SlideShare a Scribd company logo
THE INTERNET Every machine transparently connected to every other
WHAT IS THE INTERNET? The Internet is a global network of computer networks. Each of these networks contains anywhere from two to thousands of computers that are linked together using special rules called protocols. When computers are connected to the Internet they are able to communicate and share information
HOW DID THE INTERNET START? The Internet began in the late 1960s as a network of computers that the United States Department of Defense developed using communication technology that could continue to function even when it was partially damaged. In the 1980s the National Science Foundation (NSF) used this same technology to create its own network (NSFNET), which allowed researchers to share data and access resources located on remote computers.  Eventually many educational, governmental, commercial, and other organizations connected their own local computer networks to the NSFNET to form what is now known as the Internet.
HOW DOES THE INTERNET WORK? Computers that are connected to the Internet communicate with each other using a protocol or special language called TCP/IP (Transmission Control Protocol/Internet Protocol). TCP/IP defines how information moves among computers on the Internet.
WHO IS WHO ON THE INTERNET ? Internet Society (ISOC):   Founded in 1992, an international nonprofit professional organization that provides administrative support for the Internet. Founded in 1992, ISOC is the organizational home for the standardization bodies of the Internet.  Internet Engineering Task Force (IETF):  Forum that  coordinates the development of new protocols and standards. Organized into working groups that are each devoted to a specific topic or protocol. Working groups document their work in reports, called Request For Comments (RFCs). IRTF (Internet Research Task Force):   The Internet Research Task Force is a composed of a number of focused, long-term and small Research Groups. Internet Architecture Board (IAB) : a technical advisory group of the Internet Society, provides oversight of the architecture for the protocols and  the standardization process  The Internet Engineering Steering Group (IESG) : The IESG is responsible for technical management of IETF activities and the Internet standards process. Standards. Composed of the Area Directors of the IETF working groups.
Advantages of the Internet:
E-MAIL:   Send and receive instant electronic messages
ACCESS INFORMATION:   The Internet is a virtual treasure of information.
SHOPPING: You do not need to leave your house
ONLINE CHAT: There are many ‘chat rooms’ on the web.
DOWNLOADING SOFTWARE:   This is one of the most happening and fun things to do via the Internet.
Disadvantages of the Internet:
INTERNET The internet is an interconnection of millions of computers belonging to various networks world over. However SAFETY OF DATA, INFORMATION AND PRIVACY IN SUCH AN ENVIRONMENT IS UNDER QUESTION. The most dangerous threats that web users face today are hacking and virus, which not only damage the web sites but corrupt and change the data stored even in the hard disk, thereby, causing downtime running into hours and weeks.
FORMS OF ATTACK CYBER TERRORISM COOKIES VIRUSES HACKING
HACKING HACKING MEANS AN UNAUTHORIZED SURFER GETTING INTO A WEB SITE TO ALTER THE DATA AND INFORMATION STORED IN IT.
VIRUSES Viruses are software programs containing malicious codes, which can affect the normal working of the computer by either altering or deleting the system information on the computer. FACTORS CAUSING VIRUSES: Viruses were first seen in late 80's and the factor was spread of personal computers (PCs).  The second factor was use of bulletin board systems (BBS). The third factor was creation of floppy disks.
COOKIES Cookies are software that gets stored automatically in a computer, as soon as one surfs a particular site or home page of the ISP.  Some dummy e-commerce sites are specially created to attract consumers to buy product, online thereby storing relevant information about them, like age, address, credit card no. and telephone number.
CYBER-TERRORISM A Cyber Terrorist will remotely access the processing control systems of a cereal manufacturer, change the levels of iron supplement, and sicken and kill the children of a nation enjoying their food.  A Cyber Terrorist will disrupt the banks, the international financial transactions, and the stock exchanges. The key: the people of a country will lose all confidence in the economic system.  A Cyber Terrorist will attack the next generation of air traffic control systems, and collide two large civilian aircraft. This is a realistic scenario, since the Cyber Terrorist will also crack the aircraft's in-cockpit sensors. Much of the same can be done to the rail lines.  A Cyber Terrorist will remotely alter the formulas of medication at pharmaceutical manufacturers. The potential loss of life is unfathomable.
It is clear that some form of security for private networks connected to the Internet is essential  Some Software tools are important and necessary as a part of that security, but cannot be expected to perform all the required security functions.
Internet is a cooperative environment and has social as well as technical aspects. It is the responsibility of all the users to ensure trust of the community  :-)
The growth of Internet is not a fluke or a fad, but the consequence of unleashing the power of individual creativity.
CONCLUSION The Internet (and World Wide Web) was have today was created by some very bright, talented people who either had vision, or were inspired by other talented people’s visions. Though their ideas were not always popular, they pressed ahead. Their perseverance and hard work brought us to where we are today. There is a lot to be learned by studying these people, their early work and keeping in mind what they had to work with. Today, we owe a great deal for the wired world we enjoy, to the hard work of these people.

More Related Content

PPTX
The Internet
PPTX
Software. intranet. e crime
PDF
Internet surfing and security
PDF
E commerce
DOCX
Discuss various ethical issue which may faced by utilizing information techno...
PPT
Chapter 3 Computer Crimes
PPTX
Computer Crimes
DOCX
Cyber ethics
The Internet
Software. intranet. e crime
Internet surfing and security
E commerce
Discuss various ethical issue which may faced by utilizing information techno...
Chapter 3 Computer Crimes
Computer Crimes
Cyber ethics

What's hot (20)

PPTX
Deepak malviya mp 03 subject 703
PPTX
PPTX
Computer ethics
PPT
Computer
PPT
Etical and professional issues of computer
PDF
Chapter 4 Computer Science :: Computer Ethics and Security
PPTX
Introduction to computer
PPTX
Mikial Singh Nijjar | Where Is Information Technology Headed?
PDF
Computer Security and Safety, Ethics & Privacy
PPTX
Introduction to cybercrime
PPTX
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
PPTX
Ahmed computer
PPTX
C3 and digital citizenship
PPTX
Computer ethics and crime
PPTX
Chapter 4 2016
PPT
Computer ethics
PPT
Computer Ethics
PPT
Chap 1
PPTX
Empowerment Technologies Lecture 3 (Philippines SHS)
PPTX
cyber crime
Deepak malviya mp 03 subject 703
Computer ethics
Computer
Etical and professional issues of computer
Chapter 4 Computer Science :: Computer Ethics and Security
Introduction to computer
Mikial Singh Nijjar | Where Is Information Technology Headed?
Computer Security and Safety, Ethics & Privacy
Introduction to cybercrime
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Ahmed computer
C3 and digital citizenship
Computer ethics and crime
Chapter 4 2016
Computer ethics
Computer Ethics
Chap 1
Empowerment Technologies Lecture 3 (Philippines SHS)
cyber crime
Ad

Similar to Internet(2) (20)

PPT
Internet
PPT
Introduction to the social implications of Computing
PPTX
Internet tech lessons
PPTX
Internet and Securities
PDF
Misinformation on Computer
PPT
NewIinternet security
PPT
New internet security
PPTX
Internet presentation
DOCX
Bjmc i, dcm,unit-ii, internet as a mass medium
PPTX
Internet .....History to till now
PPTX
Basics about Internet ...
PPT
The Internet and the World Wide Web
 
PPTX
E content internet
PPTX
computer
PPTX
Internet and its working (manu)
DOCX
Internet working
PPTX
Cyber crime &_info_security
PPTX
Internet ppt
PPT
chapter 4Connectivity and the Internet.ppt
Internet
Introduction to the social implications of Computing
Internet tech lessons
Internet and Securities
Misinformation on Computer
NewIinternet security
New internet security
Internet presentation
Bjmc i, dcm,unit-ii, internet as a mass medium
Internet .....History to till now
Basics about Internet ...
The Internet and the World Wide Web
 
E content internet
computer
Internet and its working (manu)
Internet working
Cyber crime &_info_security
Internet ppt
chapter 4Connectivity and the Internet.ppt
Ad

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
KodekX | Application Modernization Development
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Cloud computing and distributed systems.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Approach and Philosophy of On baking technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Spectral efficient network and resource selection model in 5G networks
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Dropbox Q2 2025 Financial Results & Investor Presentation
Diabetes mellitus diagnosis method based random forest with bat algorithm
KodekX | Application Modernization Development
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation_ Review paper, used for researhc scholars
The AUB Centre for AI in Media Proposal.docx
Building Integrated photovoltaic BIPV_UPV.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Understanding_Digital_Forensics_Presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
Cloud computing and distributed systems.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Internet(2)

  • 1. THE INTERNET Every machine transparently connected to every other
  • 2. WHAT IS THE INTERNET? The Internet is a global network of computer networks. Each of these networks contains anywhere from two to thousands of computers that are linked together using special rules called protocols. When computers are connected to the Internet they are able to communicate and share information
  • 3. HOW DID THE INTERNET START? The Internet began in the late 1960s as a network of computers that the United States Department of Defense developed using communication technology that could continue to function even when it was partially damaged. In the 1980s the National Science Foundation (NSF) used this same technology to create its own network (NSFNET), which allowed researchers to share data and access resources located on remote computers. Eventually many educational, governmental, commercial, and other organizations connected their own local computer networks to the NSFNET to form what is now known as the Internet.
  • 4. HOW DOES THE INTERNET WORK? Computers that are connected to the Internet communicate with each other using a protocol or special language called TCP/IP (Transmission Control Protocol/Internet Protocol). TCP/IP defines how information moves among computers on the Internet.
  • 5. WHO IS WHO ON THE INTERNET ? Internet Society (ISOC): Founded in 1992, an international nonprofit professional organization that provides administrative support for the Internet. Founded in 1992, ISOC is the organizational home for the standardization bodies of the Internet. Internet Engineering Task Force (IETF): Forum that coordinates the development of new protocols and standards. Organized into working groups that are each devoted to a specific topic or protocol. Working groups document their work in reports, called Request For Comments (RFCs). IRTF (Internet Research Task Force): The Internet Research Task Force is a composed of a number of focused, long-term and small Research Groups. Internet Architecture Board (IAB) : a technical advisory group of the Internet Society, provides oversight of the architecture for the protocols and the standardization process The Internet Engineering Steering Group (IESG) : The IESG is responsible for technical management of IETF activities and the Internet standards process. Standards. Composed of the Area Directors of the IETF working groups.
  • 6. Advantages of the Internet:
  • 7. E-MAIL: Send and receive instant electronic messages
  • 8. ACCESS INFORMATION: The Internet is a virtual treasure of information.
  • 9. SHOPPING: You do not need to leave your house
  • 10. ONLINE CHAT: There are many ‘chat rooms’ on the web.
  • 11. DOWNLOADING SOFTWARE: This is one of the most happening and fun things to do via the Internet.
  • 12. Disadvantages of the Internet:
  • 13. INTERNET The internet is an interconnection of millions of computers belonging to various networks world over. However SAFETY OF DATA, INFORMATION AND PRIVACY IN SUCH AN ENVIRONMENT IS UNDER QUESTION. The most dangerous threats that web users face today are hacking and virus, which not only damage the web sites but corrupt and change the data stored even in the hard disk, thereby, causing downtime running into hours and weeks.
  • 14. FORMS OF ATTACK CYBER TERRORISM COOKIES VIRUSES HACKING
  • 15. HACKING HACKING MEANS AN UNAUTHORIZED SURFER GETTING INTO A WEB SITE TO ALTER THE DATA AND INFORMATION STORED IN IT.
  • 16. VIRUSES Viruses are software programs containing malicious codes, which can affect the normal working of the computer by either altering or deleting the system information on the computer. FACTORS CAUSING VIRUSES: Viruses were first seen in late 80's and the factor was spread of personal computers (PCs). The second factor was use of bulletin board systems (BBS). The third factor was creation of floppy disks.
  • 17. COOKIES Cookies are software that gets stored automatically in a computer, as soon as one surfs a particular site or home page of the ISP. Some dummy e-commerce sites are specially created to attract consumers to buy product, online thereby storing relevant information about them, like age, address, credit card no. and telephone number.
  • 18. CYBER-TERRORISM A Cyber Terrorist will remotely access the processing control systems of a cereal manufacturer, change the levels of iron supplement, and sicken and kill the children of a nation enjoying their food. A Cyber Terrorist will disrupt the banks, the international financial transactions, and the stock exchanges. The key: the people of a country will lose all confidence in the economic system. A Cyber Terrorist will attack the next generation of air traffic control systems, and collide two large civilian aircraft. This is a realistic scenario, since the Cyber Terrorist will also crack the aircraft's in-cockpit sensors. Much of the same can be done to the rail lines. A Cyber Terrorist will remotely alter the formulas of medication at pharmaceutical manufacturers. The potential loss of life is unfathomable.
  • 19. It is clear that some form of security for private networks connected to the Internet is essential Some Software tools are important and necessary as a part of that security, but cannot be expected to perform all the required security functions.
  • 20. Internet is a cooperative environment and has social as well as technical aspects. It is the responsibility of all the users to ensure trust of the community :-)
  • 21. The growth of Internet is not a fluke or a fad, but the consequence of unleashing the power of individual creativity.
  • 22. CONCLUSION The Internet (and World Wide Web) was have today was created by some very bright, talented people who either had vision, or were inspired by other talented people’s visions. Though their ideas were not always popular, they pressed ahead. Their perseverance and hard work brought us to where we are today. There is a lot to be learned by studying these people, their early work and keeping in mind what they had to work with. Today, we owe a great deal for the wired world we enjoy, to the hard work of these people.