2. Wireless LAN
Uses a wireless
medium — such as
radio frequency
transmissions — to
connect computers,
printers, and other
devices
RF is most common
for WiFi hotspots
IR or Bluetooth for
short2 range devices
4. Location-Based Services
and GPS
Handheld wireless
devices, such as
smartphones and
tablets, are ubiquitous
in today’s modern
mobile societies
4
5. Location-Based Services
and GPS
Location-based services (LBS) are
wireless services offered to customers
based on their physical location
E9-1-1
At the heart of this and other LBSs are
the global positioning system
(GPS) satellite network and receivers
mounted in automobiles or placed in
cell phones or other handheld devices
5 Chapter 6: Understanding
Internet Technologies and
Security
6. Location-Based Services
and GPS
Geosocial
networking is a term
used to describe the
combination of LBS
with social networking
providers
Foursquare
Yelp
Google Latitude
6 Chapter 6: Understanding
Internet Technologies and
Security
7. Internet Telephony and Web
Conferencing
Internet telephony
Voice over IP (VoIP)
Uses TCP/IP and packet switching to send voice
transmissions over private or public IP network
• E-businesses, such as Vonage, offer digital telephony
services
• Computer to computer calling using special software,
such as Skype
7 Chapter 6: Understanding Internet Technologies and Security
8. Internet Telephony and Web
Conferencing
8 Chapter 6: Understanding Internet Technologies and Security
9. Security/privacy
Security: how safe is our data and equipment?
Privacy: how safe is my information?
Passwords (biometrics?)
Firewalls
Viruses
Data encryption
Spam and spyware
Cookies
Browser history and cache
Cyberstalking
Cyberbullying
Questions to ask about sharing information online:
Who, what, when, where, why, and how?
10. Network Security Issues and
Technologies
Internal threats
Security policies and
procedures
Authorized network
access
Wireless network
security
Data backup and
restore
Disaster recovery
planning
10
11. Network Security Issues and
Technologies
External threats
Unauthorized network
access
Computer viruses
Web page hacking
Firewalls and proxy
servers
Internet filtering
software
Security audits
11
12. Network Security Issues and
Technologies
Transactional
risks
Protecting
and
validating
online
transaction
information
12
14. The digital divide
Nearly 1 in 5 American adults does not use the Internet
(78% do, plus 95% of teens)
Least likely users (% who use Internet):
Adults over 65 – 41%
<$30,000 household income – 62%
No HS diploma – 43%
62% have broadband, 3% dial-up, lots of mobile use
(88% have cell phones)
65% of Internet users use social networks (50% of adults)
What can’t you do without the Internet? (48% of non-
users say it’s not relevant to their lives)
Pew Internet and American Life Survey in 2012
15. Copyright & file sharing
Print, e-books, MP3 audio, video
Protecting copyright of digital items
Easier digitization of existing items
Easier sharing of illegal copies (file sharing, etc.)
Lack of legislative guidance (old law)
DRM – Digital Rights Management
Limiting copying and printing
Breaks fair use exemptions?
Stopping file sharing networks