Beruflich Dokumente
Kultur Dokumente
(https://swayam.gov.in) (https://swayam.gov.in/nc_details/IGNOU)
maddy4mar@gmail.com
SECURITY (course)
Announcements (announcements)
Course
How Internet Works?
outline
Domain
Name
System(DNS)
(unit?
unit=4&lesson=69)
Applications
of Internet
(unit?
unit=4&lesson=70)
Further
Reading
(unit?
unit=4&lesson=193)
CHOOSING
THE BEST
BROWSER
ACCORDING
TO THE
REQUIREMENTS
SECURING
WEB
BROWSERS
Figure 2: Anatomy of a Web Address
ANTIVIRUS
The http:// you see at the start of most Web addresses stands for
hypertext transfer protocol. A protocol is a set of rules for communication
E-MAIL
SECURITY —sort of like grammar and vocabulary in a language like English. The
http protocol defines how Web browser and Web servers communicate
and is designed to be independent from the computer’s hardware and
QUIZ 2
operating system. It doesn’t matter if messages come from a PC, a Mac,
GUIDELINES
a huge mainframe, or a pocket-sized smartphone; if a device speaks to
FOR SECURE another using a common protocol, then it will be heard and understood.
PASSWORD
The Internet supports lots of different applications, and many of these
TWO-STEP applications use their own application transfer protocol to communicate
AUTHENTICATION with each other. The server that holds your e-mail uses something called
SMTP, or simple mail transfer protocol, to exchange mail with other e-mail
USING servers throughout the world. FTP, or file transfer protocol, is used for—
PASSWORD
you guessed it—file transfer. FTP is how most Web developers upload
MANAGER
the Web pages, graphics, and other files for their Web sites. Even the
Web uses different protocols. When you surf to an online bank or when
WI-FI
SECURITY you’re ready to enter your payment information at the Web site of an
Internet retailer, the http at the beginning of your URL will probably
QUIZ 3 change to https (the “s” is for secure). That means that communications
between your browser and server will be encrypted for safe transmission.
GUIDELINES The beauty of the Internet infrastructure is that any savvy entrepreneur
FOR SOCIAL can create a new application that rides on top of the Internet.
MEDIA
SECURITY
INTRODUCTION
TO MOBILE
PHONES
SMARTPHONE
Path Name and File Name
SECURITY
Look to the right of the top-level domain and you might see a slash
ANDROID followed by either a path name, a file name, or both. If a Web address
SECURITY
has a path and file name, the path maps to a folder location where the file
is stored on the server; the file is the name of the file you’re looking for.
IOS
Most Web pages end in “.html,” indicating they are in hypertext markup
SECURITY
language. While http helps browsers and servers communicate, html is
QUIZ 5
the language used to create and format (render) Web pages. A file,
however, doesn’t need to be .html; Web servers can deliver just about
CYBER any type of file: Acrobat documents (.pdf), PowerPoint documents (.ppt or
SECURITY .pptx), Word docs (.doc or .docx), JPEG graphic images (.jpg). At some
INITIATIVES Web addresses, the file displays content for every visitor, and at others
IN INDIA (like amazon.com), a file will contain programs that run on the Web server
to generate custom content just for you.
CYBER
SECURITY
You don’t always type a path or file name as part of a Web address, but
EXERCISE
there’s always a file lurking behind the scenes. A Web address without a
file name will load content from a default page. For example, when you
CYBER
SECURITY visit “google.com,” Google automatically pulls up a page called
ASSURANCE “index.html,” a file that contains the Web page that displays the Google
logo, the text entry field, the “Google Search” button, and so on. You
CYBER might not see it, but it’s there.
SECURITY
INCIDENT
HANDLING
QUIZ 6
ONLINE
BANKING
SECURITY
MOBILE
BANKING
SECURITY
CREDIT
CARD AND
DEBIT CARD
SECURITY
UPI Security
QUIZ 7
E-WALLET
SECURITY
SECURITY
OF MICRO
ATMs
QUIZ 8
SOCIAL
ENGINEERING
TYPES OF
SOCIAL
ENGINEERING
HOW CYBER
CRIMINALS
WORKS?
HOW TO
PREVENT
FOR BEING A
VICTIM OF
CYBER
CRIME
QUIZ 9
CYBER
SECURITY
THREAT
LANDSCAPE
EMERGING
CYBER
SECURITY
THREATS
CYBER
SECURITY
TECHNIQUES
FIREWALL
QUIZ 10
IT SECURITY
ACT 2000
MISC.
TOPICS
QUIZ 11
RECOVERING
FROM
INFORMATION
LOSS
DESTROYING
SENSITIVE
INFORMATION
CCLEANER
FOR
WINDOWS
REFERENCE,
CONTRIBUTION,
ATTRIBUTION
AND
LICENSE