Please enable JavaScript.
Coggle requires JavaScript to display documents.
INTERNET SECURITY AND RESPONSABILITY ( 1965 USA Department of defense)…
INTERNET SECURITY AND RESPONSABILITY ( 1965 USA Department of defense)
HOW THE INTERNET WORKS
Contract with an Internet service provider
ISP
(Movistar, Jazztel, Vodafone...) It assings an address IP to our computer Each web page also assigned an IP
ROUTER-BROWSER
: We type the address of a page (URL), The information starts to travel in the form of
packets
DNS SERVER
assing a name to each
IP
address
Communication among computers follows a set of rules called a
PROTOCOL
DNS Server
sends the request to the server that hosts the web page we want to visit
The server send us the information packets
The packets reach our computer and are reassembled. The page is displayed in browser
TCPAP
(packets of information)
HTTP
:
hypertext transfer protocols
Servers use this protocols to send and receive documents
THE INTERNET OF THINGS
(in the future)
Interact with everyday objects connected to the internet eliminating
Distance
Time
We must be
DIGITALLY REPONSIBLE
Own
safety
Respect
for others
The
INTERNET
is a network of thousands of computers and devices around the world connected by
Cooper wires
Fibre optics
Wireless connections
Other methods
Internet basics
BROWSER
: Programme that displays the content of web pages
Internet explorer
Google Chrome
Mozilla Firefox
Safari
A
SEARCH ENGNE
Computer system that indexes files stored on websites. It is updated by continually crawling the Internet
Google
Bing
Yahoo
URL
: Full address of a web page. It appears in the
address bar
in the browser, l.e... www.iesja.es
SERVER
: Computer prepared to provide services simltaneously to lots of users
PERSONAL SAFETY AND MACHINE SECURITY
THREATS
To the machine To individuals
Identify them
Phising
(bank details, passwords, etc)
Loss of privacy
Damage to our identify or image
Ciberbulllyng
Viruses and trojans
: ANTIVIRUS
Spyware
: It tries to obtain data from users: FIREWALL (controls and fliters the incoming and outgoing traffic of a network)
Black Hackers
White Hackers
: They help to know how secure their systems are
Cryptography
Passwords