The Internet: Part 1 The Internet and Web Browsers Created by Kelly Seale Adapted by Jill Einerson.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Internet Basics Instructors : Connie Hutchison & Christopher McCoy.
The Internet and the Web
Standard 1.02 Investigate uses of the Internet and World Wide Web.
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
® Microsoft Office 2010 Browser and Basics.
BlueRedGreenPurpleOrange.
 2008 Pearson Education, Inc. All rights reserved Web Browser Basics: Internet Explorer and Firefox.
Google Chrome & Search C Chapter 18. Objectives 1.Use Google Chrome to navigate the Word Wide Web. 2.Manage bookmarks for web pages. 3.Perform basic keyword.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Security, Privacy, and Ethics Online Computer Crimes.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
The Internet 8th Edition Tutorial 1 Browser Basics.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
Internet safety By Lydia Snowden.
With Internet Explorer 8© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Go! with Internet Explorer 8 Getting Started.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Security for Seniors SeniorNet Help Desk
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
Build a Free Website1 Build A Website For Free 2 ND Edition By Mark Bell.
Staying Safe Online Keep your Information Secure.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
1 Chapter 2 & Chapter 4 §Browsers. 2 Terms §Software §Program §Application.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Using a Web Browser What does a Web Browser do? A web browser enables you to surf the World Wide Web. What are the most popular browsers?
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Tutorial 1: Browser Basics.
Web Searching Basics Dr. Dania Bilal IS 530 Fall 2009.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
SURFING THE WEB PRIVACY, SAFETY, AND RELIABLE SOURCES.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
MODULE 3 Internet Basics © Paradigm Publishing, Inc.1.
XP Browser and Basics COM111 Introduction to Computer Applications.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
© 2010 Pearson Education, Inc. | Publishing as Prentice Hall. Computer Literacy for IC 3 Unit 3: Living Online Chapter 2: Searching for Information.
Internet safety By Suman Nazir
The World Wide Web. What is the worldwide web? The content of the worldwide web is held on individual pages which are gathered together to form websites.
WELCOME to Internet 102. Overview of Internet 102 Review of basic internet navigation Review of basic internet navigation Searching for and finding information.
W elcome to our Presentation. Presentation Topic Virus.
and Internet Explorer.  The transmission of messages and files via a computer network  Messages can consist of simple text or can contain attachments,
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
The Internet & Web Browsers Business Webpage Design Created by Kelly Seale Adapted by Jill Einerson.
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Managing Windows Security
Chapter 10: Web Basics.
Software Applications for end-users
INTERNET.
Objective % Explain concepts used to create websites.
Objective Explain concepts used to create websites.
Presentation transcript:

The Internet: Part 1 The Internet and Web Browsers Created by Kelly Seale Adapted by Jill Einerson

Internet Necessities Internet Service Provider (ISP) ◦Comcast ◦CenturyLink ◦Utopia Web Browser ◦Internet Explorer ◦Mozilla Firefox ◦Google Chrome Search Engine ◦Google ◦Yahoo

URL Uniform Resource Locator Identifies Internet locations ◦Protocol ◦Host name or server ◦Folder name ◦File name

Domains.com (commercial).edu (colleges).gov (government).net (networking).org (non profit).mil (military)

Cookies An Internet cookie is a piece of data placed on your machine by a Web server. Your computer uses cookies to save and retrieve information like when you fill out a form on the Internet with your name, address and other information. Some cookies store passwords to restricted sites and track user browsing habits. Cookies only keep track of data you provide. They cannot search your hard drive to gather additional personal data. Many retailers and search engines use cookies to track your purchasing preferences for marketing purposes. To delete cookies:  Click Settings Advanced Settings  Clear Browsing Data, All Cookies

Secured Site Two indications that ensure confidential data ◦https protocol on URL address ◦security button (padlock icon) on browser

Web Browser A Web browser is: ◦A tool for travelling the Internet ◦A multimedia interface allowing integration of text, graphics, audio and video.  Chrome (68% in 2015)*  Mozilla Firefox (19.1%)  Internet Explorer (6.3%)  Safari (3.7%) * source:

Google Chrome

History Feature Displays all recently visited URLs Use to help you to return to previously viewed web pages Access it by Ctrl+H (in most browsers)

Bookmarks or Favorites Save links to useful resources Create your own custom menus ◦CTRL + Shift + B to see bookmarks bar ◦Click the star to add a bookmark ◦Drag a link to the bookmark bar ◦Ctrl+D (in most browsers)

Tabbed Browsing Allows more than one web page to open within the same browser window. Each window appears on a separate tab Use to organize web pages while browsing

References This presentation was created by Kelly Seale of Nebo School District

The Internet: Part 2 Searching the Web Effectively

What is a Search Engine? Search Engine – indexes information in Web pages to present you with a list of relevant Web pages when you run a search. Search engines send Web crawlers or spiders out to the World Wide Web to read the contents of Web pages. Examples: Google, Yahoo, Bing and Ask

Searching the Web Effectively What have you “googled” today? Fact: Google is the world’s most popular search engine Google facilitates over eight billion searches each day

Other Search Engines Bing Yahoo Ask Dogpile Yippy

How do search engines differ? Unique formulas called algorithms Different ranking strategies Which sites are searched ◦Some search the entire web for results ◦Specialty search engines (dailystocks.com)  Only search sites that are relevant Metasearch engines ◦Search other search engines ◦Example:

Strategies for Searching Try a variety of search engines, not just Google Use Advanced Search form Use Keywords and Phrases ◦Related to your subject ◦Consider other meanings Use Boolean Operators (AND+,(..), OR, NOT -, “”) ◦Ex: “sand sharks”

Safety Reminders Pair / Share: Turn to a neighbor. You will be given 2 minutes to read #1-10 Safety Reminders and guess what the answers should be. We will then discuss them as a class.

The Internet: Part 3 Security and Privacy on the Internet

Computer Crime Computer Fraud – Use of a computer or computer data for dishonest purposes Hacking – Invading someone else’s computer or its data for malicious intent or personal gain Spyware- Software that is installed secretly to take partial control over the user’s interactions on the computer without the user’s consent Phishing- attempting to acquire sensitive information (passwords, account #s etc.) by masquerading as a trustworthy entity by electronic communication ( , text, etc.) Viruses – Cause corruption of data or hardware on a computer.

Types of Viruses Worms – designed to overwrite operating system memory space on the hard drive. Worms spread on their own via file transport methods like . Time Bombs – a virus written to do something malicious at a specific date or time

Types of Viruses Trojan Horse- A virus that is spread by embedding the virus in another file. This allows someone else to access your computer without your knowledge. Logic Bombs- A virus that makes the computer do something that is theoretically impossible such as dividing by 0.

Types of Viruses Macro Virus- A virus that is embedded inside a macro. Once the macro is enabled, the virus begins. File Virus- A virus that targets a specific file.

Types of Viruses Attachments- Viruses are passed by opening attachments on while using the Internet Boot Sector Virus- a virus that targets the boot sector of your hard drive. It makes it so you can’t boot up your computer.

Ways to Protect Against Viruses

Anti-Virus Software For Purchase:Free to download: Norton Anti-Virus - $79.99/year McAfee - $24.99/year Kaspersky - $39.99/yr Microsoft Security Essentials (MSE) Avast! AVG Free

Attachments Cautions Don’t open attachments or that aren’t familiar to you. Save the attachments to a disk then scan the disk for viruses

Patches A patch is a piece of software designed to fix problems with, or update a computer program. Patches are useful because they often address new viruses or security issues that are known by the software company.

Safe External Devices Scan all disks (storage devices) before allowing them to be read by your computer.

Firewall A firewall is software that inspects network traffic passing through it. It denies or permits passage based on a set of rules. A firewall can prevent network intrusion into a private network.

Privacy Issues Ways to protect your data

What is the best way to protect your data? Control access to the data. Use a password! For tips on creating a strong password, visit us/windows-vista/tips-for-creating-a- strong-passwordhttp://windows.microsoft.com/en- us/windows-vista/tips-for-creating-a- strong-password

Is Private? on the Internet is NOT considered to be private. ◦It would be hard to regulate ◦Employers pay for the software and your time while working. ◦Courts have ruled that it is not private. Yes, employers can access your at work You can be fired for bad conduct while at work.

What can spyware do? Spyware can do the following: ◦Track personal information ◦Change computer settings ◦Redirect you to websites that have viruses

What is a filter? Software designed to control what content is permitted to the reader It is used to restrict material delivered over the web.

Evaluating a Web Site Not all information found on the Internet is accurate or reliable. Consider the following: ◦Authority ◦Content ◦Frequency ◦Purpose ◦Design/Format

Social Media and Privacy Issues Pair Share ◦Instructions: With a partner, discuss section 6 of your notes. Fill in the blanks with the answers you think are correct. In about 2 minutes, we will discuss them as a class.