The document discusses the history and development of the internet from its origins as ARPANET in 1969 to the modern World Wide Web. It describes various types of internet connections including wired methods like telephone lines, coaxial cable, and fiber optic cable as well as wireless methods like Wi-Fi and satellite. The document also outlines common internet applications and security issues like viruses, hacking, and privacy breaches. Additionally, it discusses best practices for internet security and the importance of ergonomics when using computers.
3. Dr. CK Tan, UMS 3
Internet
It is used for global communication,
moving ideas and information.
Cyberspace concepts (virtual environment)
Started with ARPANET (Advanced
Research Project Network) by USA in
1969
Known as WWW, World Wide Web in 1992
at CERN (Center for European Nuclear
Research) in Switzerland
4. Dr. CK Tan, UMS 4
Wired Connections
Telephone lines
Coaxial cable
Fiber-optic cable
5. Dr. CK Tan, UMS 5
fiber-optic - 26,000
coaxial - 80
twisted-pair - 1
Number of Connections
6. Dr. CK Tan, UMS 6
Wireless Connections
Microwave
Satellite
Wi-Fi
7. Dr. CK Tan, UMS 7
Internet service providers (ISP)
– National (Streamyx, TM Unifi,
Jaring, YES)
Wireless service providers –
DIGI, Celcom, Maxis
How to be connected to internet ?
8. Dr. CK Tan, UMS 8
How does a modem work?
When a computer sends a message (etc. email), the digital
signal will be converted by the modem into analog signal
(modulation). Then the signal travels via the public
telephone networks (etc. streamyx) to the recipient's
location (etc. USA). When it reaches the destination modem,
it is converted back to digital signal (demodulation) and
then the user is able to reach the message.
PUBLIC TELEPHONE NETWORK
SATELIT (WIRELESS)
MODULATION
DEMODULATION
9. Dr. CK Tan, UMS 9
Network Types
Local Area Network (LAN)
- networks with computers and peripheral devices
within the same building
Metropolitan Area Network (MAN)
- a networks of LANs
Wide Area Network (WAN)
- integration of LANs and WANs
- countrywide/worldwide networks
10. Dr. CK Tan, UMS 10
Internet Applications
Communicating
Shopping
Researching
Entertainment
Education
11. Dr. CK Tan, UMS 11
Uses of internet for education
E-learning
– Lecture notes, discussion board, online exam
Education portal
– LMS, free MOOC courses –
Openlearning.com (chats, discussion, online
tuitions)
Information showcase
– Personal websites/homepage
– Educational shareware
– Ex: hot-potatoes/surveymonkey.com (for
building online quiz)
13. Dr. CK Tan, UMS 13
Is email secure?
snoopware, spyware, phishing
Stealing confidential info (HP numbers, etc)
Browser records pages that are visited
Cookies record
– Times and pages visited
– Other private information
Breach of privacy and
security: Examples
14. Dr. CK Tan, UMS 14
Computer Threats and Crimes
Thefts (organised crime)
– Hardware theft, stealing data – online
and offline (lost password)
– Software piracy
“Hackers” (for fun and challenge) and
“crackers” (for malicious purposes)
Natural disasters (flood, fire)
15. Dr. CK Tan, UMS 15
Viruses
– Damage to computers, programs or files
3 types:
– Virus (damage/delete system files)
– Worm (self-multiplying and spreads)
– Trojan (can be virus or worm)
Computer Threats and Crimes
16. Dr. CK Tan, UMS 16
ICT Laws in Malaysia – From MyMIS 2002 (MCMC)
17. Dr. CK Tan, UMS 17
Other Privacy Laws
Freedom of Information Act
(1970)
Privacy Act (1974)
18. Dr. CK Tan, UMS 18
ICT Security Measures
Protecting Information (antivirus, backing
up data)
Encrypting messages (make password
more complex)
Restricting access (password and firewall)
Anticipating disasters (disaster recovery
plan)
Secured the computer labs (door grill,
smart card access, CCTV, security guard)
Enhanced online system (anti-hacking)
19. Dr. CK Tan, UMS 19
Ergonomics
Ergonomics study of human
factors related to things people
use
Physical Health
– Avoiding eyestrain and headache
– Avoiding back and neck pain
– Avoiding effects of
electromagnetic fields