.

▸ You might think you’ve received an email from someone you know and click on what
looks like a legitimate attachment. But you’ve been fooled.

▸ The email is from a cybercriminal, and the file you clicked on — and downloaded and
opened — has gone on to install malware on your device.

▸ When you execute the program, the malware can spread to other files and damage
your computer.

▸ How? It varies. Trojans are designed to do different things. But you’ll probably wish
they weren’t doing any of them on your device.
58
Phishing

▸ Phishing is a cyber attack that uses disguised email as a weapon.

▸ The goal is to trick the email recipient into believing that the message is something
they want or need.

▸ Phishing is a type of social engineering attack often used to steal user data,
including login credentials and credit card numbers. It occurs when an attacker,
masquerading as a trusted entity, dupes a victim into opening an email, instant
message, or text message.
59
There are various phishing techniques used by
attackers:
▸ Embedding a link in an email that redirects your employee to an unsecure website
that requests sensitive information

▸ Installing a Trojan via a malicious email attachment or ad which will allow the
intruder to exploit loopholes and obtain sensitive information

▸ Spoofing the sender address in an email to appear as a reputable source and request
sensitive information

▸ Attempting to obtain company information over the phone by impersonating a


known company vendor or IT department

60
Few steps that can take to protect against phishing:
▸ Deploy a SPAM filter that detects viruses, blank senders, etc.

▸ Keep all systems current with the latest security patches and updates.

▸ Install an antivirus solution, schedule signature updates, and monitor the antivirus status on all
equipment.

▸ Develop a security policy that includes but isn't limited to password expiration and complexity.

▸ Deploy a web filter to block malicious websites.

▸ Encrypt all sensitive company information.

▸ Convert HTML email into text only email messages or disable HTML email messages.

▸ Require encryption for employees that are telecommuting.

61
Hacking
▸ Hacking refers to activities that seek to compromise digital devices, such as
computers, smart phones, tablets, and even entire networks.

▸ Hacking might not always be for malicious purposes. Thus kind of hacking used
for fruitful purposes is mostly referred to as Ethical hacking.

62
Types of hacking
▸ Social Engineering & Phishing

 Social engineering is an attempt to get you to share personal information, usually by


impersonating a trusted source.

 Many types of social engineering bait come in the form of phishing emails, whereas
a clever hacker sends you a message that looks like it’s from someone you know,
asking you to do something, like wire them money, or to click/download an infected

attachment to see more.

63
▸ Malware-Injecting Devices

 Cybercriminals can use hardware to sneak malware onto your computer. You may
have heard of infected USB sticks, which can give hackers remote access to your
device as soon as they’re plugged into your computer.

 All it takes is for one person to give you a malware-ridden USB stick, and by simply
plugging it into your computer, you’re infected.

64
▸ Missing Security Patches

 Security tools can become outdated as the hacking landscape advances, and require
frequent updates to protect against new threats. However, some users ignore update
notifications or security patches, leaving themselves vulnerable.

 It’s not just antivirus software that needs patching.

65
▸ Cracking Passwords

 Hackers can obtain your credentials through a number of means, but commonly
they do so through a practice called keylogging. Through a social engineering
attack, you could accidentally download software that records your keystrokes,
saving your usernames and passwords as you enter them. This and other forms of
“spyware” are malware that track your activity until a hacker has what they need
to strike.

 There are also password cracking programs that can run letter and character
combinations, guessing passwords in a matter of minutes, even seconds.

66
▸ Distributed Denial-of-Service (DDoS)

 This hacking technique is aimed at taking down a website, so that a user cannot access
it or deliver their service. DoS attacks work by inundating the target’s server with large
influxes of traffic. The amount is so frequent and high that it overloads the server by
giving it more requests than it can handle. Ultimately, your server crashes and your
website goes down with it.

 Larger businesses can get hit by a Distributed Denial of Service (DDoS) attack, which is
a synchronized attack on more than one server or website, potentially taking down
numerous online assets.

67
68
Shortcuts
Key Purpose
Ctrl + A Select all
Ctrl + X Cut
Ctrl + C Copy
Ctrl + V Paste
Ctrl + Home Go to the beginning of a document
Ctrl + End Go to the end of a document
Ctrl + G Go to a specific point in a file
Ctrl + H Find and replace text in a file
Ctrl + F Find character or characters in a file

INFORMATION TECHNOLOGY (BMS 1143) 69


Key Purpose
Ctrl + S Save
Shift + S Save
F12 Save as
F1 Help
F2 Rename
Home Go to the beginning of a line
End Go to the end of a line
Ctrl + Z Undo
Ctrl + Y Redo
Ctrl + B Bold the fonts
Ctrl + U Underline
Ctrl + I Italicze font
Ctrl + J Justify word placing (left/center/right)
Ctrl + W Close document
Ctrl + N New document
INFORMATION TECHNOLOGY (BMS 1143) 70
INFORMATION TECHNOLOGY (BMS 1143) 71
Thank you!!!

Next theory class … Data presentation

INFORMATION TECHNOLOGY (BMS 1143) 72

You might also like