Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.

Slides:



Advertisements
Similar presentations
The Internet Unit Information Systems, Higher. The Internet HTML Two sets of notes.
Advertisements

PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
© 2010, Robert K. Moniot Chapter 1 Introduction to Computers and the Internet 1.
The Internet Useful Definitions and Concepts About the Internet.
Web Server Administration
Layer 7- Application Layer
Internet…issues Managing the Internet
The Internet and the World Wide Web. Una DooneyThe Internet and WWWSlide 2 What is the Internet? A collection of networks (LANS and WANS) around the world.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Unit 28- Website Development Assignment 1- THEORY P3
Topics in this presentation: The Web and how it works Difference between Web pages and web sites Web browsers and Web servers HTML purpose and structure.
© 2004, Robert K. Moniot Chapter 1 Introduction to Computers and the Internet.
Implementing Application Protocols. Overview An application protocol facilitates communication between applications. For example, an client uses.
Process-to-Process Delivery:
Internet Services -World Wide Web - -Conferencing and Newsgroups -File Transfer & Updating -Chat/Instant Messaging.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Human-Computer Interface Course 5. ISPs and Internet connection.
PC Maintenance: Preparing for A+ Certification Chapter 25: The Internet.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Internet Basics A management-level overview of the Internet, its architecture, capabilities, and protocols. Copyright 2011 SPMI / Online Development.
 The internet is the hardware that creates the massive worldwide network. Computers, cables, telephone wires, high-speed communication lines. The internet.
E-Business William R. Mussatto CyberStrategies, Inc. 12/2/2000.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
Introduction to Internet terms. Topics to Study What is Internet HTTP URL SMS MMS Wi-Fi Video Conferencing Social Webisites.
WHAT IS A WEBSITE AND HOW TO GET YOUR BUSINESS ONLINE Anna Gabali – 30/07/ MKLC.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Jozef Goetz, Application Layer PART VI Jozef Goetz, Position of application layer The application layer enables the user, whether human.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Accessing Evitech network via FTP by Susan Jansson.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
Mr C Johnston ICT Teacher
TCP/IP. The idea behind TCP/IP is exactly the same we explained about the OSI reference model: when transmitting data, programs talk to the Application.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Topics in Technology and Marketing In The Beginning.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Website Design and Construction Services and Standards.
Web Design Vocabulary #3. HTML Hypertext Markup Language - The coding scheme used to format text for use on the World Wide Web.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
Level 2 Diploma Unit 10 Setting up an IT Network
Some bits on how it works
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Protocols and networks in the TCP/IP model initially.
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Topic 5: Communication and the Internet
Working at a Small-to-Medium Business or ISP – Chapter 7
Process-to-Process Delivery:
Protocols 2 Key Revision Points.
FTP AND COMMAND PROCESSING IN FTP
Protocol Application TCP/IP Layer Model
Computer Networks Protocols
The Internet and Electronic mail
Presentation transcript:

Report task

Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which websites have to adhere to such as Data Protection Act (DPA), equality act 2010, copyright act The current methods of sharing information and movement such as web 2.0 Explain the application layer protocol in relation to TCP/IP

Hackers Viruses Identity Theft IMPACT THESE HAVE ON WEBSITES!

Firewalls Secure Socket Layers Passwords.

DATA PROTECTION ACT Think about how 8 rules + how to apply them to websites

Equality act sibility/lawsandstandards/Pages/uk_law.aspx sibility/lawsandstandards/Pages/uk_law.aspx For instance, it may be unlawful for a website to: have links on that are not accessible to a screen reader have application forms (for instance, for bank accounts or job application forms) in a PDF format that cannot be read by a screen reader have core service information (for instance, timetables on a public transport website) that is not in a format accessible to screen readers. use text, colour contrasting and formatting that make the website inaccessible to a partially sighted service user change security procedures (for instance, on an e-commerce website) without considering the impact of blind and partially sighted customers that use screen readers.

Copyright act See unit 30 – how this impacts web developers

online.co.uk/regulations.shtml The Data Protection Act 1998 The Privacy and Electronic Communications Regulations The Privacy and Electronic Communications Regulations Accessibility - The Disability Discrimination Act 1995 (DDA) Accessibility - The Disability Discrimination Act 1995 (DDA) E-Commerce Regulations 2002 W3C Validation (World Wide Web Consortium) W3C Validation The Companies Act 2008

Web 2.0 With Web 2.0… Users own the data Users control the data There is a climate of participation Users value add as their needs evolve The interface is friendly

Application layer. On the Application layer you will find Application protocols such as SMTP (for e- mail), FTP (for file transfer) and HTTP (for web browsing). Each kind of program talks to a different Application protocol, depending on the program purpose After processing the program request, the protocol on the Application layer will talk to another protocol from the Transport layer, usually TCP. Application Layer This layer makes the communication between programs and the transport protocols. There are several different protocols that work on the Application layer. The most known are HTTP (HyperText Transfer Protocol), SMTP (Simple Mail Transfer Protocol), FTP (File Transfer Protocol) When you ask your program (called client) to download s that are stored on an server, it will request this task to the TCP/IP Application layer, being served by the SMTP protocol. When you type in a www address on your web browser to open a web page, your browser will request this task to the TCP/IP Application layer, being served by the HTTP protocol (that is why web pages start with “ And so on. The Application layer talks to the Transport layer through a port. Ports are numbered and standard applications always use the same port. For example, SMTP protocol always use port 25, HTTP protocol always use port 80 and FTP protocol always use ports 20 (for data transmission) and 21 (for control). The use of a port number allows the Transport protocol (typically TCP) to know which kind of contents is inside the packet (for example, to know that the data being transported is an ) allowing it to know, at the reception side, to which Application protocol it should deliver the received data. So, when receiving a packet target to port 25, TCP protocol will know that it must deliver data to the protocol connected to this port, usually SMTP, which in turn will deliver data to the program that requested it (the program).