Slide 1 - Department of Computer Science and Engineering

38
The Internet & the The Internet & the World Wide Web World Wide Web Exploring Cyberspace Exploring Cyberspace Connecting to the Internet Connecting to the Internet How Does the Internet work? How Does the Internet work? The World Wide Web The World Wide Web Email & Other Ways of Communicating over the Email & Other Ways of Communicating over the Net Net Telephony, Multimedia, Webcasting, Blogs, E- Telephony, Multimedia, Webcasting, Blogs, E- Commerce Commerce Snooping, Spoofing, Phishing, Pharming, Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware Cookies, & Spyware C h a p t e r

description

 

Transcript of Slide 1 - Department of Computer Science and Engineering

Page 1: Slide 1 - Department of Computer Science and Engineering

The Internet & the The Internet & the World Wide WebWorld Wide Web

Exploring CyberspaceExploring Cyberspace–Connecting to the InternetConnecting to the Internet–How Does the Internet work?How Does the Internet work?–The World Wide WebThe World Wide Web–Email & Other Ways of Communicating Email & Other Ways of Communicating over the Netover the Net–Telephony, Multimedia, Webcasting, Telephony, Multimedia, Webcasting, Blogs, E-CommerceBlogs, E-Commerce–Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & SpywarePharming, Cookies, & Spyware

Chapte

r

Page 2: Slide 1 - Department of Computer Science and Engineering

22

Connecting to the InternetConnecting to the Internet Internet HistoryInternet History

– Began with 1969’s ARPANET for US Dept. of Began with 1969’s ARPANET for US Dept. of DefenseDefense

– 62 computers in 197462 computers in 1974– 500 computers in 1983500 computers in 1983– 28,000 computers in 198728,000 computers in 1987– Early 1990s, multimedia became available on Early 1990s, multimedia became available on

internetinternet To connect you needTo connect you need

– An access device (computer)An access device (computer)– A means of connection (phone line, cable hookup, A means of connection (phone line, cable hookup,

or wireless)or wireless)– An Internet Service Provider (ISP)An Internet Service Provider (ISP)

Page 3: Slide 1 - Department of Computer Science and Engineering

33

Connecting to the InternetConnecting to the Internet

Definition: Definition: BandwidthBandwidth is an expression of how is an expression of how much data – text, voice, video and so on – can much data – text, voice, video and so on – can be sent through a communications channel in a be sent through a communications channel in a given amount of time.given amount of time.

Definition: Definition: BasebandBaseband is a slow type of connection is a slow type of connection that allows only one signal to be transmitted at that allows only one signal to be transmitted at a time.a time.

Definition: Definition: BroadbandBroadband is a high speed connection is a high speed connection that allows several signals to be transmitted at that allows several signals to be transmitted at once.once.

Page 4: Slide 1 - Department of Computer Science and Engineering

44

Connecting to the InternetConnecting to the Internet

Data Transmission SpeedsData Transmission Speeds– Originally measured in bits per second (bps) Originally measured in bits per second (bps) – 8 bits are needed to send one character, such as 8 bits are needed to send one character, such as AA

or or aa– Currently measured in kilobits per second (Kbps)Currently measured in kilobits per second (Kbps)– Kilo-Kilo- stands for a thousand stands for a thousand– A 28.8 Kbps modem sends 28,800 bits per secondA 28.8 Kbps modem sends 28,800 bits per second– How many characters per second would that be?How many characters per second would that be?

– Mbps connections send 1 million bits per secondMbps connections send 1 million bits per second– Gbps connections send 1 billion bits per secondGbps connections send 1 billion bits per second

28,800 / 8 = 3600 characters per second

Page 5: Slide 1 - Department of Computer Science and Engineering

55

Connecting to the InternetConnecting to the Internet

ModemsModems– Can be either internal or external to your PCCan be either internal or external to your PC– Most ISPs offer local access numbersMost ISPs offer local access numbers– Need call waiting turned off; either manually or in Need call waiting turned off; either manually or in

WindowsWindows High-speed phone linesHigh-speed phone lines

– ISDN lineISDN line– DSL lineDSL line

Cable ModemsCable Modems SatelliteSatellite Wi-Fi & 3GWi-Fi & 3G

Page 6: Slide 1 - Department of Computer Science and Engineering

66

Connecting to the InternetConnecting to the Internet ModemsModems High-speed phone linesHigh-speed phone lines

– ISDN lineISDN line Integrated Services Digital NetworkIntegrated Services Digital Network Allows voice, video, & data transmission over copper phone Allows voice, video, & data transmission over copper phone

lineslines Can transmit 64 to 128 KbpsCan transmit 64 to 128 Kbps

– DSL lineDSL line Uses regular phone lines, DSL modemUses regular phone lines, DSL modem Receives data at 1.5-9 Mbps; sends at 128Kbps – 1.5 MbpsReceives data at 1.5-9 Mbps; sends at 128Kbps – 1.5 Mbps Is always onIs always on

Cable ModemsCable Modems SatelliteSatellite Wi-Fi & 3GWi-Fi & 3G

Page 7: Slide 1 - Department of Computer Science and Engineering

77

Connecting to the InternetConnecting to the Internet ModemsModems

28.8 Kbps takes 4 3/4 hours to download 6 minute video28.8 Kbps takes 4 3/4 hours to download 6 minute video High-speed phone linesHigh-speed phone lines

– ISDN lineISDN line 1 hour to download 6 minute video1 hour to download 6 minute video

– DSL lineDSL line 11 minutes to download 6 minute video11 minutes to download 6 minute video

Cable ModemsCable Modems– Connects the PC to a cable-TV systemConnects the PC to a cable-TV system

2 minutes to download a 2 minute video2 minutes to download a 2 minute video SatelliteSatellite Wi-Fi & 3GWi-Fi & 3G

Page 8: Slide 1 - Department of Computer Science and Engineering

88

Connecting to the InternetConnecting to the Internet

ModemsModems High-speed phone linesHigh-speed phone lines

– ISDN lineISDN line– DSL lineDSL line

Cable ModemsCable Modems SatelliteSatellite

– Always-on connection using satellite dish to satellite Always-on connection using satellite dish to satellite orbiting earthorbiting earth

– Send data at 56 – 500 Kbps; receive at 1.5 MbpsSend data at 56 – 500 Kbps; receive at 1.5 Mbps

Wi-Fi & 3GWi-Fi & 3G

Page 9: Slide 1 - Department of Computer Science and Engineering

99

Connecting to the InternetConnecting to the Internet ModemsModems High-speed phone linesHigh-speed phone lines

– ISDN lineISDN line– DSL lineDSL line

Cable ModemsCable Modems SatelliteSatellite Wi-Fi & 3GWi-Fi & 3G

– Wi-Fi Wi-Fi Name for a set of wireless standards set by IEEEName for a set of wireless standards set by IEEE Typically used with laptops that have Wi-Fi hardwareTypically used with laptops that have Wi-Fi hardware

– 3G3G High-speed wireless that does not need access pointsHigh-speed wireless that does not need access points Uses cell phonesUses cell phones

Page 10: Slide 1 - Department of Computer Science and Engineering

1010

Connecting to the InternetConnecting to the Internet

Internet Access ProvidersInternet Access Providers– Internet Service Providers (ISP)Internet Service Providers (ISP)

Local, regional, or national organization that Local, regional, or national organization that provides internet accessprovides internet access

Examples: AT&T Worldnet, EarthLinkExamples: AT&T Worldnet, EarthLink

– Commercial Online ServiceCommercial Online Service A members-only company that provides A members-only company that provides

specialized content and internet accessspecialized content and internet access Examples: AOL, MSNExamples: AOL, MSN

– Wireless Internet Service ProvidersWireless Internet Service Providers

Page 11: Slide 1 - Department of Computer Science and Engineering

1111

Connecting to the InternetConnecting to the Internet

Internet Access ProvidersInternet Access Providers Commercial Online ServiceCommercial Online Service Wireless Internet Service ProvidersWireless Internet Service Providers

– Internet Access for laptops, notebooks, Internet Access for laptops, notebooks, smartphones, PDA userssmartphones, PDA users

– These devices contain wireless modemsThese devices contain wireless modems– Examples: AT&T Wireless, Verizon Wireless, Examples: AT&T Wireless, Verizon Wireless,

Earthlink Net ZeroEarthlink Net Zero

Page 12: Slide 1 - Department of Computer Science and Engineering

1212

How Does the Internet Work?How Does the Internet Work?

ProtocolsProtocols– The set of rules a computer follows to The set of rules a computer follows to

electronically transmit data.electronically transmit data.– TCP/IP is the internet protocolTCP/IP is the internet protocol

Developed in 1978Developed in 1978 Used for all internet transactionsUsed for all internet transactions

PacketsPackets– Fixed-length blocks of data for transmissionFixed-length blocks of data for transmission– Data transmissions are broken up into Data transmissions are broken up into

packetspackets

Page 13: Slide 1 - Department of Computer Science and Engineering

1313

How Does the Internet Work?How Does the Internet Work? IP AddressesIP Addresses

– Every device connected to the internet has Every device connected to the internet has an addressan address

– Each IP address uniquely identifies that Each IP address uniquely identifies that devicedevice

– The address is four sets of 3-digit numbers The address is four sets of 3-digit numbers separated by periodsseparated by periods Example: 95.160.10.240Example: 95.160.10.240 Each number is between 0 and 255Each number is between 0 and 255 Static IP addresses don’t changeStatic IP addresses don’t change Dynamic IP addresses change each sessionDynamic IP addresses change each session Since addresses are limited, and most PCs are Since addresses are limited, and most PCs are

not connected a lot of the time, dynamic not connected a lot of the time, dynamic addresses are commonaddresses are common

Page 14: Slide 1 - Department of Computer Science and Engineering

1414

How Does the Internet Work?How Does the Internet Work? Domain namesDomain names

– Must be uniqueMust be unique– Identify the website, and the type of site it isIdentify the website, and the type of site it is

www.whitehouse.govwww.whitehouse.gov is NOT the same as is NOT the same as www.whitehouse.orgwww.whitehouse.org

.gov means government.gov means government .org means professional or nonprofit organization.org means professional or nonprofit organization

DNS (Domain Name System)DNS (Domain Name System)– A distributed set of serversA distributed set of servers– Provides the mapping between the IP addresses Provides the mapping between the IP addresses

and domain namesand domain names– Domain names must be registered to ensure Domain names must be registered to ensure

uniquenessuniqueness– Requires static IP addressRequires static IP address

Page 15: Slide 1 - Department of Computer Science and Engineering

1515

How Does the Internet Work?How Does the Internet Work?

The board of trustees of the Internet Society The board of trustees of the Internet Society (ISOC) oversees the standards(ISOC) oversees the standards

Internet Corporation for Assigned Names and Internet Corporation for Assigned Names and Numbers (ICANN) regulates domain namesNumbers (ICANN) regulates domain names

American Registry for Internet Numbers American Registry for Internet Numbers (ARINN) administers the unique IP addresses for (ARINN) administers the unique IP addresses for North & South America, Caribbean, and sub-North & South America, Caribbean, and sub-Saharan AfricaSaharan Africa

Two other organizations administer the unique Two other organizations administer the unique IP addresses for Europe and the Asia-Pacific IP addresses for Europe and the Asia-Pacific regionregion

Page 16: Slide 1 - Department of Computer Science and Engineering

1616

The World Wide WebThe World Wide Web

Web BrowsersWeb Browsers– Software for web-surfingSoftware for web-surfing– Examples: Internet Explorer, Netscape Navigator, Examples: Internet Explorer, Netscape Navigator,

Mozilla FireFox, Opera, SafariMozilla FireFox, Opera, Safari Practical Browser ToolsPractical Browser Tools

– Status Bar: security info, page load progressStatus Bar: security info, page load progress– Favorites (bookmarks): shortcuts to frequently Favorites (bookmarks): shortcuts to frequently

visited sitesvisited sites– View > Source: view the code of a web pageView > Source: view the code of a web page– History: tracks your recent browser activityHistory: tracks your recent browser activity– Clear History/Cache: protect your privacyClear History/Cache: protect your privacy

Page 17: Slide 1 - Department of Computer Science and Engineering

1717

The World Wide WebThe World Wide Web

WebsiteWebsite– The location of a particular computer that The location of a particular computer that

has a unique addresshas a unique address Web PagesWeb Pages

– The documents and files on a websiteThe documents and files on a website– Can include text, pictures, sound, and videoCan include text, pictures, sound, and video

Home pageHome page– The main entry point for the website The main entry point for the website

(index.html)(index.html)– Contains links to other pages on the Contains links to other pages on the

websitewebsite

Page 18: Slide 1 - Department of Computer Science and Engineering

1818

The World Wide WebThe World Wide Web Uniform Resource Locator (URL)Uniform Resource Locator (URL)

– A character string that points to a specific piece of A character string that points to a specific piece of information anywhere on the webinformation anywhere on the web

– A website’s unique addressA website’s unique address– It consists ofIt consists of

The web protocol, httpThe web protocol, http The domain name of the web serverThe domain name of the web server The directory or folder on that serverThe directory or folder on that server The file within the directory, including optional The file within the directory, including optional

extensionextension http://http://www.nps.govwww.nps.gov//yoseyose//home.htmhome.htm

protocol domain name file name . extensiondirectory

Page 19: Slide 1 - Department of Computer Science and Engineering

1919

The World Wide WebThe World Wide Web Web portalsWeb portals

– A gateway website that offers a broad array A gateway website that offers a broad array of resources and services, online shopping of resources and services, online shopping malls, email support, community forums, malls, email support, community forums, stock quotes, travel info, and links to other stock quotes, travel info, and links to other categories.categories.

– Examples: Yahoo, AOL, Microsoft Network Examples: Yahoo, AOL, Microsoft Network (MSN), Lycos, or Google(MSN), Lycos, or Google

– Most require you to log in, so you canMost require you to log in, so you can Check the home page for general informationCheck the home page for general information Use the subject guide to find a topic you wantUse the subject guide to find a topic you want Use a keyword to search for a topicUse a keyword to search for a topic

Page 20: Slide 1 - Department of Computer Science and Engineering

2020

The World Wide WebThe World Wide Web Search Services (Search Engines)Search Services (Search Engines)

– Organizations that maintain databases accessible Organizations that maintain databases accessible through websites to help you find information on through websites to help you find information on the internetthe internet

– Examples: Yahoo Search, MSN, Google and Ask Examples: Yahoo Search, MSN, Google and Ask JeevesJeeves

– Databases are compiled using software programs Databases are compiled using software programs called spiderscalled spiders Spiders crawl through the World Wide WebSpiders crawl through the World Wide Web Follow links from one page to anotherFollow links from one page to another Index the words on that siteIndex the words on that site

– Only a snapshot of the InternetOnly a snapshot of the Internet– Does not cover the entire WebDoes not cover the entire Web– Search engines differ in resultsSearch engines differ in results

Page 21: Slide 1 - Department of Computer Science and Engineering

2121

The World Wide WebThe World Wide Web 4 web search tools4 web search tools

– Keyword IndexesKeyword Indexes Type one or more search keywords, and you see Type one or more search keywords, and you see

web pages “hits” that contain those wordsweb pages “hits” that contain those words For phrases with two or more words, put phrase For phrases with two or more words, put phrase

in quotesin quotes Examples are Google, Gigablast, HotBot, MSN Examples are Google, Gigablast, HotBot, MSN

Search, Yahoo SearchSearch, Yahoo Search Google Resume (get results for your own name)Google Resume (get results for your own name)

– Subject DirectoriesSubject Directories Search by selecting lists of categories or topicsSearch by selecting lists of categories or topics Example sites are Beaucoup, Galaxy, LookSmart, Example sites are Beaucoup, Galaxy, LookSmart,

MSN Directory, Netscape, Open Directory Project, MSN Directory, Netscape, Open Directory Project, YahooYahoo

– Metasearch EnginesMetasearch Engines– Specialized Search EnginesSpecialized Search Engines

Page 22: Slide 1 - Department of Computer Science and Engineering

2222

The World Wide WebThe World Wide Web 4 web search tools4 web search tools

– Keyword IndexesKeyword Indexes– Subject DirectoriesSubject Directories– Metasearch EnginesMetasearch Engines

Allows you to search several search engines Allows you to search several search engines simultaneouslysimultaneously

Examples are Dogpile, Ixquick, Mamma, Examples are Dogpile, Ixquick, Mamma, MetaCrawler, ProFusion, Search, VivisimoMetaCrawler, ProFusion, Search, Vivisimo

– Specialized Search EnginesSpecialized Search Engines Help locate specialized subject matter, like info Help locate specialized subject matter, like info

on movies, health, jobs, blogson movies, health, jobs, blogs Examples are Career.com (jobs), Expedia Examples are Career.com (jobs), Expedia

(travel), Internet Movie Database (movies), (travel), Internet Movie Database (movies), Technorati (blogs)Technorati (blogs)

Page 23: Slide 1 - Department of Computer Science and Engineering

2323

The World Wide WebThe World Wide Web

Should you trust information you find Should you trust information you find online?online?

There is no central authority that verifies There is no central authority that verifies all web sitesall web sites

Guidelines to evaluate Web ResourcesGuidelines to evaluate Web Resources– Does the information appear on a Does the information appear on a

professional site maintained by a professional site maintained by a professional organization?professional organization?

– Does the website authority appear to be Does the website authority appear to be legitimate?legitimate?

– Is the website objective, complete, and Is the website objective, complete, and current?current?

Page 24: Slide 1 - Department of Computer Science and Engineering

2424

Email & Other Ways of Email & Other Ways of Communicating over the NetCommunicating over the Net

Email ProgramEmail Program– Enables you to send email by running email Enables you to send email by running email

software on your computer that interacts with an software on your computer that interacts with an email server at your ISPemail server at your ISP

– Incoming mail is stored on the server in an Incoming mail is stored on the server in an electronic mailboxelectronic mailbox

– Upon access, mail is sent to your client’s inboxUpon access, mail is sent to your client’s inbox– Simple Mail Transport Protocol (SMTP) is for Simple Mail Transport Protocol (SMTP) is for

sending, Post Office Protocol v3 (POP3) or Internet sending, Post Office Protocol v3 (POP3) or Internet Message Access Protocol (IMAP) is for retrievingMessage Access Protocol (IMAP) is for retrieving

– Examples: Microsoft’s Outlook Express, Netscape’s Examples: Microsoft’s Outlook Express, Netscape’s Mail, Apple Computer’s Apple Mail, QualComm’s Mail, Apple Computer’s Apple Mail, QualComm’s EudoraEudora

Page 25: Slide 1 - Department of Computer Science and Engineering

2525

Email & Other Ways of Email & Other Ways of Communicating over the NetCommunicating over the Net Web-based EmailWeb-based Email

– You send and receive messages by You send and receive messages by interacting via a browser with a websiteinteracting via a browser with a website

– Advantage: You can easily send and receive Advantage: You can easily send and receive messages while travelingmessages while traveling

– Disadvantage: Not as many features as an Disadvantage: Not as many features as an Email ProgramEmail Program

– Examples: Yahoo! Mail, Hotmail, GMailExamples: Yahoo! Mail, Hotmail, GMail

Page 26: Slide 1 - Department of Computer Science and Engineering

2626

Email & Other Ways of Email & Other Ways of Communicating over the NetCommunicating over the Net ListservListserv

– An email-based discussion groupAn email-based discussion group– Uses an automatic mailing-list server that sends Uses an automatic mailing-list server that sends

email to subscribers on selected topicsemail to subscribers on selected topics

NewsgroupsNewsgroups– A giant electronic discussion boardA giant electronic discussion board– There are thousands of free internet newsgroupsThere are thousands of free internet newsgroups– Usenet is the worldwide public network of servers Usenet is the worldwide public network of servers

on the internet on the internet www.usenet.comwww.usenet.com – To participate you need a newsreaderTo participate you need a newsreader

Page 27: Slide 1 - Department of Computer Science and Engineering

2727

Email & Other Ways of Email & Other Ways of Communicating over the NetCommunicating over the Net Instant MessagingInstant Messaging

– Any user on a given email system can send a Any user on a given email system can send a message and have it pop up instantly on the screen message and have it pop up instantly on the screen of anyone logged into that systemof anyone logged into that system

– Presence – Displays your online status to other Presence – Displays your online status to other usersusers

– Examples: AOL Instant Messenger, MSN Messenger, Examples: AOL Instant Messenger, MSN Messenger, ICQ, AT&T IM Anywhere, Yahoo MessengerICQ, AT&T IM Anywhere, Yahoo Messenger

– Not all IM systems interoperate (work together)Not all IM systems interoperate (work together)– To get it, you:To get it, you:

download the software download the software connect to the internetconnect to the internet register with the serviceregister with the service

Page 28: Slide 1 - Department of Computer Science and Engineering

2828

Email & Other Ways of Email & Other Ways of Communicating over the NetCommunicating over the Net Real-Time Chat (RTC)Real-Time Chat (RTC)

– Participants have a typed discussion while online at Participants have a typed discussion while online at the same timethe same time

– Example: Internet Relay ChatExample: Internet Relay Chat– IM is one-on-one, but RTC has a list of participantsIM is one-on-one, but RTC has a list of participants

Netiquette – appropriate online behaviorNetiquette – appropriate online behavior– Before you ask a question, consult the FAQBefore you ask a question, consult the FAQ– Avoid Avoid flamingflaming– Don’t SHOUT – using all capital lettersDon’t SHOUT – using all capital letters– Be careful with jokesBe careful with jokes– Don’t send huge file attachments unless requestedDon’t send huge file attachments unless requested

Page 29: Slide 1 - Department of Computer Science and Engineering

2929

Email & Other Ways of Email & Other Ways of Communicating over the NetCommunicating over the Net FTP – File Transfer ProtocolFTP – File Transfer Protocol

– A software standard for transferring files between A software standard for transferring files between computers with different Operating Systemscomputers with different Operating Systems Microsoft Windows Microsoft Windows Linux Linux Unix Unix Macintosh OS, and so forth Macintosh OS, and so forth

– You can transfer files from an FTP site on the You can transfer files from an FTP site on the internet to your PCinternet to your PC

– Know your FTP site! Know your FTP site! If the FTP site is offering copyrighted material such as If the FTP site is offering copyrighted material such as

music and movies for free, you are breaking US law if music and movies for free, you are breaking US law if you download files!you download files!

You may also get a virus or spyware on your PC from You may also get a virus or spyware on your PC from themthem

Page 30: Slide 1 - Department of Computer Science and Engineering

3030

Telephony, RSS, Webcasting, Telephony, RSS, Webcasting, Blogs, WikisBlogs, Wikis Internet Telephony (VoIP)Internet Telephony (VoIP)

– Uses the internet to make phone callsUses the internet to make phone calls– Long-distance calls are either very inexpensive or Long-distance calls are either very inexpensive or

freefree With no PC, dial a special phone number to packetize With no PC, dial a special phone number to packetize

your callyour call With a PC that has a sound card, microphone, Internet With a PC that has a sound card, microphone, Internet

connection, and internet telephone software such as connection, and internet telephone software such as Skype, Google Talk or Microsoft NetMeetingSkype, Google Talk or Microsoft NetMeeting

– Currently inferior in quality to normal phone Currently inferior in quality to normal phone connectionsconnections

– Often bundles videoconferencingOften bundles videoconferencing– Providers include: Vonage, Verizon, Skype, etc.Providers include: Vonage, Verizon, Skype, etc.

Page 31: Slide 1 - Department of Computer Science and Engineering

3131

Telephony, RSS, Webcasting, Telephony, RSS, Webcasting, Blogs, WikisBlogs, Wikis

RSS newsreadersRSS newsreaders– Programs or Websites that scour the web and pull together Programs or Websites that scour the web and pull together

“feeds” from several websites to one place“feeds” from several websites to one place BlogBlog

– Short for web log, a diary-style web pageShort for web log, a diary-style web page– Have become popular, both privately and in politicsHave become popular, both privately and in politics

Podcasting / VideocastingPodcasting / Videocasting– Recording internet radio or similar internet audio programsRecording internet radio or similar internet audio programs– Some radio stations webcast their audio programs over the Some radio stations webcast their audio programs over the

internetinternet– Example: iTunes, podcast.net, odeo.com, youtube.com, Google Example: iTunes, podcast.net, odeo.com, youtube.com, Google

VideoVideo WikisWikis

– A website on which authoring and editing can be done by A website on which authoring and editing can be done by anyone at anytime using a simple browser.anyone at anytime using a simple browser.

– Example: www.wikipedia.orgExample: www.wikipedia.org

Page 32: Slide 1 - Department of Computer Science and Engineering

3232

Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & Pharming, Cookies, & SpywareSpyware The internet was founded as a The internet was founded as a

collaborative tool based on trustcollaborative tool based on trust Not everyone on the internet is honestNot everyone on the internet is honest SnoopingSnooping

– Email is not privateEmail is not private Corporate management has the right to view Corporate management has the right to view

employees’ emailemployees’ email Email that travels over the internet may be Email that travels over the internet may be

captured and monitored and read by someone captured and monitored and read by someone elseelse

Not all ISPs protect their customers’ privacyNot all ISPs protect their customers’ privacy

Page 33: Slide 1 - Department of Computer Science and Engineering

3333

Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & Pharming, Cookies, & SpywareSpyware Spam: Electronic Junk MailSpam: Electronic Junk Mail

– Unsolicited email that takes up your time and may Unsolicited email that takes up your time and may carry viruses or spywarecarry viruses or spyware

– Delete it without opening the messageDelete it without opening the message– Never reply to a spam messageNever reply to a spam message– When you sign up for something, don’t give your When you sign up for something, don’t give your

email addressemail address– Use spam filtersUse spam filters– Fight back by reporting new spammers to Fight back by reporting new spammers to

www.abuse.netwww.abuse.net or or www.spamhaus.orgwww.spamhaus.org or or www.rahul.net/falkwww.rahul.net/falk

Page 34: Slide 1 - Department of Computer Science and Engineering

3434

Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & Pharming, Cookies, & SpywareSpyware SpoofingSpoofing

– Using fake email sender names so the message Using fake email sender names so the message appears to be from a different source, so you will appears to be from a different source, so you will trust it.trust it.

– If you don’t know the sender, don’t open it.If you don’t know the sender, don’t open it. PhishingPhishing

– Using trusted institutional names to elicit Using trusted institutional names to elicit confidential informationconfidential information

– Some common schemes look like they are from Some common schemes look like they are from your bank or from eBay and ask you to “update” your bank or from eBay and ask you to “update” your account. your account.

– Don’t do it – the legitimate company already knows Don’t do it – the legitimate company already knows your account information!your account information!

– If you want to update your information, CALL the If you want to update your information, CALL the number in the phone book, not the number in the number in the phone book, not the number in the email!email!

Page 35: Slide 1 - Department of Computer Science and Engineering

3535

Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & Pharming, Cookies, & SpywareSpyware PharmingPharming

– Redirecting you to an imposter web page.Redirecting you to an imposter web page.– Thieves implant malicious software on your PCThieves implant malicious software on your PC– Redirects you to an imposter web page even when Redirects you to an imposter web page even when

you type the correct URL!you type the correct URL!– To foil it, type the URL with https first (for http To foil it, type the URL with https first (for http

secure)secure)

https://www.microsoft.comhttps://www.microsoft.com Use this one with https, Use this one with https, notnot

http://www.microsoft.comhttp://www.microsoft.com Since it has http, it could Since it has http, it could be spoofedbe spoofed

Page 36: Slide 1 - Department of Computer Science and Engineering

3636

Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & Pharming, Cookies, & SpywareSpyware CookiesCookies

– Little text files left on your hard disk by some Little text files left on your hard disk by some websites you visitwebsites you visit

– Can include your log-in name, password, and Can include your log-in name, password, and browser preferencesbrowser preferences

– Can be convenientCan be convenient– But they can be used to gather information about But they can be used to gather information about

you and your browsing habitsyou and your browsing habits ““Third party” cookies: used by advertising companies Third party” cookies: used by advertising companies

to track users across multiple sitesto track users across multiple sites People share machinesPeople share machines Cookie theft & modificationCookie theft & modification

Page 37: Slide 1 - Department of Computer Science and Engineering

3737

Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & Pharming, Cookies, & SpywareSpyware SpywareSpyware

– Applications that download without your Applications that download without your knowledgeknowledge

– They hide on your PC and capture They hide on your PC and capture information about what is on the PC and information about what is on the PC and what you are doingwhat you are doing

– That information is then transmitted to the That information is then transmitted to the spyware master’s website on the internetspyware master’s website on the internet

– Information may be used against you to Information may be used against you to steal your identity, get credit cards in your steal your identity, get credit cards in your name, or for other crimesname, or for other crimes

Page 38: Slide 1 - Department of Computer Science and Engineering

3838

Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & Pharming, Cookies, & SpywareSpyware Spyware (continued)Spyware (continued)

– To prevent spyware, you must install and To prevent spyware, you must install and use “Antispyware software” at all timesuse “Antispyware software” at all times

– Examples: Ad Aware, AntiSpyware, Spybot Examples: Ad Aware, AntiSpyware, Spybot Search & Destroy, Pest Patrol, SpyCatcher, Search & Destroy, Pest Patrol, SpyCatcher, Yahoo toolbar with Anti-SpyYahoo toolbar with Anti-Spy

– Be careful about free and illegal downloads Be careful about free and illegal downloads since they are a source of spywaresince they are a source of spyware

– Don’t say “I agree” when you are Don’t say “I agree” when you are downloading something – read the fine downloading something – read the fine printprint

– Beware of unsolicited downloadsBeware of unsolicited downloads