0% found this document useful (0 votes)
17 views26 pages

Grade 10-Internet and Its Uses - Handout

The document provides an overview of the Internet, the World Wide Web, digital currency, and cybersecurity. It explains the differences between the Internet and the Web, details about URLs and web protocols, and discusses the functions of web browsers and cookies. Additionally, it covers digital currencies, blockchain technology, and various cybersecurity threats and protective measures.

Uploaded by

Priyanka G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views26 pages

Grade 10-Internet and Its Uses - Handout

The document provides an overview of the Internet, the World Wide Web, digital currency, and cybersecurity. It explains the differences between the Internet and the Web, details about URLs and web protocols, and discusses the functions of web browsers and cookies. Additionally, it covers digital currencies, blockchain technology, and various cybersecurity threats and protective measures.

Uploaded by

Priyanka G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

The Internet and its uses

• The Internet and the world wide web(WWW)


• Digital Currency
• Cyber security
THE WORLD WIDE WEB Vs THE INTERNET
• The internet refers to the global network of computers and other
electronic devices connected together through a system of routers
and servers
• It is the infrastructure that allows us to send and receive
information, including email, instant messaging, and file transfers
• The internet also provides access to other services such as online
gaming, video streaming, and cloud computing

• The world wide web, or simply the web, is a collection of


websites and web pages that are accessed using the internet
• It was created in 1989 by Tim Berners-Lee.
• The web consists of interconnected documents and multimedia
files that are stored on web servers around the world
• Web pages are accessed using a web browser, which communicates
with web server to retrieve and display the content.
What is a URL?

• The URL is a text-based address that identifies


the location of a resource on the internet.
• It is the address of a web page, image, video, or any
other resource available on the internet
Components of a URL

A URL can contain three main components:


• Protocol
• Domain name
• Web page / file name

• The protocol is the communication protocol used to transfer data between


the client and the server
• E.g. HTTP, HTTPS, FTP, and others.

• The domain name is the name of the server where the resource is located
It can be a name or an IP address.

• The web page / file name is the location of the file or resource on the
server .It can contain the name of the file or directory where the resource
is located.
• A URL looks like this:
• protocol://domain/path
• E.g. https://www.example.com/index.html is a URL that
consists of the HTTPS protocol, the domain name "
www.example.com", and the file name is "/index.html".
Protocols

• Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol


Secure (HTTPS) are the two most common protocols used
for transferring data between clients and servers on the
internet.

Hypertext Transfer Protocol (HTTP)


• HTTP is the protocol used for transferring data between a client
and a server on the internet
• It is a stateless protocol, meaning it does not store any information
about previous requests or responses.
• HTTP operates on port 80 by default and sends data in plain text
format, making it vulnerable to interception and manipulation.
Hypertext Transfer Protocol Secure
(HTTPS)
• HTTPS is a secure version of HTTP that
uses encryption to protect data transferred between a
client and a server
• It operates on port 443 by default and uses Transport
Layer Security (TLS) or Secure Socket Layer (SSL) to
encrypt data
• HTTPS ensures that data transferred between the client
and server is secure, making it harder for
unauthorised users to intercept or manipulate data
Web Browser
• A web browser is a piece of software used to access
and display information on the internet.

Purpose or Functions of a Web Browser:


• Render HTML
• This will display the webpage
• Storing bookmarks and favourites
• Web browsers allow users to save links to frequently visited
websites and access them easily using bookmarks or favourites
• Recording user history
• Web browsers record the user's browsing history, allowing them
to quickly revisit recently viewed pages
• Allowing use of multiple tabs
• Web browsers allow users to open multiple tabs and switch
between them quickly and easily
• Storing cookies
• Web browsers store cookies, which are small files that contain
user preferences and login information for websites
• Providing navigation tools
• Web browsers provide navigation tools, such as back and
forward buttons and a home button, to help users move
between pages
• Providing an address bar
How web Browsers help us to view a
webpage
• Web browsers provide an address bar, which allows users to
enter a URL or search term and navigate to a website or
search for information.
• When you type in a URL / click on a link the browser sends the
URL to the DNS using HTTP
• The DNS finds the matching IP addresses for the URL and
sends the IP address to the web browser
• The web browser sends a request to the web server for web
pages
• The web pages are sent from the web server to the browser
• The browser renders HTML to display web pages
Cookies
• Cookies are small files that are stored on a user's device by a
website.
Functions:
• Saving Personal Details
• Cookies can save personal details which can be used to personalise the
user experience. This can include
• Name
• Email address
• Other preferences
• Tracking User Preferences
• Cookies can track user preferences such as language settings, font size,
and colour scheme, which can be used to customise the website
experience
• Holding Items in an Online Shopping Basket
• Cookies can hold items in an online shopping cart, so that users can
continue shopping or return later without losing their selected items
• Storing Login Details
• Cookies can store login details such as usernames and passwords,
which can be used to remember users' login credentials and make it
easier for them to log in.
• Storing Relevant Purchases
• Displaying Relevant Adverts
• Tracking Visitor Statistics
• Determining whether a visitor to a website is a new visitor or repeat
visitor
Types of cookies
• Session Cookies
• These are temporary and are stored only during a user's
browsing session
• They are used to maintain a user's state or activity during a
single session, such as when filling out a form or navigating
through a website
• Persistent Cookies
• These are stored on a user's device for a longer period,
usually for a few weeks to several years
• They are used to remember user preferences and settings,
such as language preferences, login details, and shopping
cart items
Digital Currency

• A digital currency is a type of currency that exists only in electronic form and is not
backed by any physical commodity or government. Only Exists Electronically
• Digital currencies are purely electronic, meaning they do not exist in physical form like
traditional currencies such as cash or coins. They are stored in digital wallets or accounts and
can be transferred electronically between individuals or businesses
• Decentralised
• Many digital currencies operate on a decentralised network; meaning that they are not
controlled by any central authority like a government or financial institution
• Instead, transactions are verified and recorded on a public ledger known as a blockchain
• Used for Transactions
• Digital currencies can be used for various transactions, including purchasing goods and
services online or transferring money internationally
• They can also be used for investments or as a store of value
• Volatile
• Digital currencies can be highly volatile; meaning their value can fluctuate rapidly over short
periods of time
• This can make them risky investments and can also make it difficult to use them as a stable
store of value
• Examples include Bitcoin, Ethereum, Litecoin, and Ripple
Blockchain
• Blockchain is a digital ledger that records every
transaction made with a particular digital currency
• Each transaction is time-stamped and added to the
blockchain in a permanent and unalterable way
• Blockchain is a decentralised technology, meaning that
it is not controlled by a single entity or authority
• Instead, every participant in the network has a copy of the
ledger and can verify the transactions independently
• The blockchain is made up of "blocks" of transactions
that are linked together in a "chain"
using cryptographic algorithms
• This creates a secure and tamper-proof record of every
transaction made with the digital currency

• Each transaction in the blockchain must be verified by


multiple participants in the network
• This verification process ensures that the transaction is
legitimate and prevents any fraudulent activity
• Digital currencies use blockchain technology to securely
record transactions. Each transaction is encrypted and
added to a block, which is then chained to previous
transactions, creating a secure and unalterable record.
Cyber Security
• Cyber security involves protecting computer systems,
networks, and data from theft, damage, or unauthorized
access. It includes a wide range of practices,
technologies, and processes designed to safeguard d
• Cybersecurity threats pose a major challenge for
individuals and organisations that rely on digital
technology to store and transmit sensitive
information. digital assets and information from cyber
threats.
• Brute-Force Attack is a trial-and-error method used to crack
passwords or encryption keys by trying every possible
combination until the correct one is found. The aim of a brute-
force attack is to gain unauthorised access to a system or
network.
• Data interception involves eavesdropping on
communication channels to intercept and steal sensitive
information, such as passwords, credit card numbers, or
personal data. The aim of data interception is to steal sensitive
information for personal gain or to use it for further cyber
attacks
• Distributed Denial of Service (DDoS) Attack is
where multiple computers are used as bots and they flood a
server with lots of requests at the same time which the server
can’t respond to; causing it to crash or become unavailable to
users. The aim of a DDoS attack is to disrupt the normal
functioning of a system or network by denying users access.
• Hacking involves gaining unauthorised access to a system or
network to steal or manipulate data, disrupt services, or
cause damage. The aim of hacking can vary from personal
gain to activism or cyber espionage.
• Phishing involves the user is sent an email which looks
legitimate. This contains a link to a fake website where the
user is encouraged to enter their details. The aim of phishing
is to steal sensitive information for personal gain or to use it
for further cyber attacks.
• Pharming involves malware being downloaded (malicious
code installed) without the user’s knowledge. This redirects
the user to a fake website where they’re encouraged to enter
their personal details. The aim of pharming is to steal
sensitive information for personal gain or to use it for further
cyber attacks
• Social engineering involves manipulating individuals to gain access to
confidential information or to perform an action that benefits the attacker
• This can include techniques such as:
• This involves posing as someone else to gain trust or access to sensitive
information
• Attackers might pretend to be a co-worker, IT support personnel, or a law
enforcement officer to get people to divulge sensitive information or perform
an action they wouldn't otherwise do
• Baiting is a social engineering technique that involves enticing a victim with
a desirable item or promise to extract sensitive information or gain access to
a system
• Attackers might leave a USB drive with a tempting label, like "salary
information," in a public place and wait for someone to pick it up and plug it
into a computer
• Once the drive is connected to the computer, the attacker can access
sensitive information or install malware
• Pretexting involves creating a fake scenario to extract sensitive information
• The attacker might pose as a bank representative and ask for personal
information to "verify your account”
• Malware is malicious software designed to harm or gain unauthorised access to a
system or network. Types of malware include:
• A virus is a piece of code that attaches itself to a legitimate program or file and
then replicates itself to spread to other programs or files on the computer. It can
cause damage to the system, including deleting data or damaging hardware
• A worm is similar to a virus but is a standalone program that can spread and
replicate itself over computer networks. It can take up storage space or bandwidth
• A Trojan horse is a program that disguises itself as a legitimate program or file,
but when installed, it can delete data or damage hardware
• Spyware is software that records all key presses and transmits these to a third
party
• Adware is a type of software that displays unwanted advertisements on the
computer without the user's consent. Some of these may contain spyware and
some may link to viruses when clicked
• Ransomware is a type of malware that encrypts the user's files and demands a
ransom payment to decrypt them. It can cause data loss, and financial damage
and disrupt business operations
• The aim of malware attacks can range from data theft to extortion or disruption of
services
Data Safety from security
Threats
• Access levels: Access levels refer to the specific permissions that are
assigned to different users or groups of users for accessing certain
data or resources.

• Anti-malware: Anti-malware, including anti-virus and anti-spyware,


are software programs that are designed to detect and remove
malware from a computer or network. They work by scanning files and
identifying any known malware signatures.

• Authentication: Authentication refers to the process of verifying the


identity of a user. This can be done through a variety of methods, such
as username and password, biometrics, and two-step verification.
• Automating software updates: Automating software updates refers to
the process of automatically updating software and applications on a
computer or network.

• Checking the spelling and tone of communications: Checking the


spelling and tone of communications refers to the process of reviewing
communications, such as emails, which often use poor grammar and tone in
order to trick users into providing sensitive information or clicking on
malicious links.

• Checking the URL attached to a link: Checking the URL attached to a


link refers to the process of verifying the destination of a link before clicking
on it. This can be done by hovering over the link to view the URL or by right-
clicking and selecting "Copy Link Address" or similar option
• Firewalls: Firewalls are network security devices that
monitor and control incoming and outgoing network
traffic. They work by examining each packet of data
that passes through the network and determining
whether it should be allowed to pass or blocked based
on a set of predefined rules.

• Privacy settings: Privacy settings refer to the settings


that allow users to control how their personal
information is shared and used. These settings can be
adjusted on a wide variety of platforms, such as social
media sites, mobile devices, and web browsers.
• Proxy-servers: A proxy server is a computer or
application that acts as an intermediary between a
client and a server. They are used to route network
traffic and can help to enhance security by providing an
additional layer of protection against hacking and other
types of cyber threats.
• Secure socket layer (SSL) security protocol: Secure
socket layer (SSL) is a security protocol that is used to
establish an encrypted link between a web server and a
web browser. This link ensures that all data passed
between the web server and the browser remains
private and cannot be intercepted by a third party.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy