MODULE 4 - The Internet
MODULE 4 - The Internet
POLYTECHNIC STATE
Candon Campus
COLLEGE
MODULE
THE INTERNET
MODULE
4
INTENDED LEARNING
At the end of the module, students will be able to:
Trace the history of internet.
Determine the major components of internet.
Explain the role of internet in the modern world.
Discuss the cybercrimes and internet threats.
LESSON PROPER
MODULE
1. Server - A server is a computer or system that provides resources, data,
services, or programs to other computers, known as clients, over a
network. Server is a computer program that provides service to another
computer program and its user.
Type of Servers:
Application Server – a program in computer that provides the
business logic for an application program. Business logic in an
application server refers to the set of rules, processes, and
workflows that govern the behavior of an application or system. It
defines how data is processed, how tasks are performed, and how
different components of the application interact with each other.
MODULE
Mail
Server – Is an application that receives incoming e-mail from local
users and remote senders and forward outgoing e-mail for delivery.
A mail server (sometimes called an email server) is a software
program that sends and receives email. Often, it is used as a
blanket term for both mail transfer agents (MTA) and mail delivery
agents (MDA), each of which perform a slightly different function.
Microsoft Exchange, Exim and Send mail are common examples of
mail server programs.
MODULE
MODULE
and control of files. A policy server is a security component of a
policy-based network that provides authorization services and
facilitates tracking and control of files.
MODULE
Administration — The Policy Server can be configured using
the Administrative UI. The Administration service of the Policy
Server is what enables the UI to record configuration
information in the Policy Store. The Policy Store is the
database that contains entitlement information.
Accounting — The Policy Server generates log files that
contain auditing information about the events that occur
within the system.
Health Monitoring — Policy Server provides health
monitoring components.
Versions of IP Address:
IPV4 - Internet Protocol version 4 - It is one of the core
protocols of standards-based internetworking methods in
the Internet and other packet-switched networks. IPv4 was
the first version deployed for production on SATNET in
1982 and on the ARPANET in January 1983. It is still used
to route most Internet traffic today, even with the ongoing
deployment of Internet Protocol version 6 (IPv6), its
successor. IPv4 uses a 32-bit address space which provides
4,294,967,296 unique addresses.
Types of IP Address
Private IP Address is a unique IP number assigned to
every device that connects to your home internet network .
Public IP Address is an IP address that can be accessed
directly over the internet and is assigned to your network
router by your internet service provider (ISP). Your personal
device also has a private IP that remains hidden when you
connect to the internet through your router's public IP.
Static IP Address - As the name indicates, the static IP
addresses usually never change but they may be changed
MODULE
as a result of network administration. They serve as a
permanent Internet address and provide a simple and
reliable way for the communication. From the static IP
address of a system, we can get many details such as the
continent, country, region, and city in which a computer is
located, The Internet Service Provider (ISP) that serves that
particular computer and non-technical information such as
precise latitude and longitude of the country, and the locale
of the computer.
Dynamic IP address - are the second category. These are
temporary IP addresses. These IP addresses are assigned to
a computer when they get connected to the Internet each
time. They are actually borrowed from a pool of IP
addresses, shared over various computers. Since limited
number of static IP addresses are available, ISPs usually
reserve the portion of their assigned addresses for sharing
among their subscribers in this way.
MODULE
a. Top-Level Domain - Internet domain names are organized by their
levels, with the higher levels on the right. For example, for the
domain “mail.twenty.net” the top-level domain is “net”, the second-
level domain is “twenty.net”, and the third-level domain is
“www.twenty.net”.
TLD USAGE
.bitnet Used for computers on the BITNET network.
.com Originally stood for “commercial” to indicate a site used
for commercial purposes, but it has since become the
most well-known top-level Internet domain and is now
used for any kind of site.
.int Used by “International” sites, usually NATO sites.
.edu Used for educational institutions like universities.
.gov Used for US Government sites.
.mil Used for US Military sites.
.net Originally intended for sites related to the Internet itself,
but now used for a wide variety of sites.
.org Originally intended for non-commercial “organizations”,
but now used for a wide variety of sites. Was managed
by the Internet Society for a while.
MODULE
.at Austria http://www.austria.at/
.au Australia http://www.morning.com.au/
.bb Barbados https://www.gov.bb/
.bm Bermuda http://www.kbb.bm/
.br Brazil http://home.iis.com.br/
.ca Canada http://www.canoe.ca/
.ch Switzerland http://www.badminton.ch
.cl Chile http://www.santiago.cl/
.us United States http://www.co.maui.hi.us/
______________________
USES OF INTERNET IN THE MODERN WORLD
1. Communication - is all about how we talk to each other and share
important things. The Internet has email, instant messaging, social
media, online discussion forums, video, and voice calls for the major
portion of communication. The following tools make it easier for us to
connect, collaborate, and learn from one another.
Examples: Email, Social Media Platforms for Connecting, Online
Forums and Discussion Boards, Voice and Video Calls
MODULE
2. E-Commerce - is about buying and selling things on the Internet. It’s
like shopping, but the Internet allows you to do it from your computer
or phone instead of going to a physical store. There are different parts
to it that we’ll talk about.
Examples: Online Shopping and Retail Websites, Payment
gateways and secure transactions,
4. Online Banking - The Internet has been the most important factor in
introducing Net Banking. We can transfer money from our mobile
phones, tablets, laptops, etc. There is no need to visit the banks during
rush hours, which takes hours to complete a simple cash withdrawal or
money transfer. Banks close at the end of the day, but the Internet is
available 24/7. There is no stress of carrying bundles of cash on the
streets to deposit in the bank or after a withdrawal.
5. Education - Education in today’s world, the Internet has new ways for
our research and education. With the Internet, we can access online
databases and libraries, take online courses, collaborate with others,
find tutorials and resources, and attend classes online. The following
uses of the Internet have made learning more accessible and fun for
everyone.
Examples: Access to vast online libraries, E-learning and online
courses, Virtual Classrooms, and distance learning program
MODULE
Informatics Centre, etc., where you can find helpful information. These
websites are user-friendly to navigate and find what you need, even if
you’re not tech-savvy. For example, you can complete the tax filing
procedure online using the website of the Income Tax Department
instead of filling out physical tax forms at any administrative office.
Government websites also inform you of real-time updates on policy
changes or safety alerts.
8. Health - In today’s world, the Internet has changed how we care for
our health and well-being by making it easier to stay healthy, get the
support we need, and connect with others in similar situations. Let’s
look at some ways the Internet has made things easier for us:
Examples: Telemedicine and online consultation, Access to
medical information and resources, Health fitness apps and
platforms, Online communities, and support groups
10. Social Impact - Social Impact and Activism are about how
people use the Internet to make a difference and improve society by
using viral content to spread messages and letting regular people
share news and opinions.
Examples: Online activism and awareness campaigns, Social
change through viral content, Online petitions
11. Converting Files - The Internet also offers various tools and
services for converting files from one format to another. Whether
converting a document from PDF to Word, an image from JPEG to PNG,
or a video from one format to another, online file conversion services
simplify the process.
12. Video Editing - In the past, professional video editing required
expensive equipment and specialized software. Now, with the help of
the Internet, many platforms offer user-friendly interfaces and a range
of editing features. Users can upload videos, trim clips, add transitions,
apply effects, and even incorporate music and text to create engaging
videos without investing in complex software or hardware.
______________
CYBERCRIMES AND INTERNET THREATS
MODULE
Classification of Cybercrimes
Computer crime encompasses a broad range of activities,
including computer fraud, financial crimes, scams, cybersex
trafficking, and ad-fraud.
a. Computer Fraud
Computer fraud is the act of using a computer to take or
alter electronic data, or to gain unlawful use of a computer or
system. Computer fraud that involves the use of the internet is
also called internet fraud. The legal definition of computer
fraud varies by jurisdiction, but typically involves accessing a
computer without permission or authorization.
Forms of computer fraud include hacking into computers to
alter information, distributing malicious code such as computer
worms or viruses, installing malware or spyware to steal
data, phishing, and advance-fee scams.
b. Cyberterrorism
The term cyberterrorism refers to acts
of terrorism committed through the use of cyberspace or
computer resources. Acts of disruption of computer networks and
personal computers through viruses, worms, phishing, malicious
software, hardware, or programming scripts can all be forms of
cyberterrorism.
Government officials and information technology (IT)
security specialists have documented a significant increase in
network problems and server scams since early 2001. In the
United States there is an increasing concern from agencies such
as the Federal Bureau of Investigation (FBI) and the Central
Intelligence Agency (CIA).
c. Cyberextortion
Cyberextortion occurs when a website, e-mail server, or
computer system is subjected to or threatened with attacks by
MODULE
malicious hackers, often through denial-of-service attacks.
Cyberextortionists demand money in return for promising to stop
the attacks and provide "protection". According to the FBI,
cyberextortionists are increasingly attacking corporate websites
and networks, crippling their ability to operate, and demanding
payments to restore their service. An example of cyberextortion
was the Sony Hack of 2014.
d. Ransomware
Ransomware is a type of malware used in cyberextortion to
restrict access to files, sometimes threatening permanent data
erasure unless a ransom is paid. Ransomware is a global issue,
with more than 300 million attacks worldwide in 2021.
e. Cybersex Trafficking
Cybersex trafficking is the transportation of victims for
such purposes as coerced prostitution or the live streaming of
coerced sexual acts or rape on webcam. Victims are abducted,
threatened, or deceived and transferred to "cybersex dens".
The dens can be in any location where the cybersex traffickers
have a computer, tablet, or phone with an internet connection.
Perpetrators use social media networks, video conferences,
dating pages, online chat rooms, apps, dark web sites, and other
platforms. They use online payment systems
and cryptocurrencies to hide their identities. Millions of reports of
cybersex incidents are sent to authorities annually.
f. Cyberwarfare
According to the U.S. Department of Defense, cyberspace
has emerged as an arena for national-security threats through
several recent events of geostrategic importance, including the
attack on Estonia's infrastructure in 2007, allegedly by Russian
hackers. In August 2008, Russia again allegedly conducted
cyberattacks against Georgia. Fearing that such attacks may
become a normal part of future warfare among nation-states,
military commanders see a need to develop cyberspace
operations.
MODULE
become involved in arbitrating between groups with strong
beliefs. One area of internet pornography that has been the
target of the strongest efforts at curtailment is child
pornography, which is illegal in most jurisdictions in the world.
h. Ad-fraud
Ad-frauds are particularly popular among cybercriminals,
as such frauds are lucrative and unlikely to be prosecuted. Jean-
Loup Richet, a professor at the Sorbonne Business School,
classified the large variety of ad-frauds committed by
cybercriminals into three categories: identity fraud,
attribution fraud, and ad-fraud services.
Identity fraud aims to impersonate real users and
inflate audience numbers.
Attribution fraud impersonates the activities of real
users, such as clicks and conversations.
Ad-fraud services include all online infrastructure and
hosting services that might be needed to undertake
identity or attribution fraud.
i. Online Harassment
Whereas content may be offensive in a non-specific
way, harassment directs obscenities and derogatory comments
at specific individuals, often focusing on gender, race, religion,
nationality, or sexual orientation.
j. Drug Trafficking
Darknet markets are used to buy and sell recreational
drugs online. Some drug traffickers use encrypted messaging
tools to communicate with drug mules or potential customers.
The dark web site Silk Road, which started operations in 2011,
was the first major online marketplace for drugs.
INTERNET THREATS
Cybersecurity is an ever-changing landscape and it can be difficult to
keep up with the latest cybersecurity threats. To help you stay ahead of
potential issues, we have put together a comprehensive list of all types of
Internet threats so you will know exactly what type of security measures
need to be taken to protect your organization’s data and systems. In this
article we will define internet security and define threats in cyber security
include the list of threats you may encounter online.
Internet threat is a threat that makes use of the World Wide Web to
disperse, conceal, and update itself to facilitate cybercrime. By simply using
the internet, we are constantly being bombarded by multiple types of
MODULE
internet threats. All types of internet threats apply various forms of malware
and fraud, in which every part of it uses HTTP or HTTPS protocols, and
utilizes other protocols and components, such as links in email or instant
messaging, or malware attachments that have access to the Web.
MODULE
attacker uses several computers, together with yours, to lift off the
distributed denial-of-service attacks (DDOS).
3. BROWSER HIJACKERS - This is a malware program that modifies web
browser settings without the user’s permission and redirects the user
to websites the user had not intended to visit. Often called a browser
redirect virus because it redirects the browser to other, usually
malicious, websites, a browser hijacker enables browser hijacking.
4. CYBER ATTACK - A cyber-attack is an intentional manipulation attack
against computer systems, networks, and internet-supported devices.
It makes use of malicious code to change the computer code, logic, or
data causing troublesome outcomes that can compromise data and
result in cybercrime such as information and identity damage. It is also
acknowledged as a computer network attack (CNA).
5. CYBERCRIME - Cybercrime is any criminal activity that requires a
computer, networked gadget, or a network. While most cybercrimes
are incorporated online scams with the intention of generating profit
for the cybercriminals, some cybercrimes are carried out against
computers or devices openly to damage or deactivate them, while
others use it to distribute malware, illicit information, images, or other
materials.
6. MALWARE - Malware is any program that is detrimental to a computer
user. Malware consists of computer viruses, spyware, worms, and
Trojan horses. These malicious programs can execute a selection of
functions, ranging from stealing, encoding, or other data breaches
deleting delicate data, modifying or hijacking essential computing
tasks, and monitoring users’ computer actions without their consent.
7. OVERSEAS MONEY TRANSFER SCAM - This type of scam is
specifically tricky where the scammer sends you money under the
guise of payment. Once a device is compromised, hackers have access
to everything on it: contacts, emails, passwords, photos, and any other
sensitive information. To make matters worse, they can also leave
victims with costly bills.
8. SPAM - This is the mass distribution of unwanted messages,
advertising, or pornography to individuals which can simply be found
on the Internet such as social networking sites, company websites, and
personal blogs.
9. SPYWARE - Spyware is software that is installed on a computing
device without the end user’s knowledge.
10. SCAREWARE - Scareware is a type of malware designed to trick
victims into purchasing and downloading useless and potentially
dangerous software. Scareware, which generates pop-ups that
resemble Windows system messages, usually purports to
be antivirus or antispyware software, a firewall application, or a
registry cleaner. The messages typically say that a large number of
MODULE
problems — such as infected files — have been found on the computer
and the user is prompted to purchase software to fix the problems.
11. VIRUSES – A computer virus is a malicious code that replicates
by copying itself to another program, computer boot sector, or
document and changes how a computer works. The virus requires
someone to knowingly or unknowingly spread the infection without the
knowledge or permission of a user or system administrator.
12. WORMS - A computer worm is a type of malicious software
program whose primary function is to infect other computers while
remaining active on infected systems. A computer worm is a malicious,
self-replicating software program (popularly termed ‘malware’) that
affects the functions of software and hardware programs.