Your SlideShare is downloading. ×
Internet(2)
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Internet(2)

1,390
views

Published on

Published in: Technology

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,390
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. THE INTERNET Every machine transparently connected to every other
  • 2. WHAT IS THE INTERNET?
    • The Internet is a global network of computer networks. Each of these networks contains anywhere from two to thousands of computers that are linked together using special rules called protocols. When computers are connected to the Internet they are able to communicate and share information
  • 3. HOW DID THE INTERNET START?
    • The Internet began in the late 1960s as a network of computers that the United States Department of Defense developed using communication technology that could continue to function even when it was partially damaged.
    • In the 1980s the National Science Foundation (NSF) used this same technology to create its own network (NSFNET), which allowed researchers to share data and access resources located on remote computers.
    • Eventually many educational, governmental, commercial, and other organizations connected their own local computer networks to the NSFNET to form what is now known as the Internet.
  • 4. HOW DOES THE INTERNET WORK?
    • Computers that are connected to the Internet communicate with each other using a protocol or special language called TCP/IP (Transmission Control Protocol/Internet Protocol). TCP/IP defines how information moves among computers on the Internet.
  • 5. WHO IS WHO ON THE INTERNET ?
    • Internet Society (ISOC): Founded in 1992, an international nonprofit professional organization that provides administrative support for the Internet. Founded in 1992, ISOC is the organizational home for the standardization bodies of the Internet.
    • Internet Engineering Task Force (IETF): Forum that coordinates the development of new protocols and standards. Organized into working groups that are each devoted to a specific topic or protocol. Working groups document their work in reports, called Request For Comments (RFCs).
    • IRTF (Internet Research Task Force): The Internet Research Task Force is a composed of a number of focused, long-term and small Research Groups.
    • Internet Architecture Board (IAB) : a technical advisory group of the Internet Society, provides oversight of the architecture for the protocols and the standardization process
    • The Internet Engineering Steering Group (IESG) : The IESG is responsible for technical management of IETF activities and the Internet standards process. Standards. Composed of the Area Directors of the IETF working groups.
  • 6.
    • Advantages of the Internet:
  • 7. E-MAIL: Send and receive instant electronic messages
  • 8. ACCESS INFORMATION:
    • The Internet is a virtual treasure of information.
  • 9. SHOPPING:
    • You do not need to leave your house
  • 10. ONLINE CHAT:
    • There are many ‘chat rooms’ on the web.
  • 11. DOWNLOADING SOFTWARE:
    • This is one of the most happening and fun things to do via the Internet.
  • 12.
    • Disadvantages of the Internet:
  • 13. INTERNET
    • The internet is an interconnection of millions of computers belonging to various networks world over. However SAFETY OF DATA, INFORMATION AND PRIVACY IN SUCH AN ENVIRONMENT IS UNDER QUESTION. The most dangerous threats that web users face today are hacking and virus, which not only damage the web sites but corrupt and change the data stored even in the hard disk, thereby, causing downtime running into hours and weeks.
  • 14. FORMS OF ATTACK CYBER TERRORISM COOKIES VIRUSES HACKING
  • 15. HACKING
    • HACKING MEANS AN UNAUTHORIZED SURFER GETTING INTO A WEB SITE TO ALTER THE DATA AND INFORMATION STORED IN IT.
  • 16. VIRUSES
    • Viruses are software programs containing malicious codes, which can affect the normal working of the computer by either altering or deleting the system information on the computer.
    • FACTORS CAUSING VIRUSES:
    • Viruses were first seen in late 80's and the factor was spread of personal computers (PCs).
    • The second factor was use of bulletin board systems (BBS).
    • The third factor was creation of floppy disks.
  • 17. COOKIES
    • Cookies are software that gets stored automatically in a computer, as soon as one surfs a particular site or home page of the ISP.
    • Some dummy e-commerce sites are specially created to attract consumers to buy product, online thereby storing relevant information about them, like age, address, credit card no. and telephone number.
  • 18. CYBER-TERRORISM
    • A Cyber Terrorist will remotely access the processing control systems of a cereal manufacturer, change the levels of iron supplement, and sicken and kill the children of a nation enjoying their food.
    • A Cyber Terrorist will disrupt the banks, the international financial transactions, and the stock exchanges. The key: the people of a country will lose all confidence in the economic system.
    • A Cyber Terrorist will attack the next generation of air traffic control systems, and collide two large civilian aircraft. This is a realistic scenario, since the Cyber Terrorist will also crack the aircraft's in-cockpit sensors. Much of the same can be done to the rail lines.
    • A Cyber Terrorist will remotely alter the formulas of medication at pharmaceutical manufacturers. The potential loss of life is unfathomable.
  • 19.
    • It is clear that some form of security for private networks connected to the Internet is essential
    • Some Software tools are important and necessary as a part of that security, but cannot be expected to perform all the required security functions.
  • 20. Internet is a cooperative environment and has social as well as technical aspects. It is the responsibility of all the users to ensure trust of the community :-)
  • 21. The growth of Internet is not a fluke or a fad, but the consequence of unleashing the power of individual creativity.
  • 22. CONCLUSION
    • The Internet (and World Wide Web) was have today was created by some very bright, talented people who either had vision, or were inspired by other talented people’s visions.
    • Though their ideas were not always popular, they pressed ahead.
    • Their perseverance and hard work brought us to where we are today.
    • There is a lot to be learned by studying these people, their early work and keeping in mind what they had to work with.
    • Today, we owe a great deal for the wired world we enjoy, to the hard work of these people.