+ All Categories
Home > Education > Internet

Internet

Date post: 07-Aug-2015
Category:
Upload: cktanums
View: 146 times
Download: 0 times
Share this document with a friend
Popular Tags:
20
Dr. CK Tan, UMS 1 Internet and Internet Security
Transcript

Dr. CK Tan, UMS 1

Internet andInternet Security

Dr. CK Tan, UMS 2

What isInternet?

Dr. CK Tan, UMS 3

Internet It is used for global communication,

moving ideas and information.

Cyberspace concepts (virtual environment)

Started with ARPANET (Advanced Research Project Network) by USA in 1969

Known as WWW, World Wide Web in 1992 at CERN (Center for European Nuclear Research) in Switzerland

Dr. CK Tan, UMS 4

Wired Connections

Telephone lines

Coaxial cable

Fiber-optic cable

Dr. CK Tan, UMS 5

fiber-optic - 26,000

coaxial - 80

twisted-pair - 1

Number of Connections

Dr. CK Tan, UMS 6

Wireless Connections

Microwave

Satellite

Wi-Fi

Dr. CK Tan, UMS 7

Internet service providers (ISP)– National (Streamyx, TM Unifi,

Jaring, YES)

Wireless service providers –

DIGI, Celcom, Maxis

How to be connected to internet ?

Dr. CK Tan, UMS 8

How does a modem work?When a computer sends a message (etc. email), the digitalsignal will be converted by the modem into analog signal(modulation). Then the signal travels via the publictelephone networks (etc. streamyx) to the recipient'slocation (etc. USA). When it reaches the destination modem,it is converted back to digital signal (demodulation) andthen the user is able to reach the message.

PUBLIC TELEPHONE NETWORKSATELIT (WIRELESS)

MODULATION

DEMODULATION

Dr. CK Tan, UMS 9

Network Types Local Area Network (LAN)

- networks with computers and peripheral devices

within the same building

Metropolitan Area Network (MAN)

- a networks of LANs

Wide Area Network (WAN)

- integration of LANs and WANs

- countrywide/worldwide networks

Dr. CK Tan, UMS 10

Internet Applications

Communicating

Shopping

Researching

Entertainment

Education

Dr. CK Tan, UMS 11

Uses of internet for education

E-learning– Lecture notes, discussion board, online exam

Education portal– LMS, free MOOC courses –

Openlearning.com (chats, discussion, online tuitions)

Information showcase– Personal websites/homepage

– Educational shareware– Ex: hot-potatoes/surveymonkey.com (for

building online quiz)

Dr. CK Tan, UMS 12

Internet Security

Dr. CK Tan, UMS 13

Is email secure?

snoopware, spyware, phishing

Stealing confidential info (HP numbers, etc)

Browser records pages that are visited

Cookies record – Times and pages visited

– Other private information

Breach of privacy and security: Examples

Dr. CK Tan, UMS 14

Computer Threats and Crimes

Thefts (organised crime)

– Hardware theft, stealing data – online and offline (lost password)

– Software piracy

“Hackers” (for fun and challenge) and

“crackers” (for malicious purposes)

Natural disasters (flood, fire)

Dr. CK Tan, UMS 15

Viruses– Damage to computers, programs or files

3 types:– Virus (damage/delete system files)

– Worm (self-multiplying and spreads)

– Trojan (can be virus or worm)

Computer Threats and Crimes

Dr. CK Tan, UMS 16

ICT Laws in Malaysia – From MyMIS 2002 (MCMC)

Dr. CK Tan, UMS 17

Other Privacy Laws

Freedom of Information Act (1970)

Privacy Act (1974)

Dr. CK Tan, UMS 18

ICT Security Measures Protecting Information (antivirus, backing

up data)

Encrypting messages (make password more complex)

Restricting access (password and firewall)

Anticipating disasters (disaster recovery plan)

Secured the computer labs (door grill, smart card access, CCTV, security guard)

Enhanced online system (anti-hacking)

Dr. CK Tan, UMS 19

Ergonomics Ergonomics study of human

factors related to things people use

Physical Health– Avoiding eyestrain and headache– Avoiding back and neck pain– Avoiding effects of

electromagnetic fields

Dr. CK Tan, UMS 20

Ergonomics


Recommended