Sie sind auf Seite 1von 6

X

(https://swayam.gov.in) (https://swayam.gov.in/nc_details/IGNOU)

maddy4mar@gmail.com 

IGNOU (https://swayam.gov.in/explorer?ncCode=IGNOU) » INTRODUCTION TO CYBER

SECURITY (course)

Announcements (announcements)

About the Course (https://swayam.gov.in/nd2_nou19_cs08/preview)

Ask a Question (forum) Progress (student/home) Mentor (student/mentor)

Unit 1 - INTRODUCTION TO CYBER SPACE

Course
How Internet Works?
outline

INTRODUCTION HOW INTERNET WORKS?


TO CYBER
SPACE The Internet is a network of networks—millions of them, actually. If the
network at your university, your employer, or in your home has Internet
History of
access, it connects to an Internet service provider (ISP). Many (but not
Internet
(unit?
all) ISPs are big telecommunications companies like Verizon, Comcast,
unit=4&lesson=5) and AT&T[2]. These providers connect to one another, exchanging traffic,
and ensuring your messages can get to any other computer that’s online
How
Internet
and willing to communicate with you.
Works?
(unit? The Internet has no center and no one owns it. That’s a good thing. The
unit=4&lesson=66) Internet was designed to be redundant and fault-tolerant—meaning that if
Addressing
one network, connecting wire, or server stops working, everything else
Scheme in should keep on running. Rising from military research and work at
the Internet educational institutions dating as far back as the 1960s, the Internet really
(unit? took off in the 1990s, when graphical Web browsing was invented, and
unit=4&lesson=67)
much of the Internet’s operating infrastructure was transitioned to be
supported by private firms rather than government grants.
Internet
Service
Provider
(unit?
unit=4&lesson=68)

Domain
Name
System(DNS)
(unit?
unit=4&lesson=69)

Applications
of Internet
(unit?
unit=4&lesson=70)

Further
Reading
(unit?
unit=4&lesson=193)

CYBER Figure 1: Working of the Internet


CRIME
Enough history—let’s see how it all works! If you want to communicate
INFORMATION with another computer on the Internet then your computer needs to know
SECURITY
the answer to three questions: What are you looking for? Where is it? And
how do we get there? The computers and software that make up Internet
ETHICAL
infrastructure can help provide the answers. Let’s look at how it all comes
ASPECT OF
INFORMATION together.
SECURITY When you type an address into a Web browser (sometimes called a URL
for uniform resource locator), you’re telling your browser what you’re
QUIZ 1 looking for, Figure 2 describes how to read a typical URL.

CHOOSING
THE BEST
BROWSER
ACCORDING
TO THE
REQUIREMENTS

SECURING
WEB
BROWSERS
Figure 2: Anatomy of a Web Address

ANTIVIRUS
The http:// you see at the start of most Web addresses stands for
hypertext transfer protocol. A protocol is a set of rules for communication
E-MAIL
SECURITY —sort of like grammar and vocabulary in a language like English. The
http protocol defines how Web browser and Web servers communicate
and is designed to be independent from the computer’s hardware and
QUIZ 2
operating system. It doesn’t matter if messages come from a PC, a Mac,
GUIDELINES
a huge mainframe, or a pocket-sized smartphone; if a device speaks to
FOR SECURE another using a common protocol, then it will be heard and understood.
PASSWORD
The Internet supports lots of different applications, and many of these
TWO-STEP applications use their own application transfer protocol to communicate
AUTHENTICATION with each other. The server that holds your e-mail uses something called
SMTP, or simple mail transfer protocol, to exchange mail with other e-mail
USING servers throughout the world. FTP, or file transfer protocol, is used for—
PASSWORD
you guessed it—file transfer. FTP is how most Web developers upload
MANAGER
the Web pages, graphics, and other files for their Web sites. Even the
Web uses different protocols. When you surf to an online bank or when
WI-FI
SECURITY you’re ready to enter your payment information at the Web site of an
Internet retailer, the http at the beginning of your URL will probably
QUIZ 3 change to https (the “s” is for secure). That means that communications
between your browser and server will be encrypted for safe transmission.
GUIDELINES The beauty of the Internet infrastructure is that any savvy entrepreneur
FOR SOCIAL can create a new application that rides on top of the Internet.
MEDIA
SECURITY

Hosts and Domain Names


TIPS AND
BEST The next part of the URL in our diagram holds the host and domain name.
PRACTICES Think of the domain name as the name of the network you’re trying to
FOR SAFER
connect to, and think of the host as the computer you’re looking for on
SOCIAL
that network.
NETWORKING
Many domains have lots of different hosts. For example, Yahoo!’s main
BASIC Web site is served from the host named “www” (at the address
SECURITY http://www.yahoo.com), but Yahoo! also runs other hosts including those
FOR named “finance” (finance.yahoo.com), “sports” (sports.yahoo.com), and
WINDOWS “games” (games.yahoo.com).
Most Web sites are configured to load a default host, so you can often
USER eliminate the host name if you want to go to the most popular host on a
ACCOUNT site (the default host is almost always named “www”). Another tip: most
PASSWORD
browsers will automatically add the “http://” for you, too.
FOR
Host and domain names are not case sensitive, so you can use a
WINDOWS
combination of upper and lower case letters and you’ll still get to your
QUIZ 4 destination.

INTRODUCTION
TO MOBILE
PHONES
SMARTPHONE
Path Name and File Name
SECURITY
Look to the right of the top-level domain and you might see a slash
ANDROID followed by either a path name, a file name, or both. If a Web address
SECURITY
has a path and file name, the path maps to a folder location where the file
is stored on the server; the file is the name of the file you’re looking for.
IOS
Most Web pages end in “.html,” indicating they are in hypertext markup
SECURITY
language. While http helps browsers and servers communicate, html is
QUIZ 5
the language used to create and format (render) Web pages. A file,
however, doesn’t need to be .html; Web servers can deliver just about
CYBER any type of file: Acrobat documents (.pdf), PowerPoint documents (.ppt or
SECURITY .pptx), Word docs (.doc or .docx), JPEG graphic images (.jpg). At some
INITIATIVES Web addresses, the file displays content for every visitor, and at others
IN INDIA (like amazon.com), a file will contain programs that run on the Web server
to generate custom content just for you.
CYBER
SECURITY
You don’t always type a path or file name as part of a Web address, but
EXERCISE
there’s always a file lurking behind the scenes. A Web address without a
file name will load content from a default page. For example, when you
CYBER
SECURITY visit “google.com,” Google automatically pulls up a page called
ASSURANCE “index.html,” a file that contains the Web page that displays the Google
logo, the text entry field, the “Google Search” button, and so on. You
CYBER might not see it, but it’s there.
SECURITY
INCIDENT
HANDLING

QUIZ 6

ONLINE
BANKING
SECURITY

MOBILE
BANKING
SECURITY

CREDIT
CARD AND
DEBIT CARD
SECURITY

UPI Security

QUIZ 7
E-WALLET
SECURITY

SECURITY
OF MICRO
ATMs

QUIZ 8

SOCIAL
ENGINEERING

TYPES OF
SOCIAL
ENGINEERING

HOW CYBER
CRIMINALS
WORKS?

HOW TO
PREVENT
FOR BEING A
VICTIM OF
CYBER
CRIME

QUIZ 9

CYBER
SECURITY
THREAT
LANDSCAPE

EMERGING
CYBER
SECURITY
THREATS

CYBER
SECURITY
TECHNIQUES

FIREWALL

QUIZ 10
IT SECURITY
ACT 2000

MISC.
TOPICS

QUIZ 11

RECOVERING
FROM
INFORMATION
LOSS

DESTROYING
SENSITIVE
INFORMATION

CCLEANER
FOR
WINDOWS

REFERENCE,
CONTRIBUTION,
ATTRIBUTION
AND
LICENSE

Das könnte Ihnen auch gefallen