Monday, June 15, 2020

Internet Terms Essay ( Example )

Internet Terms Essay Table of Contents1 Introduction2 Internet3 Web Browser4 URL5 WIFI6 Network7 Firewalls8 Email / Email Spam 9 Phishing 10 Malware11 Router12 Blogs13 Cloud Computing14 Conclusion15 References Introduction The twenty-first century observed the information and computer revolution; empowering people to have instant communication and permitting them in carrying out activities using computers. The use of the computer is not limited to a single or specific industry and its use would be seen in all the industries or sectors. Presently, we are living in a world wherein nearly everyone has heard about computer technology and over sixty percent of people have information on its usage. We can now find laptops or computers in shops, homes, educational institutions, ticket counters, and so on (Daily Alert, 2013). It is important to have an understanding of some important terms used in the field of computer technology. This essay will provide an understanding of the various terms involving the Internet such as, web browser, URL, Wi-Fi, network, firewalls, email, phishing, malware, and more. Internet The internet, in simple terms, occasionally called as ‘Net,’ is a global computer network system a network system wherein users on one PC could, if they have authorization, get data from any other PC (and sometimes directly talk to users of various other PCs). The concept of internet got introduced in the year 1969 by the U.S. government’s ARPAAdvanced Research Projects Agency and was initially called as the ARPANet. The internet physically uses a part of the total resources from the presently prevailing telecommunication systems. In fact, what makes a technical level of distinction of the internet is about using the various sets of conventions known as Transmission Control Protocol/Internet Protocol or TCP/IP. The most broadly used segments of the internet are the ‘WWW’World Wide Web which is also known as the ‘Web.’ The remarkable aspect of the internet is the hypertext, which is a method of immediate cross-referencing (Search Win Deve lopment, 2014). Web Browser One of the largest software being made is that of the web browser. It is software which is unique. It would be used for getting online accessibility for several electronic exchange services like e-learning, e-commerce, e-banking, e-mail, and so on. Hackers have an understanding that browsers could be identified on all tablets, smart phone, computers, and so on (Serrhini, 2013). The browser is usually an operator’s window to the outside world, offering them with an interface to conduct an extensive level of activities such as professional business, personal financial management, social networking, shopping and correspondence through email (Louw et al., 2008). Almost all the browsers have their disabled or enabled features which state their working nature about executing the good ones and putting a stop to the harmful ones. Several users are, however, not willing to set up and use the features accurately for promoting safety since several of them do not even still understand the real concepts of security (Serrhini, 2013). URL Websites would be located by the addresses shown on the wwwWorld Wide Web. Such types of addresses could be called Uniform Resource Locators or URLs. Each website has a unique URL allocated to it. Hence, the web services and searchers could effortlessly and quickly find them. There are many data which one could gather from a basic URL, inclusive of the following: the type of server wherein the website would be hosted; the type of organization wherein the website would be categorized; where in the world is the website situated; and the names on the website directories. By doing a careful review of the various parts of a website URL, one could rapidly gather some useful data. Whats more, by just removing certain sections of the URL, one could have a better understanding of the website compared to what would be accessed publicly (Boswell, 2017). WIFI Wi-Fi is considered as a system of devices which are wirelessly linked and which makes use of the radio waves, permitting linkages between the various devices without the huge costs of complicated cables or without requiring them to face each other. During the recent years, LANs or Wireless Local Area Networks have attained a great measure of growth. When compared to the several technologies of wireless LANs, Wi-Fi, the technology of the wireless LAN that is IEEE 802.11b based, could be considered as the technology that is the main and the most outstanding (Vandana, 2006). Wi-Fi roaming provides significant business benefits for the operators. In today’s world, users expect that Wi-Fi would be accessed when they need it and wherever they travel to (Mohapatra et al., 2014). The technology of Wi-Fi is an ideal method for mobile-phone operators for linking to the internet. The ever-growing demand for devices that are Wi-Fi-empowered and the expanding amount of Wi-Fi systems ensur es that this pattern would be continued later also (Robert et al., 2008). Network A network consists of peripherals, network devices, mainframes, servers, computers, or other types of devices which get linked to each other for information sharing. A good illustration of a network would be the internet that links several millions of people across the world (Computer Hope, 2017). On a network, computers might be linked with infrared light beams, satellites, radio waves, telephone lines or cables. The two common  kinds of  networks are Wide Area  NetworkWAN and Local Area  Network—LAN (Winkelman, 2013). Firewalls The firewall is usually an intermediate framework of the protected inner networks and the not much protected outer networks. It protects corporate systems from hackers, attackers, and unintentional accessibility into the corporate network systems. The basic varieties of firewalls are stateful inspectors, proxy servers, and screening routers (Desai et al., 2002). The firewall could confirm both hardware and software appliances. Further, there are various kinds of situations wherein a firewall could start from a basic packet filter to various firewalls. Choosing of firewalls is exceptionally alluring. They would be available in all capacities, shapes, and sizes. They would be designed according to the needs of the customer. The type of firewall being used for installation depends on the size, management, and protection of the system. Before selecting a design on the firewall, organizations need to have an exact understanding of the risk or threat (Dandamudi and Eltaeib, 2015). Email / Email Spam Email is known as electronic mail. The word ‘email’ is being used when people make use of the technology (or PCs) for sending and getting correspondence starting from one PC to the next one. The receiving and sending of correspondences are not restricted to words. One could use email for sharing website addresses, poems or photographs which one would like to share with other people (CEFLS, 2016). The email spam would target single users using direct mail messages. The list of email spam is usually made by searching websites for getting addresses, stealing lists of internet mails, or scanning of postings in Usenet. Normally, email spam would cost huge money to the users. Any person who has a phone service measured – would receive or read the mail when the meter runs. Hence, a specific offensive variation in email spam is about sending of spam to private or public mailing records (Mueller, n. d.). Phishing Phishing is a conspicuous method of making an end-client to show his/her information or delicate facts to an online hacker, like, credit accounts or password, other financial information, or data which are sensitive. When a famous social website’s fake login page, for instance, Yahoo, Facebook, online payment processors and auction sites are being sent to inattentive or incautious users by a hacker via emails or pages of websites asking for the response, then it marks the start of an attack. Such websites or messages would be created to look like the real website, making it practically inconceivable to the victim to understand the difference. An email might seem to originate from the IT services support or system administrator, which requests that the user carries out a few activities, such as, ‘you are soon going to surpass your capacity limit, please click here to stay active’. When the user might click on the link or give the required data, the attacker would u se that data for hacking into the user’s system or an account (Yeboah-Boateng et al., 2002). Malware Software that is dreadful is known as the malware. The malware is intended to harm the computer networks without the owner’s knowledge. Utilizing the technique and system development is posturing enormous difficulty for researchers in the industry and in academics. Several programs of the malware are complex and large. Hence, one cannot in any way, have an understanding of each detail (Verma et al., 2013). The malware made by the attackers is metamorphic and polymorphic, which could change the code as they proliferate. In addition, the volume and diversity of their variations seriously erode the efficiency of conventional defenses that commonly make use of methods based on signatures and cannot find the malignant executables which were not known earlier (Gandotra and Bansal, 2014). Giving education to the users of the internet on malware and the exact usage of the anti-malware apparatus are important measures in safeguarding the online buyers’ identity against the vario us malware strikes (Verma et al., 2013). Router A router in technical terms is a gateway  device of Layer 3 networks, implying that it links two or more than two of the networks and in the OSI model, the router works at the network layer. Routers have a CPU or processor, various types of I/O or input-output interfaces and digital memory. Routers work as computers having a particular aim, one which does not need a display or keyboard. The memory of the router would store a fixed O/S or operating system. By maintaining the information on the configuration in the memory’s segment known as the routing table, the routers can filter the outgoing and incoming traffic by the addresses of the receivers and the senders. Much before when the home networking systems had become famous, routers were found only in schools and businesses. Routers had become a common consumer usage when the households started accumulating several PCs and tried to share the internet connection available at home (Mitchell, 2017). Blogs During the recent years, interest in blogging and blogs has expanded much (Olof Larsson and Hrastinski, 2011). Even when blogging is stimulating the interest of business owners, academic researchers, youth, and mainstream media, just a small amount of the users of the internet end up reading blogs and several of them do not even have an understanding of what the term implies (Boyd, 2006). Blogs could be stated as somewhat easily manageable personal websites having their contents being shown in a backward chronological order. Bloggers are agenda-setters that could be influential. For example, blogs are found to have made its effect on political media coverage and for promoting interaction among organizations and people. It could be stated that blogging as a form of human activity and blog as a type of negotiated personal form of expression is important to academics from a diverse range of scientific subjects (Olof Larsson and Hrastinski, 2011). Cloud Computing ‘Cloud Computing’ is another new model for resource hosting and for providing services to customers. ‘Cloud Computing’ offers an on-request and easy access to a shared and centralized pool of resources for computing that could be installed by using few management costs and with greater effectiveness. ‘Cloud Computing’ is a term that evolved from the usual practice of portraying the internet as a cloud internet in various illustrated diagrams. The suppliers of ‘Cloud Computing’ rely on the internet as the medium for intermediary exchanges on delivering the resources of information technology to their customers. By making use of ‘Cloud Computing’, customers could have direct access to resources via the internet, from anywhere, or at any time by utilizing any of the internet gadgets, and without having to worry about any physical or technical issues. It is a comprehensive panacea wherein all the resources of computing, suc h as storage, networking, software, hardware, etc., are given quickly to the customers (El-Sofany et al., 2013). Conclusion It could be said that the computer and the internet  language could be confounding and overwhelming. Indeed, even the hippest users of the computer and internet might sometimes need to refer to the several names, colloquialisms, and abbreviations for having a clue. This essay consisting of various terms, such as the internet, web browser, URL, Wi-Fi, network, firewalls, email, phishing, malware, cloud computing, blogs, router, and so on would enable you to understand these terms and help you to have an improved understanding of the world of computers and the internet. References Boswell, W. (2017). What Is a URL? Definition of Uniform Resource Locators. Retrieved December 7, 2017, from  https://www.lifewire.com/what-is-url-3481855 Boyd, D. (2006). A Blogger’s Blog: Exploring the Definition of a Medium. Reconstruction, 6(4), 26-32. CEFLS. (2016). Email Basics Lesson 1: Understanding What Email Is. Retrieved December 7, 2017, from  Online Computer Hope. (2017). Network. Retrieved December 7, 2017, from  https://www.computerhope.com/jargon/n/network.htm Daily Alert. (2013). Importance of Computers. Daily Alert. Retrieved December 7, 2017, from  http://mydailyalerts.com/importance-computers Dandamudi, S., Eltaeib, T. (2015). Firewalls Implementation in Computer Networks and Their Role in Network Security. Journal of Multidisciplinary Engineering Science and Technology (JMEST), (2)3, 408-411. Desai, M.S., Richards, T.C., Embse, T. (2002). System insecurity – firewalls.  Information  Ã‚  Management Computer Security, 10(3), 135-139. El-Sofany, H.F., Tayeb, A.A., Alghatani, K., El-Seoud, K. (2013). The Impact of Cloud Computing Technologies in E-learning. iJET, 8(1), ICL2012, 37-43. Gandotra, E., Bansal, D., Sofat, S. (2014). Malware Analysis and Classification: A Survey.  Journal of Information Security,  5(2), 56-64. Louw, M.T., Lim, J.S., Venkatakrishnan, V. N. (2008). Enhancing web browser security against malware extensions. J Comput Virol, 4(1), 179–195. Meeting Tomorrow. (2017). Web/Internet Dictionaries Glossaries. Retrieved December 7, 2017, from  https://meetingtomorrow.com/content-library/web-internet-dictionaries-glossaries Mitchell, Bradley. (2017). â€Å"What Is a Router for Computer Networks?† Lifewire, Retrieved December 7, 2017, from  https://www.lifewire.com/how-routers-work-816456 Mohapatra, S.K., Choudhury, R.R., Das, P. (2014). The future directions in evolving WIFI: Technologies, applications and services. International Journal of Next-Generation Networks (IJNGN), 6(3), 13-22. Mueller, S. H. (n. d.). What is spam? Retrieved December 7, 2017, from  http://spam.abuse.net/overview/whatisspam.shtml Olof L.A., Hrastinski, S. (2011). Blogs and Blogging: Current Trends and Future Directions.  First Mind, 16(3-7), 11-15. Robert, R., Manulis, M., De V. F., Leroy, D., Jost, J., Koeune, F., Ker, C., Jean M. D., Poulleu, Y., Bonaventure, O., Quisquatter, J.J. (2008). WiFi Roaming: Legal Implications and Security Constraints. International Journal of Law and Information Technology, 16(3), 205–241. Search Win Development (2014). Internet. Retrieved December 7, 2017, from  http://searchwindevelopment.techtarget.com/definition/Internet Serrhini, M. (2013). Web Browsers Security Web-Lab. International Journal of Online  Engineering, 9(3), 42-48. Vandana, W. (2006). Wi-Fi Technology: Security Issues.  Rivier Academic Journal, 2(2), 17-21. Verma, A., Rao, M.S., Gupta, A.K., Jeberson, W., Singh, V. (2013). A Literature Review on Malware and its Analysis. International Journal of Current Research and Review, 5(16), 71-82. Winkelman, R. (2013). What is a Network? Florida Department of Education. Retrieved December 7, 2017, from  https://fcit.usf.edu/network/chap1/chap1.htm Yeboah-Boateng, E.O., Amanor, P.M. (2014). Phishing, SMiShing Vishing: An Assessment of Threats against Mobile Devices. Journal of Emerging Trends in Computing and Information Sciences, (5)4, 297-307. View or Download this full document in (.docx) format. --> Open Full Document Open full document and source list OR Order A Custom Written Essay Order a one-of-a-kind custom essay on this topic