By Monique & Mati. My partner and I want to find out who owns and who controls the Internet. We will look at, what the internet is made of, (hardware,

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Intermediate 2 Computing
Web Filtering and Deep Packet Inspection Artyom Churilin Tallinn University of Technology 2011.
ITGS: MUST KNOW TERMS NETWORK. Internet Global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve.
COMPUTER-INTERNET BASICS ROBERTO GALLARDO, MSUES JENNIFER NABZDYK, MLC OCTOBER 6, 2014 *Technology Academy content originally developed by the collaborative.
Chapter 17 Controls and Security Measures
Chapter 12 Network Security.
Some Policy Issues on the Internet An Incomplete Collection of Issues that Policy Makers, Interest Groups, and Activists Care About and that Might Lend.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Communications and Networks
Computer Networks IGCSE ICT Section 4.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
© 2014 Pearson IT Certification Chapter 10 – Internet Connectivity.
By: Amy Simon  What happened to my student’s project?  Why can’t I access my lesson in the computer lab?  I know I saved it… somewhere…  WHERE DID.
Internet Censorship in China By Shipeng Xu. What content is censored? Social networks: Facebook, Twitter, Youtube and Flikr etc. Any news sources contains.
Introduction to Networks. Objectives The purpose and uses of networks The Key components of a computer network The Different types of network and the.
Temburong School Proposal. The hardware and software that the school will need to set up the internet  Routers; to form intranet. intranet  Form of.
Internet Addressing. When your computer is on the Internet, anything you do requires data to be transmitted and received. For example, when you visit.
Transfer of data in ICT systems This section covers: Elements of a network Characteristics of a network Communication of data and use of communication.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
1 Improving Federal Rights-of-Way Management to Spur Broadband Deployment Meredith Attwell Senior Advisor to the Assistant Secretary National Telecommunications.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Introduction to Engineering and Technology Concepts Unit Five Chapter Five – Computer and Internet Connections.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
IT Introduction to Information Technology. The Internet & World Wide Web Began in 1969 with the ARPANET (Advanced Research Project Agency Network)
ICANN Mission, Structure and Constituencies Capacity Building Program June
CHAPTER 9 Using the World Wide Web. OBJECTIVES 1.Describe the Internet and the World Wide Web 2.Define related Internet terms 3.Explain the components.
Www. engineersportal.in. OUTLINES Network & Network Security Need of Network Security Methods of Network Security Firewall Firewall’s Works Firewall’s.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
By Sanjay Chand.  What is a web server?  A web server is a program that, uses the client/server model and the World Wide Web’s HTTP.  My recommendation.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
 It is the transmission of data from one place to another.  A data communication system is made up from hardware, software and communications facilities.
Networks. What is a computer network? A network is two or more computers that are linked together so that they are able to share resources.
Using ICT systems The computer. Using ICT systems Computers in an ICT System Multiple computers, usually with username and password entry Looking after.
Internet Basics. What is it? RESOLUTION by The Federal Networking Council (FNC): "Internet" refers to the global information system that -- (i) is logically.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
Technology for Social Justice Enhancing community sector service delivery Stefanie Kechayas – Senior Consultant 17 November 2015 SharePoint Connect and.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Network Components Reginald Randolph Assignment 3 LTEC 4550.
Higher Computing Networking. Networking – Local Area Networks.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Copyright © 2011, Oxford University Press, Inc. Converging Media A New Introduction to Mass Communication.
IS3220 Information Technology Infrastructure Security
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
THE DOMAIN NAME SYSTEM AS AN ADDRESS DIRECTORY FOR THE WORLDWIDE WEB. 1.
Chapter NETWORK Chapter 5 2 What is a Network? *A network is a group of connected computers that allows people to share information. For example,
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
UNIT V Security Management of Information Technology.
Think / Pair / Share What are Human Rights?
The Internet and connections
(A CORPORATE NETWORK APPROACH)
CONNECTING TO THE INTERNET
Computer Basics Technology’s Impact.
ICT Communications Lesson 1: Using the Internet and the World Wide Web
Computer Technology Notes #4
IS4550 Security Policies and Implementation
Present By:- Company Name: Global Market Forecastes Tel: / Web:
Define the Problem Constant surveillance of citizens in our country
Communicating Through the Internet and Other Technologies
A worldwide system of interconnected computer networks.
Presentation transcript:

By Monique & Mati

My partner and I want to find out who owns and who controls the Internet. We will look at, what the internet is made of, (hardware, software, content) and who controls those aspects. Organisations such as Nation states, IBM, Google, and W3C exercise control over how content is shown on the internet. Corporate content providers (BBC, Sky) are now joined by user-generated content (Youtube, Blogs). Is there a democratic question to be answered? We will investigate this.

 To know who to report misuse to  To find out who set the laws  To find out who influences what we have access to

These are the components needed to access and use the internet to its full potential: HARDWARE  Routers – wireless;  Modems- Etherfast cable modems  Optic Fibre Cables  Microwaves  Telephone- Dial up; ADSL SOFTWARE  Google Chrome  Microsoft internet Explorer  Firefox

In the space of 10 years the use of internet increased by 80%. There has been an even larger increase also in the last 10 years.

The Government? Service Providers? Domain Name Providers? Electricity companies? Schools/Colleges/Universities? Parents? US?!

Humorously described as the Great Firewall of China, Internet restriction policies were highlighted during the 2008 Beijing Olympics when international journalist were not able to access websites blocked by Chinese authorities. Censorship is strongly implemented in China through state run Internet service providers with directives from local government units. SURLEY THIS IS UNETHICAL!?

“China’s ‘digital leap forward’ could actually exacerbate the digital divide, rather than alleviate it.” (Christopher R. Hughes, 2003)

 In 2006, President George W. Bush signed an executive order centralizing in the National Security Agency (NSA) the power to monitor the computer networks of all federal agencies. As a result of this non-legislative initiative, federal law enforcement and intelligence agencies were empowered to monitor even private, domestic networks if they suspected unauthorized intrusions.  In 2009, President Barrack Obama sought and obtained significantly increased funding for federal cybersecurity activities. a new National Centre for Cybersecurity and Communications (NCCC), would gain power to issue enforceable commands to any private company that “relies” on the internet. Any internet traffic or private internet system could be shut down under emergency powers granted in the legislation. These powers could be exercised if the government determines there is a vaguely- defined “incident” that even “potentially jeopardizes” any internet or communications network.

WE INTEND TO SOLVE THIS DEMORATIC ARGUMENT!

 Alverno College. (2003, 7 23). When/how did the Internet get started? Retrieved 11 29, 2010, from Introduction to the Web:  Thomson, J. (2009, April 29). Internet Restrictions In China. Retrieved November 30, 2010, from Articles Base: htmlhttp:// html  Christopher R. Hughes, G. W. (2003). China and the Internet: politics of the digital leap forward. London: Routledgecurzon  CORTÉS, M. V. (2010, January 1). Internet Censorship Around the World. Retrieved Novemeber 23, 2010, from Internet Censorship Around the World:  Barr, B. (2010, June 21). Government pushing to control Internet. Retrieved November 15, 2010, from Government pushing to control Internet: blog/2010/06/21/government-pushing-to-control-internet/