3. .The internet is a globally connected network
system that uses TCP/IP to transmit data via
various types of media. The internet is a
network of global exchanges – including
private, public, business, academic and
government networks – connected by guided,
wireless and fiber-optic technologies.
The terms internet and World Wide Web are
often used interchangeably, but they are not
exactly the same thing; the internet refers to
the global communication system, including
hardware and infrastructure, while the web is
one of the services communicated over the
internet.
4. .WHAT HAPPENED?
The Internet has turned our existence
upside down. It has revolutionized
communications, to the extent that it is
now our preferred medium of everyday
communication. In almost everything we
do, we use the Internet. Ordering a pizza,
buying a television, sharing a moment
with a friend, sending a picture over
instant messaging.
5. .
Before the Internet, if you wanted to keep
up with the news, you had to walk down
to the newsstand when it opened in the
morning and buy a local edition reporting
what had happened the previous day. But
today a click or two is enough to read
your local paper and any news source
from anywhere in the world, updated up to
the minute.
6. .
The Internet itself has been transformed. In its
early days—which from a historical
perspective are still relatively recent—it was a
static network designed to shuttle a small
freight of bytes or a short message between
two terminals; it was a repository of
information where content was published and
maintained only by expert coders. Today,
however, immense quantities of information
are uploaded and downloaded over this
electronic leviathan, and the content is very
much our own, for now we are all
commentators, publishers, and creators.
7. .
In the 1980s and 1990s, the Internet widened
in scope to encompass the IT capabilities of
universities and research centers, and, later
on, public entities, institutions, and private
enterprises from around the world. The
Internet underwent immense growth; it was
no longer a state-controlled project, but the
largest computer network in the world,
comprising over 50,000 sub-networks, 4
million systems, and 70 million users.
8. .
The emergence of web 2.0 in the first
decade of the twenty-first century was
itself a revolution in the short history of
the Internet, fostering the rise of social
media and other interactive, crowd-based
communication tools.
9. .
The Internet was no longer concerned with
information exchange alone: it was a
sophisticated multidisciplinary tool enabling
individuals to create content, communicate
with one another, and even escape reality.
Today, we can send data from one end of
the world to the other in a matter of
seconds, make online presentations, live in
parallel “game worlds,” and use pictures,
video, sound, and text to share our real
lives, our genuine identity. Personal stories
go public; local issues become global.
10. .
The rise of the Internet has sparked a
debate about how online communication
affects social relationships. The Internet
frees us from geographic fetters and
brings us together in topic-based
communities that are not tied down to
any specific place. Ours is a networked,
globalized society connected by new
technologies. The Internet is the tool we
use to interact with one another, and
accordingly poses new challenges to
privacy and security.
11. .
Information technologies have wrought
fundamental change throughout society,
driving it forward from the industrial age
to the networked era. In our world, global
information networks are vital
infrastructure—but in what ways has this
changed human relations? The Internet
has changed business, education,
government, healthcare, and even the
ways in which we interact with our loved
ones—it has become one of the key
drivers of social evolution.
12. .The changes in social communication are
of particular significance. Although
analogue tools still have their place in
some sectors, new technologies are
continuing to gain ground every day,
transforming our communication practices
and possibilities—particularly among
younger people. The Internet has
removed all communication barriers.
Online, the conventional constraints of
space and time disappear and there is a
dizzyingly wide range of communicative
possibilities. The impact of social media
applications has triggered discussion of
the “new communication democracy.”
13. .
The development of the Internet today
is being shaped predominantly by
instant, mobile communications. The
mobile Internet is a fresh revolution.
Comprehensive Internet connectivity
via smartphones and tablets is leading
to an increasingly mobile reality: we
are not tied to any single specific
device, and everything is in the cloud.
15. Keep Personal Information
Professional and Limited
Potential employers or customers
don't need to know your personal
relationship status or your home
address. They do need to know
about your expertise and
professional background, and how to
get in touch with you. You wouldn't
hand purely personal information out
to strangers individually—don't hand
it out to millions of people online.
16. Keep Your Privacy Settings On
Marketers love to know all about you, and
so do hackers. Both can learn a lot from
your browsing and social media usage. But
you can take charge of your information.
As noted by Lifehacker, both web browsers
and mobile operating systems have settings
available to protect your privacy online.
Major websites like Facebook also have
privacy-enhancing settings available.
These settings are sometimes
(deliberately) hard to find because
companies want your personal information
for its marketing value. Make sure you
have enabled these privacy safeguards, and
17. .
These settings are sometimes
(deliberately) hard to find because
companies want your personal
information for its marketing value.
Make sure you have enabled these
privacy safeguards, and keep them
enabled.
18. Practice Safe Browsing
You wouldn't choose to walk through a
dangerous neighborhood—don't visit
dangerous neighborhoods online.
Cybercriminals use lurid content as bait.
They know people are sometimes tempted
by dubious content and may let their guard
down when searching for it. The Internet's
demimonde is filled with hard-to-see
pitfalls, where one careless click could
expose personal data or infect your device
with malware. By resisting the urge, you
don't even give the hackers a chance.
19. Make Sure Your Internet Connection is
Secure
When you go online in a public place, for
example by using a public Wi-Fi
connection, PCMag notes you have no
direct control over its security. Corporate
cybersecurity experts worry about
"endpoints"—the places where a private
network connects to the outside world.
Your vulnerable endpoint is your local
Internet connection. Make sure your device
is secure, and when in doubt, wait for a
better time before providing information
such as your bank account number.
20. Be Careful What You Download
A top goal of cybercriminals is to trick you
into downloading malware—programs or
apps that carry malware or try to steal
information. This malware can be disguised
as an app: anything from a popular game to
something that checks traffic or the
weather. As PCWorld advises, don't
download apps that look suspicious or come
from a site you don't trust.
21. Choose Strong Passwords
Passwords are one of the biggest weak
spots in the whole Internet security
structure, but there's currently no way
around them. And the problem with
passwords is that people tend to choose
easy ones to remember (such as
"password" and "123456"), which are also
easy for cyber thieves to guess. Select
strong passwords that are harder for
cybercriminals to demystify.
22. .
Password manager software can help you
to manage multiple passwords so that you
don't forget them. A strong password is
one that is unique and complex—at least
15 characters long, mixing letters,
numbers and special characters.
23. .
Make Online Purchases From Secure Sites
Any time you make a purchase online, you
need to provide credit card or bank
account information—just what
cybercriminals are most eager to get their
hands on. Only supply this information to
sites that provide secure, encrypted
connections. As Boston Universitynotes,
you can identify secure sites by looking for
an address that starts with https: (the S
stands for secure) rather than
simply http: They may also be marked by a
padlock icon next to the address bar.
24. .
Be Careful What You Post
The Internet does not have a delete key,
as that young candidate in New
Hampshire found out. Any comment or
image you post online may stay online
forever because removing the original
(say, from Twitter) does not remove any
copies that other people made. There is
no way for you to "take back" a remark
you wish you hadn't made, or get rid of
that embarrassing selfie you took at a
party. Don't put anything online that you
wouldn't want your mom or a prospective
employer to see.
25. .
Be Careful Who You Meet Online
People you meet online are not always
who they claim to be. Indeed, they may
not even be real. As InfoWorld reports,
fake social media profiles are a popular
way for hackers to cozy up to unwary Web
users and pick their cyber pockets. Be as
cautious and sensible in your online social
life as you are in your in-person social
life.
26. .
Keep Your Antivirus Program Up To Date
Internet security software cannot protect
against every threat, but it will detect and
remove most malware—though you should
make sure it's to date. Be sure to stay
current with your operating system's
updates and updates to applications you
use. They provide a vital layer of security.
Keep these 10 basic Internet safety rules
in mind and you'll avoid many of the nasty
surprises that lurk online for the careless.