Connecting to the Internet

Size: px
Start display at page:

Download "Connecting to the Internet"

Transcription

1 The Internet & The World Wide Web CIT 100 Norm Downey What is the Internet? A global computer network made up of thousands of privately and public owned computers and computer networks. More than one billion computers are directly connected to the Internet. 2 By the way, Internet is a proper name, and as such, it is always capitalized Interoperability Interoperability enables computers that are of different brands and models, and using different operating systems exchange data and even control each other s operation Example: 3 Joe sends an from his Microsoft Windows PC that is processed by a Unix server and read by Jane on her Apple ipad and Jenny on her Android smart phone Internet and the Client/Server Model 4 Client requests some type of service (such as a file or database access) from the server Server fulfills the request and transmits the results to the client over a network 1

2 Client/Server Example You, sitting at your PC in class, type in the web address for the class website into your computers browser. In this case you are the Client. The request you make is processed by a college server (a fast, high capacity computer) sends the page to your PC. 5 The college computer storing/sending the webpage is the Server TCP/IP Transmission Control Protocol (TCP) Divides transmitted data into small packets for transmission, and reassembles data packets upon delivery into a complete message Internet Protocol (IP) Address 6 Numeric address that uniquely identifies each device on a computer network Four sets of numbers (0-255) each separated by a dot Example: Internet Service Providers (ISP) Connecting to the Internet 7 A company that provides access to the Internet For a fee, the Internet Service Provider provides you with a username & password that allows you to connect to the ISP s network 8 2

3 ISP Responsibilities Providing and maintaining connection to the Internet Supporting hardware and software need for connection Protecting network from viruses, hackers and other illegal activities Providing customer service Providing technical support 9 Baseband versus Broadband Baseband Type of data transmission that allows only one signal at a time. Example your telephone land line Broadband A transmission medium that transports high volumes of data at high speeds Data transmission in which a single wire can carry several channels (pathways) of data at one time. Example Cable TV & DSL 10 Baseband versus Broadband 11 Baseband Broadband Bandwidth versus Throughput Bandwidth is the maximum data transfer rate of a communication channel in a specific time period this is a theoretical speed Throughput is the actual amount of data that is transmitted in a specified time period 12 Throughput speed is almost always lower and can never exceed than bandwidth speed 3

4 Bandwidth versus Throughput a real world example (sort of ) Bandwidth 13 in theory you could drive from Monroeville to downtown in 12 minutes, if there was no traffic, you had a fast car and you were allowed to drive over 100 mph Throughput the reality is it takes an hour to go from Monroeville to downtown because of rush hour traffic, the tunnels, speed limits, the limits of your car and driving skill, potholes, etc. Bandwidth is a theoretical maximum speed, throughput is the actual speed Bandwidth Usually expressed in bits per second (bps) The greater the bandwidth, the faster the connection and generally, the more expensive the connection Broadband connections provide greater bandwidth than baseband connections What s a bit? Stay tuned we ll get to that next time. 14 The Last Mile Problem The last mile problem refers to the slowest part of a connection, which is generally local cable or phone lines. Maximum bandwidth is limited by the slowest section of the connectivity chain 15 Types of Internet Connections Dial-up Cable DSL Fiber Optics WiMAX 16 4

5 Dial-Up Connections Slowest, cheapest Internet connection that uses regular phone lines. Dial-up is a Baseband connection 17 Cable (as in Cable TV) High speed, always on Internet connection Uses coaxial cable and a cable modem for a broadband Internet connection Copper coaxial cable provides much greater bandwidth than telephone line Cable s last mile problem is that you share your bandwidth with your neighbors 18 Cable (as in Cable TV) 19 Cable TV Connections 20 How a cable Internet connection looks in your house How a cable Internet connection looks in your neighborhood 5

6 Cable TV Connections Lowest-capacity coaxial cable has far greater capacity than ordinary telephone lines Coaxial cable bandwidth is divided among 3 activities: TV shows downstream to client Upstream data requests Downstream data (web pages, , etc.) Fast Downstream 1 to 50 Mbps rates 21 Digital Subscriber Line (DSL) High-speed, always-on, Internet access 22 Compresses data to improve transmission speed over regular copper telephone lines DSL s last mile problem is that it still uses ordinary phone lines which can be plagued with noise (interference) Supports throughputs of 1 to 6 Mbps Not available everywhere DSL Connection What about Fiber Optics? 23 Central Telephone Switching Station Internet Fiber Optic cable consists of thin strands of glass or plastic that carry data on pulses of light Capable of enormous throughput Fiber optic cable, run directly to your home, virtually eliminates the last mile problem 24 6

7 Other Transmission Media Infrared Wireless using light Limited to line of sight of about 100 feet Bluetooth Named for 10 th century Viking king Limited to 30 feet and 8 devices Uses radio signals not limited to line of sight 25 WiMAX WiMAX Worldwide Interoperability for Microwave Access High speed access over long distances Up to 30 miles for stationary point-to-point 3 to 10 miles for mobile access Not good for mountainous areas What is the World Wide Web? There is a short answer question on the quiz that will ask you to explain the difference between the Internet and the World Wide Web The World Wide Web Billions of specially formatted documents stored on Internet servers and accessed through web browsers These documents are formatted using HTML (Hyper Text Markup Language) HTML supports links to other documents, as well as graphics, audio, and video files Not all Internet servers are part of the World Wide Web 28 7

8 Internet versus World Wide Web Internet 29 Network infrastructure (cables, computers, routers, software, etc.) Used to access computers and exchange data in a variety of formats Uses TCP/IP protocols World Wide Web Billions of specially formatted documents Uses the Internet as its transport mechanism Uses HTTP or HTTPS protocols They are NOT the same thing! Websites Websites and Web pages 30 Location in cyberspace that makes web pages available A collection of related web pages Web pages Specially formatted, linked documents on a website that includes text, graphics, sound, animation or video What s cyberspace? Virtual territory that is accessible only with a computer Web Browsers 31 Software that displays web documents and provides access to linked documents Runs on the client side of the Client/Server Model Includes: Internet Explorer (Microsoft) Firefox (Mozilla Foundation formerly Netscape) Chrome (Google) Safari (by and for Apple Macs) Opera (Opera Software) Web Servers Computers running special server software that Accepts requests for information, Processes requests and Sends requested documents The server side of the Client/Server Model 32 8

9 Hyperlinks Clickable links in webpages that open other web documents Examples: or 33 HTML Web documents are created using HTML (Hypertext Markup Language) 34 HTML is a Markup Language used to define the appearance of Web pages CCAC teaches an HTML class CIT 125 How do you know if a website is secure? Rules for Evaluating Web Pages Look for the lock symbol in Internet Explorer (above). Clicking on the company name in Internet Explorer or Firefox (right) shows security information. 35 Who is the author? Are they an expert? Are the sources cited? Are the authors sources respected? Who pays for the web site? Is the presentation one sided? Is the language objective or argumentative? What is the purpose of the page? Is the page accurate? Is the page up to date? Example:

10 Search Engines A program that searches documents for specified keywords and returns a list of the web documents where the keywords were found Search engines then use those results to display meaningful results Search Engines include: Google Bing Yahoo Dogpile 37 Other Terms to Know 38 URL Uniform Resource Locator Web address Character string that precisely identifies an Internet resources type and location Examples: Cookies Small text files written to your computer s hard drive, generally without users knowledge or consent Used to keep track of user preferences or for compiling information about user s web browsing behavior 40 10

11 Cookies Uploading versus Downloading Cookies allow websites such as Amazon.com to keep track of recent searches and to present lists of related items to hopefully increase their sales Also used to build web Shopping Carts 41 Uploading Transferring files from your computer to another computer on Internet From client to server Downloading Transferring files from another computer to your computer From server to client 42 Wiki Wikis and Blogs From Hawaiian word wiki-wiki meaning fast Web page on which a visitor can post text or images, read and exchange posted information and track changes Blogs Short for web log Allow user to post thoughts and opinions 43 short for electronic mail Allows sending and receiving messages via a computer network including over the Internet address consist of User name (ndowney) At Host (acd.ccac CCAC s Academic server) Domain (.edu top level domain name) Spam unsolicited advertisements 44 11

12 Social Networking Web sites provide Web-based tools for users to share information about themselves with others on the Web, and find, meet, and converse with other members Facebook MySpace LinkedIn 45 Media Sharing Media-sharing web sites provide methods for members to store and share digital media files on the Web YouTube Flickr PhotoBucket 46 Podcasting 47 An audio file that contains a recorded broadcast distributed over the Internet via the World Wide Web Online Safety 48 12

13 Phishing A type of attack where a phisher (a crook) poses as a legitimate business in an or on a website in an attempt to obtain personal information for purposes of identity theft No bank will ever send you an asking for your PIN number Do not click hyperlinks in suspicious s 49 Malware Short for MALicious software Malicious is defined as being characterized by malice; intending to do harm Malware is a class of software designed to damage or infiltrate a computer or network s data without users consent or knowledge Malware CANNOT do physical harm to hardware 50 Types of Malware Spyware Collects your personal information Monitors your web usage Reports information to others for purposes of identity theft 51 Types of Malware Viruses Hidden programming code that damages or destroys infected files Designed to self-replicate Run when file is opened or program is started Spread through sharing infected files often via

14 Types of Malware - Trojans A destructive program that pretends to be a useful application Initially appears to perform a desirable function for the user, but (perhaps in addition to the expected function) steals information or does other harm Derives it s name from the Trojan Horse of Greek Mythology 53 How to Steal Passwords Password guessing Your child or pet s names are not good passwords Shoulder surfing Watch out for lurkers Packet sniffing 54 This involves specialized software to capture unencrypted data moving through a network as data packets How to Steal Passwords Dumpster diving Buy a shredder and use it don t leave sensitive paper in the trash Social engineering Sweet talked into giving up your passwords Super user status 55 Giving password or other sensitive data to people you think you can trust like your teacher or the guy from the Helpdesk Effective Passwords should be Strong & Long 56 Use words that are unrelated to your interests, mix upper and lowercase letters, numbers, and symbols The longer the password the harder to crack Microsoft Password Checker Unique Vary passwords don t use one password for everything Changed regularly Change your passwords at least twice a year 14

15 Protecting Yourself Online 57 Protecting Yourself Online Virus protection Application that runs your computer and searches viruses and other malware Firewall Program designed to control flow between your computer and the Internet Stops malware from Entering your computer or, if it s already in Sending messages out from your computer 58 Protect Yourself Online Parental controls Controls what children can/cannot see & do on Internet and WWW Utilizes database of unacceptable websites Keep Up-to-date Turn on Windows Automatic Updating feature Keep Anti-Virus programs up-to-date Schedule virus scans 59 Protect Yourself Online Be careful what you download and install Be sure the source is reputable When downloading software watch out for Trojans Be careful were you web surf and what you do in public on public networks Avoid being scammed Never give out passwords Don t be so trusting 60 15

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Internet Basics. Basic Terms and Concepts. Connecting to the Internet Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a

More information

Internet Infrastructure

Internet Infrastructure The internet Background Created in 1969, connected computers at UCLA, Stanford Research Institute, U. of Utah, and UC at Santa Barbara With an estimated 200 million nodes and 1 billion users, the Internet

More information

How to Search the Internet

How to Search the Internet Technology In Action 1 Technology In Action Chapter 3 Using the Internet: Making the Most of the Web s Resources 2 Topics Internet basics Internet data Internet service providers Web browsers URLs Hyperlinks

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Chapter 9 The Internet

Chapter 9 The Internet CSCA0101 COMPUTING BASICS Chapter 9 1 1. 2. Types of Network 3. What Makes Internet Works? 4. Internet Equipment 5. Internet Applications 2 A global network connecting millions of computers More than 100

More information

MMGD0204 Web Application Technologies. Chapter 1 Introduction to Internet

MMGD0204 Web Application Technologies. Chapter 1 Introduction to Internet MMGD0204 Application Technologies Chapter 1 Introduction to Internet Chapter 1 Introduction to Internet What is The Internet? The Internet is a global connection of computers. These computers are connected

More information

The Internet, the Web, and Electronic Commerce

The Internet, the Web, and Electronic Commerce The Internet, the Web, and Electronic Commerce Chapter 2 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.

More information

Introduction to the Internet

Introduction to the Internet Athens-Clarke County Library Page 1 What is the Internet? Introduction to the Internet The Internet is basically a global network of computers. Computers are connected via wires, cables and satellite connections

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

How To Get High Speed Internet In Australia

How To Get High Speed Internet In Australia ADSL vs Cable Cable subscribers are connected directly to high speed lines while ADSL subscribers are connected directly to medium speed lines Cable subscribers share the line connecting them to neighbourhood

More information

COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION

COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION Answers to End-of-Chapter Questions Matching g 1. whiteboard i 2. sending device o 3. streaming j 4. WiFi m 5. Webcam d 6. data transfer

More information

INTRODUCTION TO THE WEB

INTRODUCTION TO THE WEB INTRODUCTION TO THE WEB A beginner s guide to understanding and using the web 3 September 2013 Version 1.2 Contents Contents 2 Introduction 3 Skill Level 3 Terminology 3 Video Tutorials 3 How Does the

More information

Web Browsers And Mailing Tools

Web Browsers And Mailing Tools Web Browsers And Mailing Tools Introduction: Network A network is an interconnection between two or more computers or other computing devices which are connected together usually through a cable to share

More information

Chapter 9 Communications and Networks

Chapter 9 Communications and Networks Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

Technology/Internet Usage Workshop

Technology/Internet Usage Workshop Technology/Internet Usage Workshop 1) Workshop Goals (1 st Slide) 2) Computers Desk Top (Show examples) Lap-Top Hand-held Wireless Device Introduce Tammy Welsh from Gateway 3) What is the Internet? The

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Getting Broadband. FCC Consumer Facts. What Is Broadband?

Getting Broadband. FCC Consumer Facts. What Is Broadband? Getting Broadband FCC Consumer Facts What Is Broadband? Broadband or high-speed Internet access allows users to access the Internet and Internetrelated services at significantly higher speeds than those

More information

Key Term Quiz Answers

Key Term Quiz Answers Key Term Quiz Answers The Internet Use the Key Terms list to complete the sentences that follow. Not all terms will be used. 1. The time it takes for a packet to travel to its destination and back is called

More information

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include

More information

Page 1 Basic Computer Skills Series: The Internet and the World Wide Web GOALS

Page 1 Basic Computer Skills Series: The Internet and the World Wide Web GOALS GOALS Understand the differences between the Internet and the World Wide Web Use a web browser to find and open websites Navigate using links, the back button, and the forward button Use bookmarks and

More information

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information Data communications Think! Think!?? What makes it possible to communicate from point A to point B?? Long-Distance Transmission Media If you place a call outside the local transport area, an interchange

More information

Welcome. Thank you for choosing Cogeco High Speed Internet.

Welcome. Thank you for choosing Cogeco High Speed Internet. Welcome Welcome Thank you for choosing Cogeco High Speed Internet. Welcome to the endless range of possibilities available to you with your new High Speed Internet service. When it comes to speed, you

More information

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,

More information

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of

More information

Layered protocol (service) architecture

Layered protocol (service) architecture Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure

More information

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

Competencies (1 of 2)

Competencies (1 of 2) Chapter 2 The Internet, the Web, and Electronic Commerce Competencies (1 of 2) Discuss the origins of the Internet and the Web Describe how to access the Web using providers and browsers Discuss Internet

More information

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts

More information

Internet Service Overview

Internet Service Overview Internet Service Overview This article contains information about: Internet Service Provider Networks Digital Subscriber Line (DSL) Cable Internet Fiber Internet Wireless/WIMAX Cellular/Wireless Satellite

More information

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two

More information

Student Halls Network. Connection Guide

Student Halls Network. Connection Guide Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to

More information

Internet Jargon. Address: See Uniform Resource Locator.

Internet Jargon. Address: See Uniform Resource Locator. Internet Jargon Address: See Uniform Resource Locator. Address Bar: Part of the window in Internet Explorer that displays the URL of the web site currently being viewed. This is also the location where

More information

GUIDE TO WEBSITES AND E-COMMERCE

GUIDE TO WEBSITES AND E-COMMERCE GUIDE TO WEBSITES AND E-COMMERCE Version 1.0, 26-Sept-01 This document is available from www.webcentro.com.au 2001, WebCentro WebCentro Guide To Websites And E-commerce CONTENTS 1. What is a Website? 1

More information

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 FAQ WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 WHAT IS UPTIME AND SPEED MONITORING 2 WHEN I TRY TO SELECT A SERVICE FROM

More information

Community Forum Agenda October 2012

Community Forum Agenda October 2012 Community Forum Agenda October 2012 Topic Welcome CEKC/WSUE LTPT Project Scope Forums Survey Data Results LTPT Next Steps Broadband 101/Map Q&A Websites Mapping Survey Complete Survey Close/Next Steps

More information

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

When visiting online banking's sign-on page, your browser establishes a secure session with our server. The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption

More information

C20.0001 Information Systems for Managers Fall 1999

C20.0001 Information Systems for Managers Fall 1999 New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in

More information

The Hidden Dangers of Public WiFi

The Hidden Dangers of Public WiFi WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Chapter 7. The Internet and World Wide Web. What You Will Learn... Computers Are Your Future. The Internet. What You Will Learn...

Chapter 7. The Internet and World Wide Web. What You Will Learn... Computers Are Your Future. The Internet. What You Will Learn... What You Will Learn... Computers Are Your Future Chapter 7 How the Internet works Methods for accessing the Internet The Internet and the World Wide Web Hypertext Web browsers and Web servers The Internet

More information

How To Understand The History Of The Web (Web)

How To Understand The History Of The Web (Web) (World Wide) Web WWW A way to connect computers that provide information (servers) with computers that ask for it (clients like you and me) uses the Internet, but it's not the same as the Internet URL

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol Connecting Computers Networks Computers use networks to communicate like people use telephones or the postal service Requires either some sort of cable point-to-point links connect exactly 2 computers

More information

CSCI 491-01 Topics: Internet Programming Fall 2008

CSCI 491-01 Topics: Internet Programming Fall 2008 CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

Walnut Telephone Company, Inc. dba/ Walnut Communications Network Management Practices Policy Disclosure

Walnut Telephone Company, Inc. dba/ Walnut Communications Network Management Practices Policy Disclosure Walnut Telephone Company, Inc. dba/ Walnut Communications Network Management Practices Policy Disclosure Pursuant to the Federal Communications Commission s newly enacted Open Internet Rules found in Part

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if

More information

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization

More information

CHAPTER 9: THE EVOLVING INTERNET

CHAPTER 9: THE EVOLVING INTERNET CHAPTER 9: THE EVOLVING INTERNET Multiple Choice: 1. What was the department of the U.S. government that developed the initial stages of the Internet? A. Department of Commerce B. Department of Defense

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

Computer and Information Security End User Questionnaire

Computer and Information Security End User Questionnaire Computer and Information Security End User Questionnaire Human Factors Issues in Computer and Information Security Funded by the National Science Foundation: EIA-0120092 Project http://cis.engr.wisc.edu/

More information

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Chapter 1: roadmap. Access networks and physical media

Chapter 1: roadmap. Access networks and physical media Chapter 1: roadmap 1.1 What is the nternet? 1.2 Network edge 1.3 Network core 1.4 Network access and physical media 1.5 nternet structure and SPs 1.6 elay & loss in packet-switched networks 1.7 Protocol

More information

Computing From Home. How to Access Rowan Network Resources When you Are Not On Campus. Marc Fleischner Network and System Services

Computing From Home. How to Access Rowan Network Resources When you Are Not On Campus. Marc Fleischner Network and System Services Computing From Home How to Access Rowan Network Resources When you Are Not On Campus. Marc Fleischner Network and System Services There is no reason for any individual to have a computer in his home. Ken

More information

Lesson 24 Network Fundamentals

Lesson 24 Network Fundamentals Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe

More information

INTERNET CONNECTIVITY

INTERNET CONNECTIVITY INTERNET CONNECTIVITY http://www.tutorialspoint.com/internet_technologies/internet_connectivity.htm Copyright tutorialspoint.com Here in this tutorial, we will discuss how to connect to internet i.e. internet

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

Telework and Remote Access Security Standard

Telework and Remote Access Security Standard State of California Office of the State Chief Information Officer Telework and Remote Access Security Standard SIMM 66A March 2010 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES Initial

More information

Masters of Science in Information Technology

Masters of Science in Information Technology Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Computers Are Your Future. 2006 Prentice-Hall, Inc.

Computers Are Your Future. 2006 Prentice-Hall, Inc. Computers Are Your Future 2006 Prentice-Hall, Inc. Computers Are Your Future Chapter 3 Wired and Wireless Communication 2006 Prentice-Hall, Inc Slide 2 What You Will Learn... ü The definition of bandwidth

More information

CHAPTER - 10 COMPUTER NETWORKING

CHAPTER - 10 COMPUTER NETWORKING CHAPTER - 10 INTRODUCTION COMPUTER NETWORKING When two or more objects are connected they form a network. For example in our Vidyalaya all teachers form a network of teachers, all students form a network

More information

Quick Start. Guide. The area s ONLY 100% fiber optic network. epbfi.com

Quick Start. Guide. The area s ONLY 100% fiber optic network. epbfi.com Quick Start Guide The area s ONLY 100% fiber optic network epbfi.com Welcome to Fi-Speed Internet from EPB Fiber Optics SM You re now connected to the area s ONLY 100% fiber optic network. What does that

More information

Protection from Fraud and Identity Theft

Protection from Fraud and Identity Theft Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...

More information

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions. Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4

More information

ADSL MODEM. User Manual V1.0

ADSL MODEM. User Manual V1.0 ADSL MODEM User Manual V1.0 CONTENTS 1.OVERVIEW... 3 1.1 ABOUT ADSL... 3 1.2 ABOUT ADSL2/2+... 3 1.3 FEATURES... 3 2 SPECIFICATION... 4 2.1 INTERFACE INTRODUCTION... 4 2.1.1 INDICATOR AND INTERFACE...

More information

Networks 2. Gabriela Ochoa. 2014 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

Networks 2. Gabriela Ochoa. 2014 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content Networks 2 Gabriela Ochoa Lecture Networks 2/Slide 1 Content How is Internet connected? Internet backbone Internet service providers (ISP) How to connect a home computer to the Internet? How do networks

More information

IC3 Internet and Computing Core Certification Guide

IC3 Internet and Computing Core Certification Guide IC3 Internet and Computing Core Certification Guide Global Standard 4 Living Online Lesson 12: The World Wide Web CCI Learning Solutions Inc. 1 Lesson Objectives the difference between the Internet, the

More information

Broadband 101: Installation and Testing

Broadband 101: Installation and Testing Broadband 101: Installation and Testing Fanny Mlinarsky Introduction Today the Internet is an information superhighway with bottlenecks at every exit. These congested exits call for the deployment of broadband

More information

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1 P a g e 1 Internet Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to accessing and navigating the internet (a.k.a. the world wide web or the web ). Throughout the class,

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

E-Business, E-Commerce

E-Business, E-Commerce E-Business, E-Commerce Lecture Outline 11 Instructor: Kevin Robertson Introduction to Information Systems Explain the differences between extranets and intranets as well as show how organizations utilize

More information

Integra Telecom 4690 Colorado St. SE Prior Lake, Mn 55372 952.226.7097 DSL INSTALLATION GUIDE

Integra Telecom 4690 Colorado St. SE Prior Lake, Mn 55372 952.226.7097 DSL INSTALLATION GUIDE Integra Telecom 4690 Colorado St. SE Prior Lake, Mn 55372 952.226.7097 DSL INSTALLATION GUIDE www.getintegra.com Version 10/10 Integra Telecom, Inc. Thank you for choosing Integra Telecom s DSL High Speed

More information