Topic 7 Internet Control and Privacy
Topic 7 Internet Control and Privacy
Topic 7 Internet Control and Privacy
Internet Tools
The internet offers a range of services to its consumers. We can upload and download the files/
data via the internet as it is a pool of knowledge. We have the ability to access or obtain
information as needed. It is quite popular because of the variety of senders available on the
Internet. Web services have grown in popularity as a result of these offerings. To
access/exchange a large amount of data such as software, audio clips, video clips, text files, other
documents, etc., we require internet services. We must use an Internet service in order to connect
to the Internet. Data can be sent from Internet servers to your machine via Internet service. Some
of the internet services are FTP, Telnet, VoIP, etc. In this report, we will learn about different
types of internet services.
Internet services
To access/exchange a large amount of data such as software, audio clips, video clips, text files,
other documents, etc., we need internet services. You must use an Internet service in order to
connect to the Internet. Data can be sent from Internet servers to your machine via Internet
service. Some of the commonly used internet services are :
Communication Services
Information Retrieval Services
File Transfer
World Wide Web Services
Web Services
Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010
Directory Services
Automatic Network Address Configuration
Network Management Services
Time Services
Usenet
NewsGroup
Ecommerce
www.geeksforgeeks.org: Free tutorials, millions of articles, live, online, and classroom courses,
frequent coding competitions, industry expert webinars, internships, and job possibilities are all
available. A computer-based system for searching and locating data in a file, database, or another
source.
www.crayola.com: It includes advice for students, parents, and educators on how to be more
creative.
3. File Transfer: The exchange of data files across computer systems is referred to as file
transfer. Using the network or internet connection transferring or shifting a file from one
computer to another is known as file transfer. To share, transfer, or send a file or logical data
item across several users and/or machines, both locally and remotely, we use file transfer. Data
files include – documents, multimedia, pictures, text, and PDFs and they can be shared by
uploading or downloading them. To retrieve information from the internet, there are various
services available such as:
5. World Wide Web: The internet is a vast network of interconnected computers. Using this
network, you can connect to the world wide web (abbreviated as ‘www’ or ‘web’) is a collection
of webpages. The web browser lets you access the web via the internet.
6. Directory Services: A directory service is a set of software that keeps track of information
about your company, customers, or both. Network resource names are mapped to network
addresses by directory services. A directory service provides users and administrators with full
transparent access to printers, servers, and other network devices. The directory services are :
DNS (Domain Number System): This server provides DNS. The mappings of computer
hostnames and other types of domain names to IP addresses are stored on a DNS server.
LDAP (Lightweight Directory Access Protocol): It is a set of open protocols that are
used for obtaining network access to stored data centrally. It is a cross-platform
authentication protocol for directory services and also allows users to interact with other
directory services servers.
7. Automatic Network Address Configuration: Automatic Network Addressing assigns a
unique IP address to every system in a network. A DHCP Server is a network server that is used
to assigns IP addresses, gateways, and other network information to client devices. It uses
Dynamic Host Configuration Protocol as a common protocol to reply to broadcast inquiries from
clients.
8. Network Management Services: Network management services are another essential internet
service that is beneficial to network administrators. Network management services aid in the
prevention, analysis, diagnosis, and resolution of connection problems. The two commands
related to this are:
ping: The ping command is a Command Prompt command that is used to see if a source
can communicate with a specific destination & get all the possible paths between them.
traceroute: To find the path between two connections, use the traceroute command.
9. Time Services: Using facilities included in the operating system, you may set your computer
clock via the Internet. Some services are :
Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010
Network Time Protocol (NTP): It is a widely used internet time service that allows you
to accurately synchronize and adjust your computer clock.
The Simple Network Time Protocol (SNTP): It is a time-keeping protocol that is used
to synchronize network hardware. When a full implementation of NTP is not required,
then this simplified form of NTP is typically utilized.
10. Usenet: The ‘User’s Network’ is also known as Usenet. It is a network of online discussion
groups. It’s one of the first networks where users may upload files to news servers and others can
view them.
11. News Group: It is a lively Online Discussion Forum that is easily accessible via Usenet.
Each newsgroup contains conversations on a certain topic, as indicated by the newsgroup name.
Users can use newsreader software to browse and follow the newsgroup as well as comment on
the posts. A newsgroup is a debate about a certain topic made up of notes posted to a central
Internet site and distributed over Usenet, a global network of news discussion groups. It uses
Network News Transfer Protocol (NNTP).
SECURITY ISSUES
Although Internet led to many benefits, it also poses a greater potential for security
threats. Below are a number of common Internet security issues.
Hacker
Refers to a person who can gain unauthorized access to (break into) a computer or a
network to commit crimes.
Gain access to the personal information (credit card numbers, bank account, Social
Insurance Number, etc.);
Steal, change, exploit, sell, or destroy data;
Damage or bring down the system;
Hold the system hostage to collect ransom;
Malware
Malware (short for malicious software) – a software that is designed to damage, disrupt,
or infect computers.
Malware is a single term that refers to all the different types of threats to your computer
safety such as virus, Trojan horse, worm, spyware, etc.
Malware can gain unauthorized access to a computer and continuously run in the
background without the owner’s knowledge.
Computer virus
A specific type of malware that is designed to replicate (copy) and spread from one
computer to another.
Trojan horse
A type of malware that looks harmless but can cause harm to a computer system.
The Trojan horse appears to be a legitimate gift comparable to a Trojan virus, which
looks like legitimate software.
The virus will take control of a system and possibly leave it vulnerable to other
"invaders."
Worm
It is similar to a virus (a sub-class of a virus). It is designed to quickly self-replicate and
spread copies of itself from one computer to another.
The key difference between a worm and a virus is that a worm does not require any
human action to replicate while a virus does. A virus only spreads when a user opens an
affected file whereas a worm spreads without the use of a host file.
Phishing
A scammer uses deceptive emails or websites and tries to obtain valuable personal
information (i.e., username, password, account number, etc.).
Spyware
A software that secretly monitors (spies) user’s online behaviour and gets sensitive
information about a person or organization without the user’s knowledge.
A spyware can record a user’s Web browsing habits, email messages, keystrokes on
online advertisements, personal information, etc., and forward it to a third party.
Advertisers can use spyware to target specific advertisements to your tastes.
Criminal organizations can use spyware to collect financial information (banking
accounts, credit card information, password, etc.).
Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010
Social Engineering
Encompasses all of the non-technical ways an attacker may use to gain access or do
damage to your systems or data. The most common method is the oldest: lying or using
fabricated information to gain trust.
Password Attacks
Attacking or maliciously authenticating password-protected accounts is what this term
refers to. This is generally aided by the use of software that accelerates the cracking or guessing
of passwords. Brute forcing, dictionary attacks, password spraying, and credential filling are the
most common methods of attack.
• Brute Forcing – It is a hacking method in which all passwords and data stored on your
computer are cracked thru trial and error. It is an effective method for getting
unauthorized access to individual accounts, as well as systems and networks within
businesses.
Dictionary Attacks – It is a systematic way of attempting to guess passwords by using
familiar words or phrases.
• Password Spraying – It is a hacking method in which someone attempts the same
password on numerous accounts before switching to another and repeating the procedure
until the account is successfully accessed by the attackers.
• Credential Filling - It is a hacking method in which attackers obtain access to a system or
account by using a list of compromised user credentials. Bots are used by attackers to
accelerate the assumption that many users reuse usernames and passwords across various
platforms.
Comodo Antivirus
AVAST Free Antivirus
AVG Antivirus Free
Avira Antivirus
Bitdefender Antivirus
Sophos Home Free
Kaspersky Free
Some of the ways to prevent and keep your devices safe from malware:
• Keep your devices and software updated - Devices (smartphones, computers, laptops, etc.)
often release updates for their operating systems and software. These updates include fixes that can
improve the security of your system and prevent malware attacks.
• Think carefully before clicking links or downloading anything on the internet - Downloads are
one of the main ways why a person gets malware on his devices. Clicking or opening an unknown link
and attachment to an unknown sender can install malware, such as viruses, spyware or ransomware, on
your device.
• Don't trust pop-up windows asking you to download this software - Open or downloading from
one of these popups (for example, a virus warning) can result in viruses, malicious software called
"trojans," and "keyloggers" that gather and collect passwords and sensitive data. It can cause severe
damage and the inability to use your computer.
• Use antivirus software - When downloading something, always use an antivirus program to scan
your downloaded software or whatever you have downloaded. Antivirus software can also scan your
entire computer for malware. A nice and effective idea to catch malware early and prevent it from
spreading is to run regular scans of your computer.
Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010
Republic of the Philippines
BULACAN AGRICULTURAL STATE COLLEGE
Institute of Engineering and Applied Technology
Pinaod, San Ildefonso, Bulacan, Philippines 3010