Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Summary, Cyber World Overview: Internet, Security, and Digital Signatures, Summaries of Computer Security

An overview of the cyber world, focusing on the internet, online resources, information security, and digital signatures. It explains the scope of computers in daily life, fundamental computer principles, and the basics of computer networks. It covers internet connection prerequisites, isp operations, dial-up and broadband connections, and various internet applications. The document also addresses information security, types of threats, prevention measures, and the use of digital signatures to secure documents in cyberspace. It is designed to provide a foundational understanding of computer networks and online security for students and professionals alike, offering insights into both the technical and practical aspects of navigating the digital world. Useful for those seeking to understand the basics of computer networking and security.

Typology: Summaries

2024/2025

Uploaded on 07/15/2025

zeenia-1
zeenia-1 🇮🇳

3 documents

1 / 6

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Cyber World Overview: Internet,
Security, and Digital Signatures
Cyber World: An Overview
This document provides an overview of the cyber world, focusing on the
Internet, online resources, information security, and digital signatures.
Understanding the Scope of Computers
Computers are ubiquitous in modern life, found in shopping centers,
railway and airline reservations, microwave ovens, and phones.
Transactions using debit or credit cards involve complex security measures
to access bank account information.
The 'E' - Zone
The prefix 'e' has become common, transforming mail into e-mail, banking
into e-banking, and commerce into e-commerce. Cyber, derived from
cybernetics, describes the range of things available through computers.
Examples include cyber-phobia and cyberspace. The term cyberspace
encompasses humans, computers (hardware and software), and the
capabilities of computers. Computers can be more reliable than humans for
repetitive tasks. While manual banking offered a personal touch, computers
provide consistent speed regardless of the customer. This connectivity
extends to mobile phones.
What is a Computer Network?
A computer network enables communication and resource sharing
(knowledge, hardware, software) between two or more computers.
International phone calls illustrate how data travels through various
networks, requiring adherence to rules for effective communication. In
computer networking, standard rules, called protocols, must be followed for
successful interaction.
Protocol
A protocol is a standard that controls connection, communication, and data
transfer between computing endpoints.
Few Protocol Examples:
IP (Internet Protocol): A data-oriented protocol for communicating
data across a packet-switched internetwork.
UDP: Allows programs on networked computers to send short
messages (datagrams) to each other.
pf3
pf4
pf5

Partial preview of the text

Download Summary, Cyber World Overview: Internet, Security, and Digital Signatures and more Summaries Computer Security in PDF only on Docsity!

Cyber World Overview: Internet,

Security, and Digital Signatures

Cyber World: An Overview

This document provides an overview of the cyber world, focusing on the Internet, online resources, information security, and digital signatures.

Understanding the Scope of Computers

Computers are ubiquitous in modern life, found in shopping centers, railway and airline reservations, microwave ovens, and phones. Transactions using debit or credit cards involve complex security measures to access bank account information.

The 'E' - Zone

The prefix 'e' has become common, transforming mail into e-mail, banking into e-banking, and commerce into e-commerce. Cyber, derived from cybernetics, describes the range of things available through computers. Examples include cyber-phobia and cyberspace. The term cyberspace encompasses humans, computers (hardware and software), and the capabilities of computers. Computers can be more reliable than humans for repetitive tasks. While manual banking offered a personal touch, computers provide consistent speed regardless of the customer. This connectivity extends to mobile phones.

What is a Computer Network?

A computer network enables communication and resource sharing (knowledge, hardware, software) between two or more computers. International phone calls illustrate how data travels through various networks, requiring adherence to rules for effective communication. In computer networking, standard rules, called protocols, must be followed for successful interaction.

Protocol

A protocol is a standard that controls connection, communication, and data transfer between computing endpoints.

Few Protocol Examples:

IP (Internet Protocol): A data-oriented protocol for communicating data across a packet-switched internetwork. UDP: Allows programs on networked computers to send short messages (datagrams) to each other.

TCP: Provides reliable, in-order delivery of a stream of bytes, suitable for file transfer and e-mail. DHCP (Dynamic Host Configuration Protocol): Used by networked devices to obtain IP addresses and other parameters from a DHCP server. FTP (File Transfer Protocol): Used to transfer data between computers over the Internet or a network. Telnet: A network protocol used on the Internet or local area network (LAN) connections. SSH (Secure Shell): A network protocol that allows data exchange over a secure channel between two computers, using encryption for confidentiality and integrity. POP3 (Post Office Protocol 3): Used by local e-mail clients to retrieve e-mail from a remote server. SMTP (Simple Mail Transfer Protocol): The standard for e-mail transmissions across the Internet.

Types of Networks

Networks are classified by scale/scope:

PAN (Personal Area Network): A network for communication among devices close to one person. LAN (Local Area Network): A network covering a small geographic area, such as a home, office, or building. CAN (Campus Area Network): Limited to an area smaller than a typical MAN. MAN (Metropolitan Area Network): A network connecting two or more LANs or CANs within a town, city, or metropolitan area. WAN (Wide Area Network): A network covering a broad geographic area, often using facilities provided by telephone companies.

Different Combinations of Networks

Intranet: Uses Internet protocols and IP-based tools, controlled by a single administrative entity. Extranet: An Intranet with limited connections to other networks. Internet: A worldwide, publicly accessible series of interconnected computer networks transmitting data via packet switching using the Internet Protocol (IP).

Internet Protocol Suite (IPS)

The Internet protocol suite is the set of communications protocols that implement the protocol stack on which the Internet and most commercial networks run. It can be viewed as a set of layers, each solving problems related to data transmission and providing services to upper layers. Upper layers are closer to the user and deal with abstract data, relying on lower layers for physical transmission.

HTTP - Application

ISP

ISP stands for Internet Service Provider or Internet Access Provider (IAP). Cable broadband speed is a major differentiating factor between different types of Internet connections. Some ISPs maintain the Network Card’s Hardware Code, restricting the connection to a specific computer.

Basic Working of ISP

To access the Internet, a user must establish a connection with the ISP server. The server verifies the username and password, checks account validity, and grants access if sufficient balance is available. Some plans charge for data downloaded (Mega Bytes) rather than hourly usage.

Internet Connection Types and Considerations

Internet connections can be categorized based on usage and download plans.

Usage-Based/Download Plans

With these plans, the duration of site access is irrelevant. Each refresh of a site, even if fetching the same information, incurs a charge.

Unlimited Connections

Unlimited connections are more expensive but offer unrestricted usage and downloads. Some unlimited connections have speed limitations, such as a maximum speed of 64kbps.

Dial-up Connections

Dial-up connections require a computer with a dial-up modem and necessary software. The modem translates digital language to analog signals for transmission over telephone lines and vice versa. The ISP login server authenticates the user and grants Internet access. Dial-up connections incur charges for both talk time and ISP services. The phone line is dedicated to either phone or Internet use. Line disturbances can disrupt or slow down the connection. Each fax tone indicates a call to the server, regardless of connection success. Some ISPs allow users to enter their username and password each time for connection.

Broadband Connections

Broadband connections are faster than dial-up. A dial-up modem offers speeds up to 54kbps, while broadband provides a minimum of 64kbps and can reach up to 2Mbps. Small office/home office (SOHO) setups often use 512kbps, sufficient for sharing an Internet connection among 10- computers. Broadband allows simultaneous phone and Internet use on the

same line using splitters and modem designs. Talk time and Internet usage are charged separately. Broadband is easier to use than dial-up and offers faster speeds. Cable modems enable TV and Internet on the same setup.

Other Internet Connection Types

Other Internet connection types include: * ISDN (Integrated Service Digital Network) * Rural Internet * Satellite Internet * Cellular Broadband

Internet Uses

The basic purpose of the Internet is communication. Online games are available for multi-user experiences. Remote access tools allow users to extend their office or access their office computer from a remote location, requiring Internet access on both computers.

Information Security and Threats

Securing information has always been important.

Threats to Information

The biggest threat to computer information is a virus. A virus is a computer program that replicates and infects a computer without the user's permission or knowledge. Computer viruses spread through information exchange via floppy disks, CDs, USB drives, or the Internet (email, websites, downloads). Viruses can slow down computers, freeze operations, delete data, or render the computer unbootable. Virus removal often involves formatting the disk and reinstalling the operating system. Despite preventative measures, virus infections can still occur.

Types of Threats

Virus: Computer programs that spread through various media and the Internet, installing without user knowledge and taking partial control of the computer. Spyware: Programs that monitor and collect personal information, install additional software, or redirect to websites, often entering through websites or junk emails. Rootkit: Programs designed to take fundamental control of a computer system without authorization, potentially allowing unauthorized users to act as system administrators. Worms: Programs that use a network to send copies of themselves to other computers without user knowledge, potentially corrupting files or choking network bandwidth. Trojan: Programs that get into your computer and destroy your computer files.