©2004 West Legal Studies in Business A Division of Thomson Learning 1 Cyberlaw –Law governing the use of computers and the Internet –Made up of state and.

Slides:



Advertisements
Similar presentations
Intermediate 2 Computing
Advertisements

Internet and WWW CS216. Open System Interconnection (OSI)
The Internet and the World Wide Web. Una DooneySlide 2Internet and WWW What is the Internet? This is the physical infrastructure or backbone of computers,
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
The Internet and the World Wide Web. Una DooneyThe Internet and WWWSlide 2 What is the Internet? A collection of networks (LANS and WANS) around the world.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 The Internet, Intranets, and Extranets Chapter 7.
Lesson 19 Internet Basics.
Internet basics, Browsers, application, advantages and disadvantages, architecture, WWW, URL, HTML Week 10 Mr. Mohammed Rahmath.
Internet Basics مهندس / محمد العنزي
CHAPTER THE INTERNET, THE WEB, AND ELECTRONIC COMMERCE 22.
CSI315 Lecture 1 WEEK 1. The Internet A world-wide network of millions of computers connected to share information and communication. The interconnected.
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
The Internet and E-Commerce Back to Table of Contents.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
Connecting one computer to another computer creates a network.
Lesson 2 — The Internet and the World Wide Web
2013Dr. Ali Rodan 1 Handout 1 Fundamentals of the Internet.
What Is the Internet? Living Online Lesson 2 IC 3 Basics Ambrose, Bergerud, Busche, et. Al.
The Internet in Education Objectives Introduction Overview –The World Wide Web –Web Page v. Web Site v. Portal Unique and Compelling Characteristics Navigation.
Web Mastering Module Internet Fundamentals. What is the Internet? –Global network of networks –Communicating using same set of rules (protocols/languages)
Internet Technology I د. محمد البرواني. Project Number 3 Computer crimes in the cybernet Computer crimes in the cybernet Privacy in the cybernet Privacy.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
1 INTERNET AND eBUSINESS (I) BUS Abdou Illia, Fall 2012 (October 29, 2012)
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Network Installation. Internet & Intranets Topics to be discussed Internet. Intranet. .
How did the internet develop?. What is Internet? The internet is a network of computers linking many different types of computers all over the world.
CIS 1310 – HTML & CSS 1 Introduction to the Internet.
1 CP586 © Peter Lo 2003 Multimedia Communication Multimedia and the Internet.
1 Web Development & Design Foundations with XHTML Chapter 1 Key Concepts.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
The Internet. Network - Collection of computers and devices connected together via communications devices Internet - Worldwide collection of networks.
How Does the Internet Work? Protocols Protocols are rules that describe how computers communicate and exchange data. The Internet has a series of these.
Communication, Networks, The internet and the Worldwide Web.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
SETTING UP AN INTERNET NETWORK What you’ll need Your options How does data travel the Internet? Different terminology.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Copyright © 2007 Pearson Education, Inc. Slide 3-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
Internet Architecture and Governance
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Management Information Systems, 4 th Edition 1 Chapter 7 E-Commerce: The Internet, Intranets, and Extranets.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Internet Essentials. The History of the Internet The Internet started when the Advanced Research Projects Agency (ARPA) of the United States Defense Department.
© 2003 Prentice Hall, Inc.4-1 Chapter 4 Telecommunications and the Internet Information Systems Today Leonard Jessup & Joseph Valacich.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
The Internet. The Internet and Systems that Use It Internet –A group of computer networks that encircle the entire globe –Began in 1969 Protocol –Language.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Basics of Networking & Internet Services Prof. Sadique Khan.
Internet Essentials. The History of the Internet The Internet started when the Advanced Research Projects Agency (ARPA) of the United States Defense Department.
The Internet & World Wide Web
Evolution of Internet.
Electronic Resources and the WWW
الوحدة 5 مقدمة في شبكة الانترنت.
Web Design & Development
E-commerce Infrastructure
Unit# 5: Internet and Worldwide Web
COM 205 Multimedia Applications
COM 205 Multimedia Applications
Presentation transcript:

©2004 West Legal Studies in Business A Division of Thomson Learning 1 Cyberlaw –Law governing the use of computers and the Internet –Made up of state and federal constitutional, statutory, and case law –Builds on traditional laws that apply to brick- and-mortar companies

©2004 West Legal Studies in Business A Division of Thomson Learning 2 The Internet –Network of computer networks Used for , file transfer, chatrooms –Different from the World Wide Web (WWW) Used for commerce and information dissemination

©2004 West Legal Studies in Business A Division of Thomson Learning 3 History of the Internet 1969 ARPANET –Department of Defense built to enable defense researchers at various sites across the country to communicate and collaborate Universities Began to Use –Discussion groups, access to databases, and file transfers 1973 ARPANET Grew –Connected to more networks, including those in other countries 1980’s National Science Foundation –Built its own network 1990 ARPANET –Ceased to exist WWW in 1991 –Until this time commercial use was prohibited

©2004 West Legal Studies in Business A Division of Thomson Learning 4 WWW 1991 CERN European Laboratory for Particle Physics –For physicists to exchange formatted academic and technical papers –1990 Tim Berners-Lee developed and named the WWW

©2004 West Legal Studies in Business A Division of Thomson Learning 5 Internet Works Individual user connects to an Internet Service Provider (ISP) by phone line, satellite dishes, or cable television lines Slower connections use modems; faster connections use network interfaces The bandwidth is the capacity of the line Larger ISPs connected to the backbone of the Internet, and have their own international networks

©2004 West Legal Studies in Business A Division of Thomson Learning 6 Internet Addresses Every computer connected to the Internet has a unique Internet protocol (IP) address that consists of four series of three numbers ranging from 1 to 256, separated by periods. Hard to remember 12 numbers Domain Name System (DNS) implemented in 1984 –Matches the 12 numbers with a text name in a manner similar to a telephone directory. –Type in the text address into a browsers (IE), the domain server connects the name with the number and connects the two computers

©2004 West Legal Studies in Business A Division of Thomson Learning 7 Domain Names Top-level domain name and subdomain names –TLDs - Every country given a top-level domain name UK = co.uk for company in United Kingdom US = com, gov, net, org –Legal Issue – conflict between domain name and trade name or mark

©2004 West Legal Studies in Business A Division of Thomson Learning 8 Language of the Internet –Need for a common language –Hypertext markup language (HTML) = common language –Hypertext transfer protocol (http) = a way of exchanging such files –HTML can be viewed on any type of computer, using any operating system, as long as it has an appropriate viewer = web browsers

©2004 West Legal Studies in Business A Division of Thomson Learning 9 URL Uniform Resource Locator Within a domain, there may be many web pages or files Each file is identified by its URL Files are stored on the web server of that Internet node Files are transferred from server to a client or browser

©2004 West Legal Studies in Business A Division of Thomson Learning 10 Transmitting Information All info is transmitted by digital transmissions, represented by zeroes and ones All data travels in packets –Each packet has a header with the address of the computer to which it is being sent

©2004 West Legal Studies in Business A Division of Thomson Learning 11 Packet Communication Files and messages are carved (Packetized) into standard size bundles of information. –A network must have a system for carving information into packets at the sending end (packetizing) and reassembling the packets into messages and files at the receiving end (de-packetizing) Not all packets follow the same route to the end address

©2004 West Legal Studies in Business A Division of Thomson Learning 12 Netiquette Culture on the Internet

©2004 West Legal Studies in Business A Division of Thomson Learning 13 Regulation of Cyberspace No one owns the Internet = self policing Internet Society oversees boards and task forces that make policy –Engineering Steering Group = Internet Standards –Internet Engineering Task Force = protocol engineering and development group –ICANN = domain names –WWW Consortium (W3C) develops Web technologies

©2004 West Legal Studies in Business A Division of Thomson Learning 14 Designed to be “Open” and Unsecured Now e-commerce lacks security & privacy –Cookies = server stores on user’s machine Information about last visit: may include name, address, sex, pages visited, etc. –Java enables the sender to execute programs on the visitor’s machine JVM java virtual machine program in the browser supposed to protect user from harmful java programs being put on the user’s machine – does not always work

©2004 West Legal Studies in Business A Division of Thomson Learning 15 Cache Temporary storage space on the user’s hard drive When a web page is viewed, a copy is held in this storage space Overwritten each time web page is visited

©2004 West Legal Studies in Business A Division of Thomson Learning 16 Information Security Firewalls –programs that limit the access to computers or files on a computer by many methods: passwords, time of day, etc. Filters –Block access to certain sites based on keywords contained in the document –W3C developed Platform for Internet Content Selection (PICS) – how to insert labels in documents based on rating criteria developed by others

©2004 West Legal Studies in Business A Division of Thomson Learning 17 Information Security cont. Need to protect packets as they travel through the Internet –Private key – encrypt and decrypt using same key –Public key – encrypt and decrypt using two keys

©2004 West Legal Studies in Business A Division of Thomson Learning 18 Information Security cont. Carnivore – FBI’s system capable of monitoring Internet transmission by intercepting at the ISP level –Foiled by good encryption Magic Lantern - a program that enables FBI to install a program on a user’s computer that will capture the key strokes of the user, key logging systems (KLS) and reveal the password to the encryption to the FBI

©2004 West Legal Studies in Business A Division of Thomson Learning 19 Information Security cont. Digital signatures –Encrypt your signature with your private key –Receiver has public key to unencrypt –This proves it is your signature and not spoofing

©2004 West Legal Studies in Business A Division of Thomson Learning 20 Weaknesses of the Internet Denial of service attacks by overloading a server – Ping of Death Viruses Passwords stolen

©2004 West Legal Studies in Business A Division of Thomson Learning 21 Business Uses of Internet Technologies Intranet - solely within an organization Extranet - open your intranet to a limited number of people on the outside (customers, clients) Virtual Private Networks ( secure a piece of the Internet for your use only) File transfer protocol (FTP) – move files from one computer to another Peer-to-Peer networks: Kazaa and Gnutella –Connect individual machines for the purpose of sharing files without the need for a third-party server

©2004 West Legal Studies in Business A Division of Thomson Learning 22 Business Uses continued Instant messaging – communicating in real time Videoconferencing – –Spam –Flooding

©2004 West Legal Studies in Business A Division of Thomson Learning 23 Globalization 2002 more than two-thirds of the Internet users are outside of U.S.

©2004 West Legal Studies in Business A Division of Thomson Learning 24 Law and Cyberspace –Chapter 1 E-Business an Cyberlaw –Chapter 2Jurisdiction –Chapter 3Trademarks –Chapter 4Copyrights –Chapter 5Business Method Patents –Chapter 6Online Contracting and Licensing Agreements –Chapter 7Sales Tax in E-Commerce –Chapter 8Online Security Offerings –Chapter 9Privacy –Chapter 10Obscenity –Chapter 11Defamation –Chapter 12Internet and Information Security –Chapter 13 Internet and Computer Crime