Living Online

Download Report

Transcript Living Online

Living Online
IC3
Networks &
Telecommunication
IC3- Living Online
What is a Network?
• 2 or more devices connected together
Client-Server
• Client-Server
– School or Large Business
– Server(s) as dedicated
resources to client PC’s
• Print, Web, File Storage
Peer-to-Peer
• No Server
• All PC’s share
resources
– Home network
LAN & WAN
• LAN
– Local area network
– Common location
• WAN
– Wide area network
– Networks connected in
distant locations
Network Benefits
• Share information
• Share hardware devices
– Printers, scanners
• Communication/ collaboration
• Centralized services
– Storage of files, web, mail
Network Disadvantages
• Can you think of any disadvantages?
– Dependency
– Expensive
– Security risk
– Loss of privacy
– Viruses
Communications Media
• What does data
transmit on?
•
•
•
•
•
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Wireless
Satellite
Network Hardware
• Modem
– Bits per second
– 56kbps
• NIC (Ethernet Card)
• Cable/DSL Modem
– 1.5Mbps – 16Mbps
• Router
Network Devices
• Router
– Connects networks
– Routes traffic to/from networks or Internet
• Switch
– Connects devices within network
– Faster & smarter than hub
• Hub
– Simple device
– Slow
Networks
• Need Network OS too
– Runs on server
– Admin, security, file & print services
– Novell
Review
• True or False…
• Coax cable is the most expensive.
• Fiber optic cable is made from flexible
glass tubing.
• Sharing software is a benefit of
networking.
Review
• The least expensive type of cable is…
– Twisted pair
• What device changes analog signals to
digital & reverse?
– Modem
• Which networking device connects
many computers to share one Internet
connection?
– Router
The Internet
• Many connected
networks
• WANs connected
together
• Designed from DoD
• No one owns the
Internet
Accessing the Internet
• ISP
– Comcast, Verizon DSL
• Online Service
– AOL
How to Connect
• Need an ISP or
Online Service
• Connection to them
– Telephone lines
– Cable
– Satellite
• Modem
• Browser or Software
Connecting to the Internet
• Modem
– Changes analog to digital & reverse
– Can be internal or external
• Dial-Up
– Occasional connect
• Broadband
– Always on connect
• Wi-Fi
– Wireless
Dial-Up
• Telephone
lines
• Slow
• 56kbps (56k)
Broadband
• Cable, ADSL, Satellite
• Fast, 1.5Mbps – 16Mbps
or more!
• Dedicated
• Download/Upload speeds
are different
• Networked computers
use it
Speed Differences
Online Curriculum
• C1.1 – C1.10
– C1.2 RS Topics 2, 6-8
– Skip C1.4, C1.5, C1.9
Review
• A _____ is a network over a small area.
– LAN
• Asynchronous means the speeds are…
– Different download and upload
– 8Mbps download/ 1.5Mbps upload
• Which connection is the slowest?
– Dial-up, 56kbps
• Describe a network.
– Two or more devices connected together
Review
• Who owns the Internet?
– No one
• What does an ISP do?
– Connects you to the Internet…for a price!
Intranet & Extranet
• Intranet
– Used within a business
– Has internal documents, forms, HR info, etc
– Uses a browser
– Can’t be accessed outside of network
• Extranet
– Allows outside user to access internal info
– Uses browser
– Needs username/password
Online & Homework
• Online C1.11- C1.12
• Take the Quiz on C1.13 until you score
a 100
• Look up and describe what a computer
firewall is
– Write 2-3 sentences about what it does
– Name 2-3 pieces of firewall software
Email & Effective
Communication
IC3- Living Online
Email & Communication
• Name some email programs
• Email advantages?
– Speed, Cost, Easy Access, Share Info/Collaborate
• Web Access (Gmail) or Program (Outlook)
• Standard features
– Read, send, attach files
How Email Works
Understanding an Email Address
• Mailbox Name
• Domain Name
• Domain Category
What’s the Email Address?
• Samantha Murray works for IBM
• IBM’s web site is www.ibm.com
• Sam’s username is smurray
• What would be her email address?
– [email protected]
What’s the Web Site?
• You know a guy named Bill’s email
address
– [email protected]
• You can’t remember where he works
• What would be the web site to find out
the company’s name?
– www.gcsssd.org
Which is Correct?
• Raquel works at MTV
• MTV’s web site is www.mtv.com
• Which could be her email address?
– [email protected][email protected][email protected][email protected]
Outlook
Addressing
• CC:
• BC:
Accessing Email
• Email Program on PC
• Web Based Email like Comcast or
Google
• Cell or PDA
Teknimedia
• C2.1- C2.7
– C2.2 RS (Only read Advantages & Accessing)
• Review Handout
Receiving Email
Sending Email
• To, From, Subject, CC, Body, BC
• Use Address Book
• Subject
– Brief & Descriptive
• Add Attachment or add in a web link (URL)
• Spell Check & check email address
Handling Emails
Other Messaging
Online
• Due Date:
• Teknimedia C2.8 - C2.24
• Take the quiz on C2.13 & C2.24 until
you score a 100.
Your Message
• Web pages
– If page updates
frequently, just give
the link to site
• A reply shows
original message,
indicated by >>
marks
More on Email
• Options after reading: Reply, Forward, Save,
Delete
More on Email
• If you get a “can not be delivered”
message, what should you try first?
• Attachment size may be limited on
either end
• Document may not be legal without a
handwritten signature
Special Email Features
• Adding formatting of text (Bold, etc)
– May not work if they are using diff email
program
• Automatic message responses
– “Out of office”
– Forwards to another email
– Block senders list
• Junk folder
Professional Email Etiquette
• Include a subject
– Brief yet descriptive enough
•
•
•
•
•
•
Try to keep to 1 subject
Keep message short
Avoid ALL CAPS!
Limit jokes, symbols :-o
Proofread before sending
Double check the addresses
– DON’T EMBARRASS YOURSELF!
• Email sent through company is NOT private
Choose One…
Review
• What is cc?
• What is bcc?
• Which is faster, Email or IM?
• Due Date: 02/04/2008
Teknimedia C2.25 - C2.38 is due to be
completed.
• Take the quiz on C2.38 until you score a
100.
Unwanted Email
IC3- Living Online
What’s This?
Spam
• Unwanted e-mail, specifically
unsolicited bulk e-mail.
• Typically, an e-mail message is sent
to multiple recipients who did not ask
to receive it.
• E-mail messages are not considered
spam if a user has signed up to
receive them.
Spam Facts
• Estimated 80% of email is spam
• 1978 - An e-mail spam is sent to 600
addresses
• 1994 - First large-scale spam sent to
6000 newsgroups, reaching millions of
people.
• 2005 - 30 billion per day
• 2006 - 55 billion per day
Circle of Spam
Prevent Spam
•
•
•
•
•
Keep anti-virus up to date
Don’t forward suspect emails
Ignore the virus warning email
Report spam to admin to be blocked
Don’t open attachment from people you
don’t know
Hoaxes
• Email that tried to convince you to
delete a file (it was needed)
– Also told you to warn everyone
• Get money from you
• Phishing- steals your personal info
– Spoofed sites & emails
•
•
•
•
Emails that appear to come from original source
Asks you to change password
Link takes you to copied site
User collects your info
Phishing
Differences between Spam & Phishing
• How does it arrive?
• Spam: Sneaks in the back door
• Phishing: Walks in the front door
• How does it make its offer?
• Spam: Looks bad, seems far-fetched
• Phishing: Looks plausible, seems credible
• What is it trying to do?
• Spam: Tries to sell you something
• Phishing: Tries to steal something from you
Review
• What’s worse, spam or phishing?
Internet Essentials
IC3- Living Online
Background of Internet
• 1962, Cold War
– US wanted to connect labs
– Wanted it reliable; not easily destroyed
– JCR Licklider of MIT wrote the concepts
• ARPANET (Advanced Research Project
Agency)
– Breaks into small packets
– Packets sent using any available connection
– Arrive at destination; reassembled; put in order;
request resend if necessary
• TCP/IP
Backbone
• Major telecommunication companies
handle the high-speed backbone
• ISP’s connect to backbone
• You connect to ISP
Verizon Map- Global
Verizon Map- IP NA
Browsing the Web
IC3- Living Online
Terms
• HTTP
– Rules of how info is packed & transmitted between
web servers
• URL
• HTML
– Lang. that makes up a web page
• FTP
– Used to transfer/download files from a file server
• Upload, Download
• Hyperlink
URL
Which are from the same place?
•
•
•
•
•
•
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
HTML Example
Cookies
• Small text file
• Stored on your HD
• Contains customer id info
– Personalizes your web visit
– When you visit the site, the ID# in cookie is
sent to web site to look up history of your past
visits
• Profiles are formed from your activities
• Many sites require cookies
Cookies for Ads
• Hosting the banner images on its servers and using
third-party cookies, the advertising company is able
to track the browsing of users across these two sites.
Browser & Cookies
Plug-Ins & Pop-Ups
• Plug-In
– Program downloaded to allow viewing of an
item on web site
• Adobe Reader
• Macromedia Flash
• Pop-Up Ads
– Appear in separate or same window
– Annoying; not dangerous
– Update IE/browser or Windows XP SP2 or
add in blocking software
Secure & Unsecure Sites
• Password DOES NOT mean secure
• Secure Socket Layer (SSL)
– Encrypts the data (credit card #’s, etc.)
– URL will begin with https://
• Log Off after leaving site
– Why?
Online Curriculum
• C1.14-C1.22 including quiz
– Get 100 on the quiz
Evaluating a Site
• Authority
– Credentials; who is responsible for site?
– Way to contact them
• Accuracy
– Cite sources?
– Relevant links
– Spelling/grammar
• Bias
– Towards one point of view
• Currency
– Is it up to date, current
• Design
– Well organized or cluttered?
Internet Searches
IC3- Living Online
Search Engines
• Have databases of sites & keywords
• Each generates a list of results
– Web spider or crawler
• Results may vary between engines
• Go to yahoo.com & search for great wall of
china
– Notice 1st result
– How many total hits?
• Go to google.com & do same search
– Different result for #1
– How many total hits?
Searching all engines
• Go to mamma.com
– Search for merry melodies cartoons
– Results show which engines they are
registered with
• Go to dogpile.com
– Low carb diets
– Tells where it searched & found on
Narrowing your search
• Quotation Marks
– Yellow tuna would find matches w/ either word
or both
– “Yellow Tuna” would look for that phrase
Yellow tuna- no quotes
“Yellow tuna”- with quotes
Narrowing your search
• Plus & Minus Signs
– + include keywords
– - exclude keywords
• Use the advanced search function
• Boolean
– AND, OR, NOT, NEAR
– Recipes AND Chicken AND Spaghetti
– NBA OR Basketball
– NEAR- within 10 words
– NOT- Tennis AND NOT Wimbledon
+ Sign
- Sign
Advanced Search
Security & Privacy Online
IC3- Living Online
Safeguarding
• Electrical Failure/Disaster
– Secure power cords so they can’t be
accidentally unplugged
– UPS
– Surge Protector
– Save files often
– Back up files regularly
• Maybe off site too
Computer Crime
• A criminal act committed through use
of a computer
– Accessing someone else’s system & changing
info
– Creating a virus & causing damage
– Using a program improperly to obtain private
info
– Harassment/stalking
– Copyright violations
Computer Fraud & Hacking
• Fraud- Manipulation of data to obtain
money, property or value dishonestly or
to cause loss
– Stealing money from bank accounts
– Obtaining false info
– Phishing
• Hacking
– Invading someone else’s computer
– For personal gain or fun
Top Scams
Fraud Statistics
Fraud Statistics
Viruses
• Program that causes corruption of data
– Executable file (runs like a program)
– Spreads from file to file
– Can be major or minor
• Worm
– Make many copies of itself & uses system
resources to slow system down
• Time Bomb
– A virus that causes damage at a certain date,
time, or after a # of boots
Viruses
• Trojan Horse
– A virus that does something different than it
looks like its doing
– An example of a Trojan horse would be a
program named "waterfalls.scr" claiming to be
a free waterfall screensaver which, when run,
instead would allow access to the user's
computer remotely.
Protect Your Computer
• Antivirus software
– Up to date
• Careful opening attachments
• Scan disks first
• Set AV to scan email & attachments
Security & Privacy OnlinePart 2
IC3- Living Online
Security Issues
• Use passwords to protect access
– Mix cases
– Use numbers & letters
– Add punctuation
•
•
•
•
No shared passwords
No sheet of passwords
Web Secret Credit Card
Biometric reader
– Fingerprint, retina, voice pattern
Biometric
Software Piracy
• Illegal copying or use of programs
• License # or key
• Shareware
– Trial period
• Freeware
– Watch out for tracking!!!
Web Bugs & Protecting Privacy
• Web Bug
– Hidden image in banner ads (1 pixel)
– Browser displays the ad & hidden image
– Image places a cookie on HD
– Tracks visits from sites w/ their banner ads
• Block 3rd party cookies
• Delete cookies
• Read site’s privacy policy
Block 3rd Party Cookies
Protecting Privacy
• Adware
– Read license agreement of software
– Some allow other programs to install to track
browsing & transmit to a server
• Spyware
– Beyond adware
– Runs in background
– Gathers info about computer
• Ad-aware, SpyBot, etc.
EULA
Living Online
IC3