Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.

Slides:



Advertisements
Similar presentations
The Internet and the Web
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
By the end of this section, you will know and understand the hardware and software involved in making a LAN!
® Microsoft Office 2010 Browser and Basics.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
What is a Firewall Anyway?
Files, Folders, Telecommunications, & Services Dreamweaver for Business & College Mrs. Wilson.
Security, Privacy, and Ethics Online Computer Crimes.
Project 1 Introduction to HTML.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
The Internet = A World of Opportunities
1st Project Introduction to HTML.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Chapter ONE Introduction to HTML.
1Lecturer: Dalia Mirghani Saadabi. 2 A set of computers connected together so that they can communicate is called a computer network. This involves installing.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Dr. Omar Al Jadaan The Internet. Internet Service Provider (ISP) Content Providers: create and maintained material that can be accessed using the internet.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
HTML, XHTML, and CSS Sixth Edition Chapter 1 Introduction to HTML, XHTML, and CSS.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
1 An Overview of Telecommunications Telecommunications: the electronic transmission of signals for communications Telecommunications medium: anything that.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Communication, Networks, The internet and the Worldwide Web.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Networks.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
The World Wide Web 1. Structure for the Internet The Internet is organized around four network access points (NAPs). A different company operates each.
Web Design. What is the Internet? A worldwide collection of computer networks that links millions of computers by – Businesses (.com.net) – the government.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Chapter 1 Introduction to HTML, XHTML, and CSS HTML5 & CSS 7 th Edition.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
The Internet. The Internet and Systems that Use It Internet –A group of computer networks that encircle the entire globe –Began in 1969 Protocol –Language.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Computer Security Keeping you and your computer safe in the digital world.
Fourth Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Internet The internet is the largest computer network system in the world. It consists of many smaller networks connected together by a global public.
ICT in Product Manufacture ISDN, LAN, WAN, Intranets and extranets, global networks
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
Technology Chapters 9 and 18.
Presentation transcript:

Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Read to Learn Describe the Internet and its components. Identify tools for managing threats when using the Internet.

The Main Idea The Internet has changed the way business is done. However, it poses risks to the information that is stored on computers. Companies and people must protect their computers from threats.

Key Concepts The Internet Managing Technology Threats

Key Terms Internet a global computer network

Key Terms World Wide Web a system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet

Key Terms Web browser search engine a program used for displaying and viewing pages on the Web a computer program that can produce a list of documents related to a given topic

Key Terms intranet extranet a computer network used by an organization an extension of the intranet of a company or organization

Key Terms hacker cookies a person who illegally gains access to and sometimes tampers with information in a computer system bits of information about a computer users that are stored on that computer’s hard drive

Key Terms virus a program that can insert copies of itself into a computer without the user’s knowledge, often damaging stored data

The Internet People access the Internet through their telephone lines, digital subscriber lines (DSL), or over cable or ethernet connections. Internet a global computer network

The Internet Modems are devices used to send data from one computer to another.

The World Wide Web The World Wide Web is also known as “the Web.” World Wide Web a system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet

The World Wide Web The World Wide Web Consortium (W3C) is an international association in which member organizations, a full-time staff, and the public work together to develop Web standards.

The World Wide Web To access the information on the Internet, a person can use a Web browser and a search engine. Web browser a program used for displaying and viewing pages on the Web search engine a computer program that can produce a list of documents related to a given topic

The World Wide Web Web browsers include design, graphics, and sounds, which make it more enjoyable to surf, or search for information.

The World Wide Web Users find information they need by typing a keyword in to the search engine.

The World Wide Web Web browsers include Mozilla Firefox ®, Netscape ®, and Microsoft Internet Explorer ®. Search engines include Yahoo! ®, MSN ®, and Lycos ®.

Intranets and Extranets An intranet works like the Internet, but its access is restricted to authorized users. intranet a computer network used by an organization

Intranets and Extranets An extranet is a semi-private network that allows more than one company access to the same information. extranet an extension of the intranet of a company or organization

Collaboration Software Many businesspeople find they can communicate better with their customers and employees using collaboration software. WebEx ™, Microsoft’s Live Meeting ®, and IBM Lotus Sametime ® are some types of this software.

Managing Technology Threats A hacker is an example of the many privacy and security risks and threats to users of computer technology. hacker a person who illegally gains access to and sometimes tampers with information in a computer system

Managing Technology Threats To avoid privacy and security threats, do not click on pop-up ads unless you know and trust the company.

Privacy Issues Companies use software tools to track computer users online. Some people see cookies as an invasion of privacy. cookies bits of information about a computer user that are stored on that computer’s hard drive

Privacy Issues Users who visit online stores can have their personal information stored on the company’s server even if they do not buy anything.

Privacy Issues Those who do not want companies to store and use their personal information must reject or delete cookies.

Privacy Issues A worm is a special computer virus that invades a computer network and multiplies itself as it spreads throughout the network. virus a program that can insert copies of itself into a computer without the user’s knowledge, often damaging stored data

Privacy Issues Security programs such as anti-virus software protect against different types of viruses. Anti-virus software must be updated regularly because new viruses are created every day.

Privacy Issues Spyware is software that tracks what a user does on the Internet. Some software packages can protect users from spyware.

Privacy Issues A firewall is computer software that prevents unauthorized access to a system software or data on a user’s computer. A firewall can reduce spam.

Privacy Issues A security breach occurs when someone manages to obtain unauthorized access to your system.

1.How would you describe the Internet and the World Wide Web? The Internet is a global computer network of interconnected documents and files. The World Wide Web is a system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet.

2.How does a search engine work? It looks through countless Web pages and creates a content index for each.

3.How can a computer user protect against spam, viruses, worms, and spyware? install firewall software, anti-virus, and spyware-protection software