SlideShare a Scribd company logo
Introduction to Digital Technology
GE207 DIGITAL TECHNOLOGY
BY SUKANYA BENJAVANICH
Digital Technology
Contents
◦Digital Technology
◦Digital Technology Infrastructure
◦ Internet Technology
◦ Mobile Broadband
◦ Cybersecurity
◦Digital Technology Evolution
◦Digital 4.0
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
Digital Technology: Definition
Definition of Digital Technology
◦ the branch of scientific or engineering knowledge that deals with the cr
eation and practical use of digital or computerized
devices, methods, systems, etc. (dictionary.com)
◦ An umbrella term for computer-based products and solutions.
Considering that nearly everything designed and developed these days
uses computers, it is a rather vague term. Digital technology may refer
to using new algorithms or applications to solve a problem even if
computers were used to develop solutions in the past.
(pcmag.com/encyclopedia)
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
History of
Digital
History of Early Computers
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
History of Computers
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
History of Personal Computer (PC)
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
History of Apple Computer
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
Evolution of
MAC
Timeline of
iPhone
Timeline of
iPhone
Timeline of Processors
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
Timeline of Processors
The Core 2 Series:
• Core 2 Duo
• Core 2 Quad
• Core 2 Extreme
The Core i Series:
• Core i3
• Core i5
• Core i7
• Core i7 Extreme
• Core i9
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
1725 1846 1950s 1960s 1970s
1946 1963 1969 1979 1995 2000
2000s
2000s
Punch card Punched Tape
Selectron Tubes Cassette Floppy Disk Compact Disk DVD Blue-Ray Cloud
Magnetic Tape
Magnetle Drum
Hard Disk Drive Flash Drive
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
Timeline of Data Storage Devices
Timeline of
Influential
Digital
Technology
Internet Technology
Definition of Internet
◦ The Internet (contraction of interconnected network) is the
global system of interconnected computer networks that use
the Internet protocol suite (TCP/IP) to link devices worldwide.
It is a network of networks that consists of private, public,
academic, business, and government networks of local to
global scope, linked by a broad array of electronic, wireless,
and optical networking technologies. The Internet carries a
vast range of information resources and services, such as the
inter-linked hypertext documents and applications of
the World Wide Web (WWW), electronic mail, telephony,
and file sharing. [wikipedia.org]
◦ A global computer network providing a variety of information
and communication facilities, consisting of interconnected
networks using standardized communication protocols.
[oxforddictionaries.com]
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
History of
Internet
Internet History Timeline:
ARPANET to the World Wide Web
1965
• Two computers at MIT Lincoln Lab communicate with one another using packet-switching
technology
1968
• Beranek and Newman, Inc. (BBN) unveils the final version of the Interface Message
Processor (IMP) specifications. BBN wins ARPANET contract.
1972
• BBN’s Ray Tomlinson introduces network email. The Internetworking Working Group (INWG)
forms to address need for establishing standard protocols.
1973
• Global networking becomes a reality as the University College of London (England) and
Royal Radar Establishment (Norway) connect to ARPANET. The term Internet is born.
1974
• The first Internet Service Provider (ISP) is born with the introduction of a commercial
version of ARPANET, known as Telenet.
www.livescience.comajGoong ajarnSukanya Goong Ben
Internet History Timeline:
ARPANET to the World Wide Web
1974
• Vinton Cerf and Bob Kahn (the duo said by many to be the Fathers of the Internet) publish "A Protocol for Packet Network
Interconnection," which details the design of TCP.
1979
• USENET forms to host news and discussion groups.
1981
• The National Science Foundation (NSF) provided a grant to establish the Computer Science Network (CSNET) to provide networking
services to university computer scientists.
1982
• Transmission Control Protocol (TCP) and Internet Protocol (IP), as the protocol suite, commonly known as TCP/IP, emerge as the protocol
for ARPANET. This results in the fledgling definition of the Internet as connected TCP/IP internets. TCP/IP remains the standard protocol
for the Internet.
1983
• The Domain Name System (DNS) establishes the familiar .edu, .gov, .com, .mil, .org, .net, and .int system for naming websites. This is
easier to remember than the previous designation for websites, such as 123.456.789.10.
www.livescience.comajGoong ajarnSukanya Goong Ben
Internet History Timeline:
ARPANET to the World Wide Web
1984
•William Gibson, author of "Neuromancer," is the first to use the term "cyberspace."
1985
•Symbolics.com, the website for Symbolics Computer Corp. in Massachusetts, becomes the first registered domain.
1986
•The National Science Foundation’s NSFNET goes online to connected supercomputer centers at 56,000 bits per second — the speed of a typical dial-up computer modem. Over
time the network speeds up and regional research and education networks, supported in part by NSF, are connected to the NSFNET backbone — effectively expanding the
Internet throughout the United States. The NSFNET was essentially a network of networks that connected academic users along with the ARPANET.
1987
•The number of hosts on the Internet exceeds 20,000. Cisco ships its first router.
1989
•World.std.com becomes the first commercial provider of dial-up access to the Internet
www.livescience.comajGoong ajarnSukanya Goong Ben
Internet History Timeline:
ARPANET to the World Wide Web
1990
•Tim Berners-Lee, a scientist at CERN, the European Organization for Nuclear Research, develops HyperText Markup
Language (HTML). This technology continues to have a large impact on how we navigate and view the Internet today.
1991
•CERN introduces the World Wide Web to the public.
1992
•The first audio and video are distributed over the Internet. The phrase "surfing the Internet" is popularized.
1994
•Netscape Communications is born. Microsoft creates a Web browser for Windows 95.
•Yahoo! is created by Jerry Yang and David Filo, two electrical engineering graduate students at Stanford University. The site
was originally called "Jerry and David's Guide to the World Wide Web." The company was later incorporated in March 1995.
www.livescience.comajGoong ajarnSukanya Goong Ben
Internet History Timeline:
ARPANET to the World Wide Web
1995
•Compuserve, America Online and Prodigy begin to provide Internet access. Amazon.com, Craigslist and eBay go
live. The original NSFNET backbone is decommissioned as the Internet’s transformation to a commercial
enterprise is largely completed.
•The first online dating site, Match.com, launches.
1996
•The browser war, primarily between the two major players Microsoft and Netscape, heats up.
•A 3D animation dubbed "The Dancing Baby" becomes one of the first viral videos.
1997
•Netflix is founded by Reed Hastings and Marc Randolph as a company that sends users DVDs by mail.
•PC makers can remove or hide Microsoft’s Internet software on new versions of Windows 95, thanks to a
settlement with the Justice Department. Netscape announces that its browser will be free.
www.livescience.comajGoong ajarnSukanya Goong Ben
Internet History Timeline:
ARPANET to the World Wide Web
1998
• The Google search engine is born, changing the way users engage with the Internet.
• The Internet Protocol version 6 introduced, to allow for future growth of Internet Addresses. The current most widely used protocol is version 4.
IPv4 uses 32-bit addresses allowing for 4.3 billion unique addresses; IPv6, with 128-bit addresses, will allow 3.4 x 1038 unique addresses, or 340
trillion trillion trillion.
1999
• AOL buys Netscape. Peer-to-peer file sharing becomes a reality as Napster arrives on the Internet, much to the displeasure of the music industry.
2000
• The dot-com bubble bursts. Web sites such as Yahoo! and eBay are hit by a large-scale denial of service attack, highlighting the vulnerability of
the Internet. AOL merges with Time Warner
2001
• A federal judge shuts down Napster, ruling that it must find a way to stop users from sharing copyrighted material before it can go back online.
www.livescience.comajGoong ajarnSukanya Goong Ben
Internet History Timeline:
ARPANET to the World Wide Web
2003
•The SQL Slammer worm spread worldwide in just 10 minutes. Myspace, Skype and the Safari Web browser debut.
•The blog publishing platform WordPress is launched.
2004
•Facebook goes online and the era of social networking begins.
•Mozilla unveils the Mozilla Firefox browser.
2005
•YouTube.com launches. The social news site Reddit is also founded.
2006
•AOL changes its business model, offering most services for free and relying on advertising to generate revenue. The
Internet Governance Forum meets for the first time.
•Twitter launches. The company's founder, Jack Dorsey, sends out the very first tweet: "just setting up my twttr."
www.livescience.comajGoong ajarnSukanya Goong Ben
Internet History Timeline:
ARPANET to the World Wide Web
2009
• The Internet marks its 40th anniversary.
2010
• Facebook reaches 400 million active users.
• The social media sites Pinterest and Instagram are launched.
2011
• Twitter and Facebook play a large role in the Middle East revolts.
2012
• President Barack Obama's administration announces its opposition to major parts of the Stop Online Piracy Act and the Protect Intellectual
Property Act, which would have enacted broad new rules requiring internet service providers to police copyrighted content. The successful push
to stop the bill, involving technology companies such as Google and nonprofit organizations including Wikipedia and the Electronic Frontier
Foundation, is considered a victory for sites such as YouTube that depend on user-generated content, as well as "fair use" on the Internet.
www.livescience.comajGoong ajarnSukanya Goong Ben
Internet History Timeline:
ARPANET to the World Wide Web
2013
•Edward Snowden, a former CIA employee and National Security Agency (NSA) contractor, reveals that the NSA had in
place a monitoring program capable of tapping the communications of thousands of people, including U.S. citizens.
•Fifty-one percent of U.S. adults report that they bank online, according to a survey conducted by the Pew Research
Center.
2015
•Instagram, the photo-sharing site, reaches 400 million users, outpacing Twitter, which would go on to reach 316 million
users by the middle of the same year.
2016
•Google unveils Google Assistant, a voice-activated personal assistant program, marking the entry of the Internet giant
into the "smart" computerized assistant marketplace. Google joins Amazon's Alexa, Siri from Apple, and Cortana from
Microsoft.
www.livescience.comajGoong ajarnSukanya Goong Ben
History of
Internet
Internet
Technology
Timeline
Internet
Technology
Timeline
The Evolution of Internet
ajGoong ajarnSukanya Goong Ben
Mobile Phone
Evolution
Mobile
Broadband
Mobile
Broadband
Cybersecurity
Cybersecurity is the practice of
protecting systems, networks,
and programs from digital
attacks. These cyberattacks are
usually aimed at accessing,
changing, or destroying sensitive
information; extorting money
from users; or interrupting
normal business processes
www.cisco.com
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
Cybersecurity
A successful cybersecurity
approach has multiple layers of
protection spread across the
computers, networks, programs,
or data that one intends to keep
safe. In an organization, the
people, processes, and
technology must all complement
one another to create an
effective defense from cyber
attacks.
www.cisco.com
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
Cybersecurity: Cyberattack
A cyberattack is a malicious and
deliberate attempt by an
individual or organization to
breach the information system of
another individual or
organization. Usually, the
attacker seeks some type of
benefit from disrupting the
victim’s network.
www.cisco.com
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
Cybersecurity: Cyberattack
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
Cybersecurity
Common types
of cyberattacks
Cybersecurity: Botnet
A botnet is a network of devices
that has been infected with
malicious software, such as
a virus. Attackers can control a
botnet as a group without the
owner’s knowledge with the goal
of increasing the magnitude of
their attacks. Often, a botnet is
used to overwhelm systems in
a distributed-denial-of-service
attack (DDoS) attack.
www.cisco.com
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
Cybersecurity: Why is cybersecurity important?
In today’s connected world, everyone benefits from
advanced cyberdefense programs.
• At an individual level, a cybersecurity attack can result in
everything from identity theft, to extortion attempts, to
the loss of important data like family photos.
• Everyone relies on critical infrastructure like power
plants, hospitals, and financial service companies.
• Securing these and other organizations is essential to
keeping our society functioning.
www.cisco.com
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
Cybersecurity: Firewall
www.cisco.com
A firewall is a network security device that
monitors incoming and outgoing network
traffic and decides whether to allow or block
specific traffic based on a defined set of
security rules.
Firewalls have been a first line of defense in
network security for over 25 years. They
establish a barrier between secured and
controlled internal networks that can be
trusted and untrusted outside networks, such
as the Internet.
A firewall can be hardware, software, or both.
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
Cybersecurity: VPN
www.cisco.com
A virtual private network, or VPN, is an
encrypted connection over the Internet
from a device to a network. The encrypted
connection helps ensure that sensitive
data is safely transmitted. It prevents
unauthorized people from eavesdropping
on the traffic and allows the user to
conduct work remotely. VPN technology
is widely used in corporate environments.
Types of VPNs
(1) Remote access
(2) Site-to-Site
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
Cybersecurity
Elements
of cyber
security
Application
security
Information
security
Network
Security
Business
continuity
planning
(BCP)
Operations
security
(OPSEC)
End-user
education
Leadership
commitment
Elements of
cyber security
Cybersecurity: The Most Important Cyber Security Tips
1. Realize that you are an attractive target to hackers. Don’t ever say “It won’t happen to me.”
2. Practice good password management.
3. Never leave your devices unattended.
4. Always be careful when clicking on attachments or links in email. If it’s unexpected or suspicious for any reason, don’t click on it.
5. Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether
it’s a friend’s phone, a public computer, or a cafe’s free WiFi—your data could be copied or stolen.
6. Back up your data regularly, and make sure your anti-virus software is always up to date.
7. Be conscientious of what you plug in to your computer. Malware can be spread through infected flash drives, external hard drives, and even
smartphones.
8. Watch what you’re sharing on social networks.
9. Offline, be wary of social engineering, where someone attempts to gain information from you through manipulation.
10. Be sure to monitor your accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been
compromised.
www.cisco.com
ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
Digital
Evolution
Digital 4.0
อะไรจะเกิดขึ้นในยุค 5G
Hacking2019
5G มีประโยชนอยางไร
Thailand 4.0ไทยแลนด 4.0 รูจักกับ Thailand 4.0
Q & A
Digital Technology

More Related Content

PPTX
The Internet and World Wide Web
PDF
Internet
PPTX
Internet
PPTX
Information Technology
PPTX
The internet
PPT
Internet
PPTX
The Internet and World Wide Web
PPT
3.2.1 computer security risks
The Internet and World Wide Web
Internet
Internet
Information Technology
The internet
Internet
The Internet and World Wide Web
3.2.1 computer security risks

What's hot (20)

PDF
Ethical and Social Issues in ICT
PPT
Introduction to Multimedia Technologies
PPTX
Multimedia
PDF
Introduction to information technology lecture 1
PPTX
Multimedia presentation
PPT
Introduction To Multimedia
PPTX
Chapter 1 powerpoint
PDF
Chapter 1 - Multimedia Fundamentals
PPTX
Digital Technology
PPTX
Social and professional issuesin it
PPTX
COMPUTER ETHICS
PPTX
computer fundamental
PPT
Peter Norton’s Introduction to Computers
PPT
Computer Fundamental
PPTX
computer ethics slides
PPT
Chapter 1 Introduction To Computers
PPSX
Information Technology
PPTX
Cyber crime and cyber ethics ppt
PPTX
Information and communication technology
PPTX
multimedia
Ethical and Social Issues in ICT
Introduction to Multimedia Technologies
Multimedia
Introduction to information technology lecture 1
Multimedia presentation
Introduction To Multimedia
Chapter 1 powerpoint
Chapter 1 - Multimedia Fundamentals
Digital Technology
Social and professional issuesin it
COMPUTER ETHICS
computer fundamental
Peter Norton’s Introduction to Computers
Computer Fundamental
computer ethics slides
Chapter 1 Introduction To Computers
Information Technology
Cyber crime and cyber ethics ppt
Information and communication technology
multimedia
Ad

Similar to [GE207] Session01: Introduction to Digital Technology (20)

DOCX
Timeline History of Internet
DOCX
Timeline History of Internet
DOCX
Timeline History of Internet
PPTX
Activity 12 Timeline History of internet
PDF
Introduce to internet1
PPTX
What is the internet
DOCX
Timeline of the Internet
DOCX
Timeline History of Internet
PPT
Bart
PDF
History of the_internet
DOCX
Activity 14 timeline history of internet
DOCX
history of internet timeline
PDF
CHAPTER3-TheWeb for engineering notes h
DOCX
Activity 14 Timeline History of Internet
DOCX
Hostoria del internet
DOCX
History of the Internet
DOCX
Timeline History of the Internet
PPT
History of internet
DOCX
Lecture on internet (1)
PPTX
The Internet and the World Wide Web [Fall 2012 RTF 319 Session 04]
Timeline History of Internet
Timeline History of Internet
Timeline History of Internet
Activity 12 Timeline History of internet
Introduce to internet1
What is the internet
Timeline of the Internet
Timeline History of Internet
Bart
History of the_internet
Activity 14 timeline history of internet
history of internet timeline
CHAPTER3-TheWeb for engineering notes h
Activity 14 Timeline History of Internet
Hostoria del internet
History of the Internet
Timeline History of the Internet
History of internet
Lecture on internet (1)
The Internet and the World Wide Web [Fall 2012 RTF 319 Session 04]
Ad

More from Sukanya Ben (20)

PDF
[GE207] Session03: Digital Technology Trends
PDF
[GE207] Session02: Digital Transformation
PDF
[Ge207] Digital Technology Outline
PDF
TQF03_DigitalTechnology
PDF
[GE207] Prototyping
PPT
MIS-CH15: Managing Global Systems
PPT
MIS-CH14: Managing Projects
PPT
MIS-CH13: Building Information Systems
PPT
MIS-CH12: Enhancing Decision Making
PPT
MIS-CH11: Managing Knowledge
PPT
MIS-CH10: e-Commerce: Digital Markets, Digital Goods
PPT
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
PPT
MIS-CH08: Securing Information Systems
PPT
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
PPT
MIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
PPT
MIS-CH05: IT Infrastructure and Emerging Technologies
PPT
MIS-CH04: Ethical and Social Issues in INformation Systems
PPT
MIS-CH01: Information Systems, Organization, and Strategy
PPT
MIS-CH02: Global e-Business and Collaboration
PPT
MIS-CH01: IS in Business Today
[GE207] Session03: Digital Technology Trends
[GE207] Session02: Digital Transformation
[Ge207] Digital Technology Outline
TQF03_DigitalTechnology
[GE207] Prototyping
MIS-CH15: Managing Global Systems
MIS-CH14: Managing Projects
MIS-CH13: Building Information Systems
MIS-CH12: Enhancing Decision Making
MIS-CH11: Managing Knowledge
MIS-CH10: e-Commerce: Digital Markets, Digital Goods
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH08: Securing Information Systems
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH01: Information Systems, Organization, and Strategy
MIS-CH02: Global e-Business and Collaboration
MIS-CH01: IS in Business Today

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Approach and Philosophy of On baking technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
NewMind AI Monthly Chronicles - July 2025
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
Understanding_Digital_Forensics_Presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
20250228 LYD VKU AI Blended-Learning.pptx
Approach and Philosophy of On baking technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Diabetes mellitus diagnosis method based random forest with bat algorithm
CIFDAQ's Market Insight: SEC Turns Pro Crypto
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A Presentation on Artificial Intelligence
NewMind AI Monthly Chronicles - July 2025
The AUB Centre for AI in Media Proposal.docx
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx

[GE207] Session01: Introduction to Digital Technology

  • 1. Introduction to Digital Technology GE207 DIGITAL TECHNOLOGY BY SUKANYA BENJAVANICH
  • 2. Digital Technology Contents ◦Digital Technology ◦Digital Technology Infrastructure ◦ Internet Technology ◦ Mobile Broadband ◦ Cybersecurity ◦Digital Technology Evolution ◦Digital 4.0 ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 3. Digital Technology: Definition Definition of Digital Technology ◦ the branch of scientific or engineering knowledge that deals with the cr eation and practical use of digital or computerized devices, methods, systems, etc. (dictionary.com) ◦ An umbrella term for computer-based products and solutions. Considering that nearly everything designed and developed these days uses computers, it is a rather vague term. Digital technology may refer to using new algorithms or applications to solve a problem even if computers were used to develop solutions in the past. (pcmag.com/encyclopedia) ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 5. History of Early Computers ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 6. History of Computers ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 7. History of Personal Computer (PC) ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 8. History of Apple Computer ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 12. Timeline of Processors ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 13. Timeline of Processors The Core 2 Series: • Core 2 Duo • Core 2 Quad • Core 2 Extreme The Core i Series: • Core i3 • Core i5 • Core i7 • Core i7 Extreme • Core i9 ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 14. 1725 1846 1950s 1960s 1970s 1946 1963 1969 1979 1995 2000 2000s 2000s Punch card Punched Tape Selectron Tubes Cassette Floppy Disk Compact Disk DVD Blue-Ray Cloud Magnetic Tape Magnetle Drum Hard Disk Drive Flash Drive ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology Timeline of Data Storage Devices
  • 16. Internet Technology Definition of Internet ◦ The Internet (contraction of interconnected network) is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing. [wikipedia.org] ◦ A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols. [oxforddictionaries.com] ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 18. Internet History Timeline: ARPANET to the World Wide Web 1965 • Two computers at MIT Lincoln Lab communicate with one another using packet-switching technology 1968 • Beranek and Newman, Inc. (BBN) unveils the final version of the Interface Message Processor (IMP) specifications. BBN wins ARPANET contract. 1972 • BBN’s Ray Tomlinson introduces network email. The Internetworking Working Group (INWG) forms to address need for establishing standard protocols. 1973 • Global networking becomes a reality as the University College of London (England) and Royal Radar Establishment (Norway) connect to ARPANET. The term Internet is born. 1974 • The first Internet Service Provider (ISP) is born with the introduction of a commercial version of ARPANET, known as Telenet. www.livescience.comajGoong ajarnSukanya Goong Ben
  • 19. Internet History Timeline: ARPANET to the World Wide Web 1974 • Vinton Cerf and Bob Kahn (the duo said by many to be the Fathers of the Internet) publish "A Protocol for Packet Network Interconnection," which details the design of TCP. 1979 • USENET forms to host news and discussion groups. 1981 • The National Science Foundation (NSF) provided a grant to establish the Computer Science Network (CSNET) to provide networking services to university computer scientists. 1982 • Transmission Control Protocol (TCP) and Internet Protocol (IP), as the protocol suite, commonly known as TCP/IP, emerge as the protocol for ARPANET. This results in the fledgling definition of the Internet as connected TCP/IP internets. TCP/IP remains the standard protocol for the Internet. 1983 • The Domain Name System (DNS) establishes the familiar .edu, .gov, .com, .mil, .org, .net, and .int system for naming websites. This is easier to remember than the previous designation for websites, such as 123.456.789.10. www.livescience.comajGoong ajarnSukanya Goong Ben
  • 20. Internet History Timeline: ARPANET to the World Wide Web 1984 •William Gibson, author of "Neuromancer," is the first to use the term "cyberspace." 1985 •Symbolics.com, the website for Symbolics Computer Corp. in Massachusetts, becomes the first registered domain. 1986 •The National Science Foundation’s NSFNET goes online to connected supercomputer centers at 56,000 bits per second — the speed of a typical dial-up computer modem. Over time the network speeds up and regional research and education networks, supported in part by NSF, are connected to the NSFNET backbone — effectively expanding the Internet throughout the United States. The NSFNET was essentially a network of networks that connected academic users along with the ARPANET. 1987 •The number of hosts on the Internet exceeds 20,000. Cisco ships its first router. 1989 •World.std.com becomes the first commercial provider of dial-up access to the Internet www.livescience.comajGoong ajarnSukanya Goong Ben
  • 21. Internet History Timeline: ARPANET to the World Wide Web 1990 •Tim Berners-Lee, a scientist at CERN, the European Organization for Nuclear Research, develops HyperText Markup Language (HTML). This technology continues to have a large impact on how we navigate and view the Internet today. 1991 •CERN introduces the World Wide Web to the public. 1992 •The first audio and video are distributed over the Internet. The phrase "surfing the Internet" is popularized. 1994 •Netscape Communications is born. Microsoft creates a Web browser for Windows 95. •Yahoo! is created by Jerry Yang and David Filo, two electrical engineering graduate students at Stanford University. The site was originally called "Jerry and David's Guide to the World Wide Web." The company was later incorporated in March 1995. www.livescience.comajGoong ajarnSukanya Goong Ben
  • 22. Internet History Timeline: ARPANET to the World Wide Web 1995 •Compuserve, America Online and Prodigy begin to provide Internet access. Amazon.com, Craigslist and eBay go live. The original NSFNET backbone is decommissioned as the Internet’s transformation to a commercial enterprise is largely completed. •The first online dating site, Match.com, launches. 1996 •The browser war, primarily between the two major players Microsoft and Netscape, heats up. •A 3D animation dubbed "The Dancing Baby" becomes one of the first viral videos. 1997 •Netflix is founded by Reed Hastings and Marc Randolph as a company that sends users DVDs by mail. •PC makers can remove or hide Microsoft’s Internet software on new versions of Windows 95, thanks to a settlement with the Justice Department. Netscape announces that its browser will be free. www.livescience.comajGoong ajarnSukanya Goong Ben
  • 23. Internet History Timeline: ARPANET to the World Wide Web 1998 • The Google search engine is born, changing the way users engage with the Internet. • The Internet Protocol version 6 introduced, to allow for future growth of Internet Addresses. The current most widely used protocol is version 4. IPv4 uses 32-bit addresses allowing for 4.3 billion unique addresses; IPv6, with 128-bit addresses, will allow 3.4 x 1038 unique addresses, or 340 trillion trillion trillion. 1999 • AOL buys Netscape. Peer-to-peer file sharing becomes a reality as Napster arrives on the Internet, much to the displeasure of the music industry. 2000 • The dot-com bubble bursts. Web sites such as Yahoo! and eBay are hit by a large-scale denial of service attack, highlighting the vulnerability of the Internet. AOL merges with Time Warner 2001 • A federal judge shuts down Napster, ruling that it must find a way to stop users from sharing copyrighted material before it can go back online. www.livescience.comajGoong ajarnSukanya Goong Ben
  • 24. Internet History Timeline: ARPANET to the World Wide Web 2003 •The SQL Slammer worm spread worldwide in just 10 minutes. Myspace, Skype and the Safari Web browser debut. •The blog publishing platform WordPress is launched. 2004 •Facebook goes online and the era of social networking begins. •Mozilla unveils the Mozilla Firefox browser. 2005 •YouTube.com launches. The social news site Reddit is also founded. 2006 •AOL changes its business model, offering most services for free and relying on advertising to generate revenue. The Internet Governance Forum meets for the first time. •Twitter launches. The company's founder, Jack Dorsey, sends out the very first tweet: "just setting up my twttr." www.livescience.comajGoong ajarnSukanya Goong Ben
  • 25. Internet History Timeline: ARPANET to the World Wide Web 2009 • The Internet marks its 40th anniversary. 2010 • Facebook reaches 400 million active users. • The social media sites Pinterest and Instagram are launched. 2011 • Twitter and Facebook play a large role in the Middle East revolts. 2012 • President Barack Obama's administration announces its opposition to major parts of the Stop Online Piracy Act and the Protect Intellectual Property Act, which would have enacted broad new rules requiring internet service providers to police copyrighted content. The successful push to stop the bill, involving technology companies such as Google and nonprofit organizations including Wikipedia and the Electronic Frontier Foundation, is considered a victory for sites such as YouTube that depend on user-generated content, as well as "fair use" on the Internet. www.livescience.comajGoong ajarnSukanya Goong Ben
  • 26. Internet History Timeline: ARPANET to the World Wide Web 2013 •Edward Snowden, a former CIA employee and National Security Agency (NSA) contractor, reveals that the NSA had in place a monitoring program capable of tapping the communications of thousands of people, including U.S. citizens. •Fifty-one percent of U.S. adults report that they bank online, according to a survey conducted by the Pew Research Center. 2015 •Instagram, the photo-sharing site, reaches 400 million users, outpacing Twitter, which would go on to reach 316 million users by the middle of the same year. 2016 •Google unveils Google Assistant, a voice-activated personal assistant program, marking the entry of the Internet giant into the "smart" computerized assistant marketplace. Google joins Amazon's Alexa, Siri from Apple, and Cortana from Microsoft. www.livescience.comajGoong ajarnSukanya Goong Ben
  • 30. The Evolution of Internet ajGoong ajarnSukanya Goong Ben
  • 34. Cybersecurity Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes www.cisco.com ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 35. Cybersecurity A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks. www.cisco.com ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 36. Cybersecurity: Cyberattack A cyberattack is a malicious and deliberate attempt by an individual or organization to breach the information system of another individual or organization. Usually, the attacker seeks some type of benefit from disrupting the victim’s network. www.cisco.com ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 37. Cybersecurity: Cyberattack ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 39. Cybersecurity: Botnet A botnet is a network of devices that has been infected with malicious software, such as a virus. Attackers can control a botnet as a group without the owner’s knowledge with the goal of increasing the magnitude of their attacks. Often, a botnet is used to overwhelm systems in a distributed-denial-of-service attack (DDoS) attack. www.cisco.com ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 40. Cybersecurity: Why is cybersecurity important? In today’s connected world, everyone benefits from advanced cyberdefense programs. • At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. • Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. • Securing these and other organizations is essential to keeping our society functioning. www.cisco.com ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 41. Cybersecurity: Firewall www.cisco.com A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet. A firewall can be hardware, software, or both. ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 42. Cybersecurity: VPN www.cisco.com A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely. VPN technology is widely used in corporate environments. Types of VPNs (1) Remote access (2) Site-to-Site ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 44. Cybersecurity: The Most Important Cyber Security Tips 1. Realize that you are an attractive target to hackers. Don’t ever say “It won’t happen to me.” 2. Practice good password management. 3. Never leave your devices unattended. 4. Always be careful when clicking on attachments or links in email. If it’s unexpected or suspicious for any reason, don’t click on it. 5. Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether it’s a friend’s phone, a public computer, or a cafe’s free WiFi—your data could be copied or stolen. 6. Back up your data regularly, and make sure your anti-virus software is always up to date. 7. Be conscientious of what you plug in to your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones. 8. Watch what you’re sharing on social networks. 9. Offline, be wary of social engineering, where someone attempts to gain information from you through manipulation. 10. Be sure to monitor your accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised. www.cisco.com ajGoong ajarnSukanya Goong Ben © 2019 Digital Technology
  • 48. Q & A Digital Technology