Download presentation
Presentation is loading. Please wait.
Published byMelinda Jordan Modified over 9 years ago
1
IT internet security
2
The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase i) is any collection of separate physical networks, interconnected by a common protocol to form a single logical network The Internet (uppercase I) is the worldwide collection of interconnected networks that uses Internet Protocol (IP) to link the various physical networks into a single logical network
3
The World Wide Web A network of information contained in web pages which are found and viewed by using web browser programs eg Internet Explorer or Netscape Technically, the World Wide Web is all the resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP) It links pages and sites together using hypertext links The web is not the same as the Internet. It is just part of it, and only one of several Internet environments Others include email, Internet Relay Chat, FTP (File transfer Protocol), and Usenet news groups
4
Browser A software application used to navigate the www to locate and display Web pages eg Explorer A World Wide Web access program that requests documents or other files from a web server, and displays them on a user's display device
5
Intranet A private network of computers within an organization used to share information and computing resources It sits behind a firewall and is only accessible to people who are members of the same organization, using passwords and logins Uses regular Internet protocols and looks like a private version of the Internet
6
Extranet It is an intranet that is partially accessible to authorized outsiders You can only access an extranet if you have a valid username and password, and your identity determines which parts of the extranet you can access
7
Viruses Self-replicating programs that spread by inserting copies of itself into executable code or documents Can only spread from one computer to another when its host is taken to the uninfected computer, eg sending it over a network or carrying it on a removable disk May cause a simple prank that pops up a message May destroy programs and data right away or on a certain date Can lie dormant and do its damage once a year. eg the Michaelangelo virus contaminates the machine on Michaelangelo's birthday
8
Worms A computer worm is a self-replicating computer program, similar to a computer virus It is self-contained and does not need to be part of another program or attach itself to other files or programs to spread itself It may be designed to do any number of things, eg delete files or send documents via email or carry other executables as a payload It can spread itself automatically over the network from one computer to the next
9
Trojans Trojan horse is a program in which harmful code is contained inside apparently harmless program or data so that it can get control and cause damage
10
Hoaxes Hoaxes may seem harmless, but they do a great deal of damage to the Internet as a whole Not only do they slow down traffic and clog up email servers, but they also cause people to panic
11
Phishing A form of identity theft an e-mail is sent that looks like it comes from a legitimate company (eg E-Bay) telling you that you must update your records and verify your username and password The site is really a fraud which captures your information to steal your identity, money, or whatever
12
Spam The Internet version of junk mail Over 50% of all emails today are junk Spamming is sending the same message to a large number of mailing lists or newsgroups without consent The term probably comes from a famous Monty Python skit Often used to carry viruses, worms etc
13
Spyware (or Adware) Program that secretly monitors your actions on your computer without your permission Sends this information to someone else Some are sinister and gather information about e-mail addresses, passwords and credit cards Some are used by software companies to gather data about customers
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.