6. PAN
It is a network formed by connecting a few personal
devices like computers, laptops, mobile phones, smart
phones, printers etc.
USB
WIFI
BLUETOOTH
7. LAN
It is a network that connects computers,
mobile phones, tablet, mouse, printer, etc.,
placed at a limited distance.
The geographical area covered by a LAN can
range from a single room, a floor, an office
having one or more buildings in the same
premise, laboratory, a school, college, or
university campus.
8. MAN
Metropolitan Area Network (MAN) is
an extended form of LAN which
covers a larger geographical area like a
city or a town.
9. WAN
Wide Area Network connects computers and other
LANs and MANs, which are spread across different
geographical locations of a country or in different
countries or continents. Large business, educational and
government organisations connect their different
branches in different locations across the world
through WAN.
The Internet is the largest WAN that connects billions
of computers, smartphones and millions of LANs
from different continents.
12. ETHERNET CARD OR
NIC (NETWORK
INTERFACE CARD)
Ethernet card, also known as Network
Interface Card (NIC card in short) is a
network adapter used to set up a wired
network.
It acts as an interface between
computer and the network. It is a
circuit board mounted on the
motherboard of a computer
13. RJ 45
REGISTERED JACK
RJ 45 or Registered Jack-45 is an
eight-pin connector that is used
exclusively with Ethernet cables for
networking.
It is a standard networking
interface that can be seen at the
end of all network cables.
14. REPEATER
Data are carried in the form of signals over
the cable. These signals can travel a
specified distance (usually about 100 m).
A repeater is an analog device that works
with signals on the cables to which it is
connected. The weakened signal appearing
on the cable is regenerated and put back on
the cable by a repeater
15. HUB
A network device used to
connect different devices
through wires.
Data arriving on any of the
lines are sent out on all the
others.
17. ROUTER
A router is a network device
that can receive the data,
analyse it and transmit it to
other networks. A router
connects a local area network
to the internet.
21. “
”
The World Wide Web (WWW) or web in short, is an ocean of
information, stored in the form of trillions of interlinked web
pages and web resources. The resources on the web can be
shared or accessed through the Internet.
Sir Tim Berners-Lee — a British computer scientist invented the
revolutionary World Wide Web in 1990
WORD WIDE WEB
22. HyperText Markup Language. It is a language which is used
to design standardised Web Pages so that the Web contents
can be read and understood from any computer. Basic
structure of every webpage is designed using HTML.
HTML
23. Uniform
Resource
Locator (URL)
• It is a unique address or path for each resource located on the web.
• Every page on the web has a unique URL.
• Examples are:
https://www.mhrd.gov.in,http://www.ncert.nic.in,http://www.airindia.in, etc.
• URL is sometimes also called web address.
• It contains other information that completes a web address, as depicted below:
24. “
”
A network protocol is an established set of rules that
determine how data is transmitted between different
devices in the same network.
PROTOCOLS
25. TYPES OF PROTOCOLS
• Transmission Control Protocol (TCP): TCP is a popular communication protocol which is
used for communicating over a network.
• Internet Protocol (IP): IP is designed explicitly as addressing protocol.
• Post office Protocol (POP): POP3 is designed for receiving incoming E-mails.
• Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing
E-Mail.
• File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to
another. Types of files may include program files, multimedia files, text files, and documents,
etc.
26. TYPES OF PROTOCOLS
• Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext
among two or more systems.
• Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text
Transfer Protocol Secure is a standard protocol to secure the communication among two
computers one using the browser and other fetching data from web server.
• Telnet: Telnet is a set of rules designed for connecting one system with another.
• Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as
displaying documents from isolated sites.
41. WHAT IS CYBER SECURITY?
Cyber security is the practice of defending computers,
servers, mobile devices, electronic systems, networks, and
data from malicious attacks.
42. Integrity refers to protecting
information from being
modified by unauthorized
parties.
Availability is making sure
that authorized parties are
able to access the
information when
needed.
Confidentiality is about
preventing the disclosure of
data to unauthorized parties.
43. CYBER ATTACKS
WEB BASED ATTACKS
• Injection attacks
• DNS Spoofing
• Session Hijacking
• Phishing
• Brute force
• Denial of Service
• Dictionary attacks
• URL Interpretation
• File Inclusion attacks
• Man in the middle attacks
SYSTEM BASED ATTACKS
• Virus
• Worm
• Trojan horse
• Backdoors
• Bots
50. VIRUSES
Malware
• Malware is the
name that is
given to any
type of
software that
could harm a
computer
system,
interfere with
and gather a
user's data, or
without the
owner's
knowledge or
permission.
Trojan horse
• A type of
malware that
uses malicious
code to install
software that
seems ok, but
is hidden to
create back
doors into a
system.
Worm
• A worm is a
standalone
piece of
malicious
software that
replicates
itself in order
to spread to
other
computers.
Spyware
• Spyware can
monitor and
log the activity
that is
performed on
a target
system, like
log key
strokes, or
gather credit
card and other
information.
Adware
• Adware is
software
which can
automatically
cause pop-up
and banner
adverts to be
displayed in
order to
generate
revenue for its
author or
publisher.
51. IT ACT 2000
• The Information Technology Act, 2000 (also known as ITA-2000, or the IT
Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17
October 2000.
• It is the primary law in India dealing with cybercrime and electronic
commerce.
• The original Act contained 94 sections, divided into 13 chapters and 4
schedules.