What is the Internet?
Basic Function of Internet
Computer Essentials
Internet Safety
Hand Coded HTML page
In essence, the the Internet is a computer network made up of thousands of networks worldwide.
The Internet is transitory, ever changing, reshaping and remolding itself.
The Internet. The single largest telecommunications system
ever conceived by humankind.
There are four basic building blocks to the Internet.
1. Hosts
2. Routers
3. Clients
4. Connections
In most case your computer falls under the "client" category. A router is a special device. basically routers sit at key points on the Internet and act like traffic cops at an intersection of hundreds of streets. In most cases, your data will travel through several routers before reaching its ultimate destination.
All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.
Connections is a term to describe how your data can go from one point to another. As an end user, you only concern is that the connection is good. There are different ways of connecting technologies: dial up phone lines, Fiber optics, ISDN...etc.
DNS (Domain Name Service). DNS servers translate symbolic machine names (such as www.oneonta.edu) into numerical IP addresses. For example, www.oneonat.edu is translated by DNS to 137.141.15.33. Symbolic names are a great convenience because they are easier to remember than numerical IP addresses.
1. World Wide Web (WWW)
Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. The World Wide Web provides a single interface for accessing all these protocols and creates a convenient and user-friendly environment. Because of the Web's ability to work with multimedia and advanced programming languages, the Web is the most popular component of the Internet.
In addition, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. The operation of the Web relies primarily on hypertext as its means of information retrieval.
A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.
HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. For example, visual formatting features are now often separated from the HTML document and placed into Cascading Style Sheets (CSS). This has several advantages, including the fact that an external style sheet can centrally control the formatting of multiple documents.
2. Email
Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.
3. File Transfer Protocol (FTP)
This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account.
4. E-MAIL DISCUSSION GROUPS
One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.
5. CHAT & INSTANT MESSAGING
Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the "chat room" to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.
Hardware: The computer (hard drive, processor, disk drives, on/off buttons), monitor, keyboard, mouse, printer.
Software: Computer programs
Internet Safety
Internet users: statistics
Safety Tips for the Internet: From Logging On to Logging Off
For proper Internet and computer safety, users should follow safe practices at every stage of computer use – from the moment the computer is turned on until it is turned off.
Getting Online
Internet safety begins with a safe computer and a safe way to access the Internet.
- Install protection software on all computers that will access the Internet, including spam blockers, anti-virus programs, pop-up blockers and firewalls.
- Create different profiles on an Internet-connected computer to protect personal information for each user.
- Choose secure passwords that are a combination of letters and numbers, and do not share passwords with unauthorized users.
- Avoid using the same passwords for multiple accounts.
- Set parental controls and filters if available to screen questionable Internet content.
Surfing the Internet
- Only visit reputable Web sites rather than personal pages from unknown individuals.
- Use only one credit card for online shopping to avoid exposing multiple cards to fraud or theft.
- Monitor children’s Internet usage including the sites they visit and how long they are online.
E-mail, Chatting and Messaging
- Report and delete any spam messages.
- Avoid e-mail scams that ask for money, credit card information or other personal details.
- Do not give out e-mail addresses indiscriminately.
- Do not open e-mails with unexpected attachments or from unknown senders.
- Choose an anonymous username if possible to avoid identifying details such as age, school, gender or location.
- Observe proper online etiquette when chatting and report offensive behavior to chat moderators or other authority figures.
- Do not
send pictures to unknown individuals.
- Don't give out personal information even you think you know the individual.
- Properly log off accounts when using a public or shared computer to avoid unintentionally giving another person access.
- Never agree to meet anyone in person whom you’ve only met online.
Downloads
- Only download from reputable, authorized sites.
- Run a virus inspection program prior to installing or using any downloaded files.
- Limit the amount of downloads to minimize potential risks.
- Install and uninstall programs properly to keep the computer running smoothly and efficiently.
- Don't download anything unless you are sure of the source.
Your Own Space
With many social networking sites (such as Facebook) becoming popular online hangouts, understanding security tips for personal online space is critical to protecting personal information.
- Choose a username without identifying details.
- Limit personal information in a profile and avoid too many details that can help someone uncover an identity.
- Do not use a child’s full name for a domain or user page.
- Opt to keep a profile or other personal information private if possible.
- Avoid posting questionable material or pictures that could be seen by employers or other authority figures.
- Report offensive behavior and vandalism to the appropriate authorities.
- Do not put a personal Web address in an e-mail signature that may be forwarded to many people.
- Don't pass along hoax email (.These types of emails can create problems with servers and clog up our Internet space and slow things down. Use the links below to verify messages that you get to see if they are in fact true. Internet Hoaxes.)
Do not share passwords.
Do not assume everything on the Internet is fact. Check your resource.
Do not upload or download illegal software or copyrighted music or movies... it’s a federal crime.
Credit Card and Identity Theft Protection
Financial Identity Theft – Financial identity theft is the crime of stealing personal identifying information, such as a bank account number, for the purpose of using that information fraudulently.
Criminal Identity Theft – Criminal identity theft occurs when an imposter, posing as another person, provides law enforcement with another person’s identifying information during an investigation or arrest to avoid prosecution.
Identity Cloning – Identity cloning is a type of fraud in which the criminal assumes your entire identity and life, and is able to live as the victim, get married, work, pay taxes and possibly commit crimes.
Business or Commercial Identity Theft – Business or commercial identity theft is the misappropriation of the business or commercial enterprise, with the objective of using the financial status of a business to open financial accounts, obtain credit or transact unauthorized business deals.
Identity Theft Laws and Fraud
- Identity Theft and Identity Fraud: Basic description of identity fraud, common ways a criminal performs identity theft crimes, and examples and information on how to prevent yourself from becoming a victim.
- Advice on Identity Theft: List of tips to help people using checks, credit cards, and other personal items from becoming a victim of identity theft.
- Minimize Your Risk of Identity Cloning: Precautions people can take to avoid identity theft crimes and tips to reveal if you are at risk.
- Suspicious E-mails and Identity Theft: Customer warnings issued by the Internal Revenue Service (IRS), warning consumers about criminals attempting to gain access to their financial information.
- Testimony to Combat Identity Theft: Oral and written testimony by Ms. Linda Foley regarding the crime of identity theft and the senate bill of 1742 and 1399 and its association with identity theft.
- Driver License Fraud Information: The Florida Department of Highway Safety and Motor vehicles informs drivers about identity theft and driver license fraud and information on how victims can seek help.
- Identity Theft Information: Tips on how to protect yourself from becoming a victim of identity theft, common ways for thieves to obtain personal information, warning signs that you may become a victim, and what to do if someone steals your identifying information.
- Data Security for Businesses: Compilation of documents and articles for businesses on how to keep their information secure and free of fraudulent activities.
- Online Brokerage Accounts: Learn how identity theft can happen and how to protect yourself online by keeping your personal information private.
- Safeguard Your Personal Information: Advice from the United States Postal Service on how identity theft or fraud can occur through tampering with packages or mail and how to avoid becoming a victim. [PDF]
- Avoiding Identity Theft: List of tips from the Department of Business and Industry on how to prevent becoming the target of an identity theft or fraudulent crime.
- Identity Theft Precautions: Article discussing the various ways someone can avoid identity theft at home, in the car, and when out in public.
- Eye on Identity Theft: Description on how identity theft is performed, the latest threats according to the Anti-fraud Call Center, and how the average citizen can stay safe.
- Identity Theft Laws: List of laws from the Washington State Legislature that focus on important laws regarding identity theft and fraud.
- Consumer Privacy and Identity Theft: Article from the Department of Consumer Protection that states skimmers and scanners used to obtain credit card information are illegal and victims have the right to sue for damages, effective October 2009.
- Identity Theft in the Workplace: Tips for employees on what precautionary steps they can take at work to avoid identity theft and stolen financial information.
- Internet Fraud: Information from the Federal Bureau of Investigation (FBI) on how to avoid various types of Internet fraud, such as auction fraud, non-delivery of merchandise, credit-card fraud, Nigerian letter (“419”) fraud, investment fraud and business fraud.
- Federal Laws that Protect Against Fraud: List of federal anti-theft laws from the Federal Deposit Insurance Corporation.
- Internet Fraud Variations: Advice from the University of Oklahoma Police Department on how to avoid fraudulent activities, such as credit card fraud, investment fraud, and other scams.
- Identity Theft Resource Center: Collection of informational articles and resources for victims of identity theft.
Identity Theft Organizations and Help Groups
- Identity Theft Assistance Center: Victims of identity theft can obtain assistance from the ITAC, by contacting financial institutions and the three credit bureaus.
- Government Information Technology Agency: Here you will find claim form links and credit report resources.
- On Guard Online: Articles on how to avoid scams, secure your computer, protect your kids online, and prevent being part of an identity theft scam.
- Social Security Online: Learn about the problems that identity theft can cause when someone steals your social security number and what victims can do to regain their personal information.
- Office of the Comptroller of the Currency: Consumer fraud tips, including the essential steps required to fight back against fraud.
- United States Secret Service: Investigation of credit card fraud, identity cloning, bank fraud, passport fraud, and other types of identity theft crimes.
- Identity Theft Program: Learn what it may be like to become the victim of identity theft fraud and review victim worksheets and other resources.
- Identity Theft Victim Kit: Online kit from the Attorney General Steve Carter that provides step-by-step instructions on how to resolve your identity theft case. [PDF]
- Identity Theft Victim Checklist: Review the warning signs that you may be at risk for identity theft and learn the steps required to clear your good name with creditors.
- Identity Theft and Internet Safety: Article discussing the risks, victim information, and ways to reduce the risk of becoming an identity theft victim from Internet scammers.
Online Couponing and Shopping - Basic Consumer Safety
Before starting an online transaction, take time to read the following consumer safety tips. While there are opportunities for a deal around every corner, shoppers need to be prepared. For more information, check out any one of the included resources. A little online shopping savvy goes a long way.
Know Your Merchant
Familiarize yourself with the name and reputation of any online business before making a purchase. If you’ve never dealt with a company before, search for Internet news sources, rating services, or directories to learn more. Even a simple online search could reveal information about the company, its policies, or specific customer experiences.
The Better Business Bureau: Use the search feature to read reviews, based on customer experiences with a business or charity. Search by business name, type of business or website address.
Be a Cautious Consumer: This 2009 Consumer Reports article mentions being cautious about online merchants.
Tips for Finding Out if a Website is Secure: This information shows consumers how to figure out whether a website is secure, along with other tips for online shoppers.
Protect Your Privacy
It’s worth taking a look at the privacy policy posted on a company’s website. How much of your information are they collecting? Do they plan to sell or share it with others? You should be comfortable with providing information about yourself and the way the information will be used before continuing with your purchase. TRUSTe and BBBOnLine icons on a website demonstrate a company’s commitment to these privacy enforcement organizations. Cautious consumers think twice before providing any personal information, including a social security number, that is unnecessary to the purchase.
Cyber Security Tips for Shopping Safely Online: The United States Computer Emergency Readiness Team provides information on how consumers can protect their bank accounts and their privacy.
Keep Your Private Information to Yourself: This list of tips includes being anonymous online, being aware of cookies, and who could be watching the emails you are sending.
Website Privacy: TRUSTe put together information about how to control the amount of privacy you have on websites and with online merchants. It also explains the public and private distinction when it comes to information sharing.
Get the Details
Reputable companies provide customers with clear information on their policies and contact information. Search for the company’s shipping information, including when packages are shipped, and the fees associated with shipping and handling. Check for return policies or warranties offered by the company or the manufacturer. Finally, make sure you have the company’s contact information. Whether it be an email address or a phone number, you need a way to communicate with the company about your purchase.
Signs of Online Fraud: Be cautious about websites offering opportunities that seem too good to be true.
Tips for Avoiding Internet Fraud: The FBI lists its top suggestions for protecting yourself from all types of fraud including: non-delivery of merchandise, credit card issues, and even online auctions.
Spotting Fake URLs in Fraudulent Emails and Websites: Yale University offers a step by step guide for determining whether a certain web address or email is suspicious or fake.
Use a Credit Card and Safeguard Your Password
Did you know that using your credit card provides you with some protection for purchases made online? Both federal law and your credit card agreement state that if an unauthorized purchase is made with the card, your liability can only be up to $50. Search the website for evidence of strong security technology. The information could be posted in the company’s policy page or with an icon showing something like a key or padlock. Keep your password safe and don’t share it with anyone else.
Safeguarding Your Password: The Department of Computer Science at the University of Maryland gives several ideas for keeping a password safe, including good and bad ideas for passwords.
Safeguarding Your Identity and Password: James Madison University offers several tricks for coming up with a strong password that you can always remember. The article also discusses when and how to change passwords.
Protection for Your Debit Card Purchases: This site features a list of the Electronic Fund Transfer Act (EFTA) and Regulation E that discuss protection for unauthorized purchases or ATM withdrawals.
Keep Good Records
Print or save a copy of any records involving your online purchases. This gives you the ability to keep track of all the important details of your transaction. You can check on the shipping dates and fees, or the specific amount charged to your credit card. This is also useful if at any point you need to return a product for a refund.
Online Shopping, Printing out Pictures and Receipts: The Harvard Business Review shows how consumers’ expectations of what they bought are attached to printing out a receipt with a picture.
Avoiding Unhappy Returns: The State of Michigan’s Attorney General explains how a receipt can make it easier to return unwanted items purchased online.
An Explanation of the Digital Receipt: Raymond R. Burke explains how digital receipts make life easier for consumers. (PDF)
Miscellaneous Online Safety:
FDIC: Online Banking, Bill Paying and Shopping: In addition to providing tips for online shopping, this article talks about various things to be aware of when banking online and downloading software.
Avoiding Problems When Shopping Online: The US government put together a list of smart shopping tips for consumers looking for a deal online.
Online Safety is a Personal Priority for Americans: A research collaboration between the National Cyber Security Alliance and the Anti-Phishing Working Group produces information about American’s opinions on their own security, or lack thereof.
Tired of Getting Unsolicited Commercial Emails?: The Coalition Against Unsolicited Commercial Email provides news regarding what you can do about unsolicited emails along with other various articles on a variety of online security precautions to consider.
Security Awareness Tip of the Day: Check this site daily to learn more about Internet security. Tips and topics range from protecting a computer to emails with suspicious content.
Mass Marketing Fraud: The Department of Justice presents details about the different types of Internet and email fraud. It also explains how the Department of Justice is working to enforce the laws in these situations.
Holiday Shopping Tips: While the Internet Crime Complaint Center created these tips for the surge of online shopping during the holidays, this information is valid at all times.
Steps to Report Identity Theft: The National Consumers League’s Internet Fraud Watch provides a step by step list of actions necessary to report identity theft.
Your Rights as a Consumer: The National Archives for the United Kingdom features an easy to read and understand explanation of your rights as a consumer.
Online Safety Tips and Volunteer Opportunities: Working to Halt Online Abuse (WHO@) lists out several different ways to stay safe online. This is not just limited to shopping. It includes tips for participating in forums, avoiding conflict, and being careful with personal information.
information source: The Internet & http://safety.lovetoknow.com/Safety_Tips_for_the_Internet#
http://merchantwarehouse.com/credit-card-and-identity-theft-protection
http://coupons.answers.com/guide/13892702/Online-Couponing-and-Shopping---Basic-Consumer-Safety.html