it internet security. the internet the internet - a physical collection of many networks worldwide...

13
IT internet security

Upload: melinda-jordan

Post on 01-Jan-2016

220 views

Category:

Documents


0 download

TRANSCRIPT

  • IT internet security

  • The InternetThe Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase i) is any collection of separate physical networks, interconnected by a common protocol to form a single logical network The Internet (uppercase I) is the worldwide collection of interconnected networks that uses Internet Protocol (IP) to link the various physical networks into a single logical network

  • The World Wide WebA network of information contained in web pages which are found and viewed by using web browser programs eg Internet Explorer or NetscapeTechnically, the World Wide Web is all the resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP)It links pages and sites together using hypertext linksThe web is not the same as the Internet. It is just part of it, and only one of several Internet environmentsOthers include email, Internet Relay Chat, FTP (File transfer Protocol), and Usenet news groups

  • BrowserA software application used to navigate the www to locate and display Web pages eg ExplorerA World Wide Web access program that requests documents or other files from a web server, and displays them on a user's display device

  • IntranetA private network of computers within an organization used to share information and computing resources It sits behind a firewall and is only accessible to people who are members of the same organization, using passwords and loginsUses regular Internet protocols and looks like a private version of the Internet

  • ExtranetIt is an intranet that is partially accessible to authorized outsiders You can only access an extranet if you have a valid username and password, and your identity determines which parts of the extranet you can access

  • VirusesSelf-replicating programs that spread by inserting copies of itself into executable code or documentsCan only spread from one computer to another when its host is taken to the uninfected computer, eg sending it over a network or carrying it on a removable diskMay cause a simple prank that pops up a message May destroy programs and data right away or on a certain date Can lie dormant and do its damage once a year. eg the Michaelangelo virus contaminates the machine on Michaelangelo's birthday

  • WormsA computer worm is a self-replicating computer program, similar to a computer virus It is self-contained and does not need to be part of another program or attach itself to other files or programs to spread itself It may be designed to do any number of things, eg delete files or send documents via email or carry other executables as a payloadIt can spread itself automatically over the network from one computer to the next

  • TrojansTrojan horse is a program in which harmful code is contained inside apparently harmless program or data so that it can get control and cause damage

  • HoaxesHoaxes may seem harmless, but they do a great deal of damage to the Internet as a wholeNot only do they slow down traffic and clog up email servers, but they also cause people to panic

  • PhishingA form of identity theft an e-mail is sent that looks like it comes from a legitimate company (eg E-Bay) telling you that you must update your records and verify your username and password The site is really a fraud which captures your information to steal your identity, money, or whatever

  • SpamThe Internet version of junk mailOver 50% of all emails today are junkSpamming is sending the same message to a large number of mailing lists or newsgroups without consent The term probably comes from a famous Monty Python skit Often used to carry viruses, worms etc

  • Spyware (or Adware)Program that secretly monitors your actions on your computer without your permissionSends this information to someone elseSome are sinister and gather information about e-mail addresses, passwords and credit cardsSome are used by software companies to gather data about customers