Sunteți pe pagina 1din 44

Chapter 2

Introduction to the
World Wide Web and Communication
What is Website?
A website is a collection of
related web pages, including multimedia
content, typically identified with a common
domain name, and published on at least
one webserver.
Examples are wikipedia.org, google.com,
and amazon.com.
The History

Sir Tim Berners-Lee is a British computer scientist. He was born in London, and his parents were
early computer scientists, working on one of the earliest computers. Growing up, Sir Tim was
interested in trains and had a model railway in his bedroom.
He recalls:
“I made some electronic gadgets to control the trains. Then I ended up getting more interested in
electronics than trains. Later on, when I was in college I made a computer out of an old television
set.”

After graduating from Oxford University, Berners-Lee became a software engineer at CERN, the
large particle physics laboratory near Geneva, Switzerland. Scientists come from all over the
world to use its accelerators, but Sir Tim noticed that they were having difficulty sharing
information.
What is available on the Website?
• It is the World Wide Web
• It also refer as the Web,
• It is an information space where documents
and other web resources are identified by
Uniform Resource Locators(URLs),
interlinked by hypertext links , and can be
accessed via the Internet
WWW Explanation:
• It is a system of interlinked, hypertext
documents accessed through the Internet.
• It enables the retrieval and display of text and
media to your computer.
• It provides space for wide range of information
like documents, content and videos.
• These URLs or say unique addresses of the
content, are stored in WWW server.
• Web browser is a software used to access or
request for information.
How does the Web work?
• The web server sends out pages
when they are requested by a web
browser, such as Microsoft Internet
Explorer, Mozilla Firefox or Google
Chrome.
• The host and client communicate
using an agreed 'language' called
HTTP (Hypertext Transfer Protocol).
What is Web Browser?
• A web browser is a software application used to locate, retrieve and
display content on the World Wide Web, including Web pages,
images, video and other files.
• As a client/server model, the browser is the client run on a computer
that contacts the Web server and requests information.
• The Web server sends the information back to the Web browser
which displays the results on the computer or other Internet-enabled
device that supports a browser.
What is URL ?
Uniform Resource Locators
URL is a reference to a web resource that specifies its location on
a computer network and a mechanism for retrieving it.

A URL is a specific type of Uniform Resource Identifier (URI) , the


generic term for all types of names and addresses that refer to objects
on the World Wide Web.

It is the global address of documents and other resources on the


World Wide Web.

For example: www.webopedia.com is a URL.


Parts of a URL:
The first part of the URL is called a protocol identifier and it indicates what
protocol to use, and the second part is called a resource name and it specifies
the IP address or the domain name where the resource is located.

The protocol identifier and the resource name are separated by a colon and
two forward slashes.

For example, the two URLs below point to two different files at the
domain webopedia.com.

The first specifies an executable file that should be fetched using the FTP
protocol
ftp://www.webopedia.com/stuff.exe
The second specifies a Web page that should be fetched using the HTTP
protocol:
http://www.webopedia.com/index.htm
What is HTTP?
• The Hypertext Transfer Protocol (HTTP) is an application
protocol for distributed, collaborative, and hypermedia
information systems.
• HTTP is the foundation of data communication for the World
Wide Web.
• Hypertext is structured text that uses logical links (hyperlinks)
between nodes containing text
• HTTP is the underlying protocol used by the World Wide Web
and this protocol defines how messages are formatted and
transmitted, and what actions Web servers and browsers should
take in response to various commands.
What is HTTPS
• Hyper Text Transfer Protocol Secure (HTTPS) is
the secure version of HTTP, the protocol over
which data is sent between your browser and the
website that you are connected to.
• The 'S' at the end of HTTPS stands for 'Secure'. It
means all communications between your browser
and the website are encrypted.
What is Hypertext?
• Hypertext is the text displayed on a computer display or
other electronic devices with references (hyperlinks) to other text
that the reader can immediately access, or where text can be
revealed progressively at multiple levels of detail. (also
called Stretch Text)
• Hypertext documents are interconnected by hyperlinks, which are
typically activated by a mouse click, keypress sequence or by
touching the screen.
What is Hypermedia
• Hypermedia, an extension of the term hypertext, is a nonlinear
medium of information that includes graphics, audio, video, plain text
and hyperlinks.
• This designation contrasts with the broader term multimedia, which
may include non-interactive linear presentations as well
as hypermedia.

• The first hypermedia work was, the Aspen Movie Map.


• Bill Atkinson's HyperCard popularized hypermedia writing, while a variety
of literary hypertext and hypertext works, fiction and nonfiction,
demonstrated the promise of links.
• Most modern hypermedia is delivered via electronic pages from a variety of
systems including media players, web browsers, and stand-alone
applications (software that does not require network access).
• Audio hypermedia is emerging with voice command devices and voice
browsing.
Domain names are used to identify one or more IP addresses.
For example, the domain name microsoft.com represents about a dozen IP
addresses.

Domain names are used in URLs to identify particular Web pages. For example, in
the URL http://www.pcwebopedia.com/index.html, the domain name is
pcwebopedia.com.

Every domain name has a suffix that indicates which top level domain (TLD) it
belongs to. There are only a limited number of such domains. For example:
gov - Government agencies
edu - Educational institutions
org - Organizations (nonprofit)
mil - Military
com - commercial business
net - Network organizations
ca - Canada
th - Thailand
Computer Security and
Controls
Computer Security and Controls
• is the protection of computer systems from the theft of or damage
to their hardware, software, or electronic data, as well as from
the disruption or misdirection of the services they provide.

• Security controls are the measures taken to safeguard an


information system from the attacks against the confidentiality,
integrity, and availability of the information system
Three types of security controls

Physical Administrative
Security Security
Controls Controls
Technical
Security
Controls
Physical Security Controls
• To control physical access to sensitive information and to
protect the availability of the information.
• To ensure that unauthorized persons are excluded from
physical spaces and assets where their presence
represents a potential threat
• Examples of physical security controls are physical
access systems including:
• guards and receptionists,
• door access controls,
• restricted areas,
• closed-circuit television (CCTV),
• automatic door controls and human traps,
• physical intrusion detection systems,
• physical protection systems.
Technical Security Controls
• Technical security controls is also called logical controls, they refer to restriction of
access to system
• Logical security elements consist of those hardware and software features provided
in a system that helps to ensure the integrity and security of data, programs and
operating systems,
1. Hardware elements that segregate core and thus present overlap, accidental
or intentional; Core clearing after job to prevent the following job seizing
control, level of privileges that restrict access to the operating system
programs, firmware programs that are not software- modifiable and similar
elements.
2. Software elements that provide access management capabilities. These are
the key security elements in a program to protect electronic information. An
effective logical security system provides the means to identify, authenticate,
authorize, or limit the authenticated user to certain previously stipulated
actions, for each system user who may sign on or for each program that may
be called on by the computer to process files with established value factors.
Administrative and Operational
Controls
• Administrative security controls also called procedural controls It is main
procedures and policies which put into place to define and guide employee
actions in dealing with the organizations' sensitive information.
• They inform people on how the business is to be run and how day to day
operations are to be conducted.
• Laws and regulations created by government bodies are also a type of
administrative control because they inform the business .
• Administrative security controls in the form of a policy can be enforced with
technical or physical security controls.
• For instance, security policy may state that computers without antivirus
software cannot connect to the network, but a technical control, such as
network access control software, will check for antivirus software when a
computer tries to attach to the network.
Computer Crime and Fraud
• Software piracy
• Copyright act
• Computer misuse act
What is Intellectual
Property?
Intellectual property is protected in law by a company from outside use or
implementation without consent, which enable people to earn financial benefit
from what they create. Intellectual property need to register.

4 Types of intellectual property include:

1. Patents (for new or improved products and services)


2. Trade marks (for logos and brands)
3. Registered designs (for the shape or appearance of a product)
4. Copyright (including software, databases, and other copyright works)

Visit : http://www.myipo.gov.my to register/


Price : http://www.registercompany.com.my/index.php?mid=5058
The Threats
1. Intellectual property threats -- use existing materials found on the Internet
without the owner's permission, for example music downloading, domain name
(cybersquatting), software pirating etc..

2. Client computer threats


– Malicious codes
– Active contents

3. Communication channel threats


– Sniffer program
– Backdoor
– Spoofing
– Denial-of-service

4. Server threats
– Privilege setting
– Server Side Include (SSI), Common Gateway Interface (CGI)
– File transfer
– Spamming
Types of Cybercrime

• Fraud • Botnet
• Hacking • Cyberbullying
• Scamming • Cyber terrorism
• Computer Viruses • Identity theft
• Ransomware • Cyberstalking
• DDoS Attack
DATA PROTECTION TIPS
FOR MOBILE DEVICES
• User Authentication
• Update Your Mobile OS with Security Patches
• Regularly Back Up Your Mobile Device
• Enable Remote Data Wipe as an Option
• Disable Wi-Fi and Bluetooth When Not Needed
• Consciously check and configure app privacy settings.
• Take care of privacy settings immediately upon setup
• Don't forget to backup your mobile device data.
• Disable automatic uploading.
• Get anti-virus or anti-malware protection for your mobile devices.

S-ar putea să vă placă și