ict report 2 and 3 Flashcards
The short form of internet is the
‘net’
is a globally connected network system facilitating worldwidecommunication and access to data resources through a vast collection ofprivate, public, business, academic and government networks.
The internet
Onceyou areconnected to the Internet, you can access and view websitesusing a type of application called
webbrowser.
Internet originates in
US Government
when is The creation of ARPANET,
1960s :
ARPANET,
Advanced Research Projects Agency Network
the creation of NSFNET, or the National Science Foundation Network.
1985s :
NSFNET
National Science Foundation Network.
The system was replaced by new networks operated by commercial internet service providers.
1995
started an experimental computer network.
ARPA- Advanced Research Project Agency on January 2, 1969-
the word internet started
1982
is an American Internet pioneer and is: recognized as one of “the fathers of the Internet, sharing this title with TCP/IP co-developer Bob Kahn.
Vinton Gray Cerf
internet invented by 2
victon gray cerf and robert kahn
5 MAJOR COMPONENTS OF THE INTERNET
server
ip adress
browser
domain name system
internet service provider
is a computer program that provides service to another computer program and it’s user.
Servers
- a program in computer that provides the business logic for an application program.
Application Server
a computer program that serves requested HTML pages or files.
Web Server -
is a software that acts as an intermediary between an endpoint device, such as computer and another server from which a user is requesting.
Proxy Server -
- is an application that receives incoming e- mail from local users and remote senders and forward outgoing e-mail for delivery
Mail Server
is a computer responsible for central storage and management of data files so that other computer on the same network can access them.
File Server -
is a security component of a policy-based network that provides authorization services and facilities tracking and control of files
Policy Server -
is a numerical label assigned to each device. This provides identity to a network device.
IP Address (Internet Protocol)
is an application program that provides a way to look information on the web.
Browser
is the phonebook of internet. We access information online through domain names.
Domain Name System (DNS) -
Two types of Internet ServiceProvide(ISP)
regional isp
national isp
provided internet access to a specific geographicarea.
Regional ISP -
business that provides internet access in cities and towns nationwide.
National ISP -
A criminal activity that uses or targets a computer, a computer network, or a networked device
cybercrime
are people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive information or personal data, and use it for their illegal activities.
Cybercriminals
also known as The Cybercrime Prevention Act of 2012.
The R.A 10175
It addresses entirely crimes committed against and through the computer system on September 12, 2012, and signed by
President Benigno Aquino III.
sanctions content-related offenses performed using a computer system, such as cybersex, child pornography, and libel etc.
The Cybercrime Prevention Act of 2012
is a threat that makes use of the internet to disperse, conceal, and update itself to facilitate cybercrime. These types of internet threats profess a variety of risks, comprisingfinancial damages , personality theft, loss of private information, affecting businesses or in e-commerce and online banking.
An Internet threat
are the most common among internet security threats out there. Viruses enter your computers by attaching to a host file or a system.
Computer virus
is a type of malicious software that is created to damage computers and computer contents. It can spread via email files, file-sharing networks, online advertisements, and infected websites.
Malware
uses tricks or deceit to fool victims into revealing personal information including account numbers, passwords, and credit card details. While immediate chats, social media communications, and text messages can all be used in — attempts, emails are the most common method used.
phishing
Without the end user’s consent, this is software that is installed on a computing device. Such software is difficult because it occasionally gets installed for curious reasons, even if it has the possibility of being abused and violate the privacy of the end user.
spyware
has the ability to lock or block data on your computer and ask for payment to unlock them. This kind of assault may be harmful for businesses as it may lead to the loss of important data or the availability of systems.
ransomware
is a program that looks legitimate and harmless. Once it gains network access, it can steal sensitive or private data. The most common method for ——— attacks is through email. The email usually comes with a link or attachment containing the viruses.
Trojan Horse
is a malicious code that replicates another program to itself. The virus requires someone to knowingly or unknowingly spread the infection without the knowledge or permission
of a user or system administrator.
virus
attack is when an attacker floods a website or system with requests until its overwhelmed and unable to function properly. This type of attack can be used to interupt services or extort money from victims.
DISTRIBUTED DENIAL-OF-SERVICE (DDOS) ATTACK
This is the mass distribution of unwanted messages and advertising to individuals which can simply be found on the internet such as social networking sites, websites and personal blogs.
spam
tries to manipulate users into purchasing and downloading potentially harmful and worthless software. —-which causes pop-up advertisements, often claims that a lot of issues, including infected files, have been discovered on the computer and urges the user to buy software to remedy them.
scareware
is a term used to described proper etiquette and rules for online behavior on the internet
netiquette
from the word network or internet
net
proper requirements for social behavior
etiquette
treat other with the same respect that you would like to receive and avoid confrontational or offensive language
make a good impression
6 golden rules
make a good impression
avoid slang, acronyms, and text talk
avoid “screaming” in typed message
proofread your messages before sending
exercise good judgement when sharing information
6 golden rules
make a good impression
avoid slang, acronyms, and text talk
avoid “screaming” in typed message
proofread your messages before sending
exercise good judgement when sharing information with others online
be constructive and respectful when sharing opinions, beliefs, and criticisms , or responding to those of others in the conversation
respect diversity in viewpoints
URL means
uniform resource locator
HTML
Hyperlink text mark up language
HTTP
hypertext transfer protocol