Overview of the topic.
Clarifications on the two terms: the Internet is a broader network; the World Wide Web is specifically part of it.
The World Wide Web (WWW) is a component of the Internet.
Web addresses typically start with "www."
Definition: A worldwide collection of interconnected computer networks.
Nature: It is a conceptual framework rather than a physical entity.
Infrastructure:
Requires physical hardware: computers, devices, servers.
Service providers facilitate connections between networks and devices.
Definition: Section of the Internet accessible via web browsers.
Content: Contains a vast number of web pages hosted on servers.
Functionality: Displayed through web browsers.
Key Component: URLs designate specific web pages for access.
URLs provide unique addresses within the web domain.
Example of URL analysis for educational purposes via Instagram profile.
Discusses elements like posts, followers, and shared content.
Full Form: Uniform Resource Locators.
Function: Text addresses that identify web pages on the Internet.
Similar in concept to IP addresses but user-friendly.
Example: https://www.instagram.com/havilinternationalschool/reels/
.
Protocol: https
(Hypertext Transfer Protocol Secure)
Components:
Domain Name (e.g., instagram.com)
Path (e.g., /havilinternationalschool/reels/
).
Definition: Rules for transferring data on the web.
HTTP: Primary protocol for transferring web pages; enables smooth connectivity and info exchange.
Ensures encrypted data transmission for privacy and protection.
Uses Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols.
Understand web browsers' functions.
Familiarize with web page elements and structures.
Learn about Domain Name Server (DNS) and its functionality.
Comprehend the retrieval of web pages from servers.
Explore different types of cookies.
Understand the operational flow of cookies.
Software applications for accessing and displaying web content.
Functionalities: Retrieve, display, and manage web pages.
HINT: Reference to mnemonic device (BAN CAR) for easy recall.
Common functions include:
Bookmarks/Favorites.
Multiple tab support.
Navigation tools (back, forward, home).
Cookies management.
Address bar for URL input.
Logs browsing history.
Mechanisms of finding content on the web.
Definition: HyperText Markup Language; the foundational coding language for web content.
Hosting and IP address details.
Functionality: Match domain names (URLs) to corresponding IP addresses, simplifying user navigation.
User enters URL in the browser.
DNS resolves the URL into an IP address.
The browser communicates with the web server using the IP.
HTML files are downloaded and displayed to the user.
Visual summary of data flow and interactions.
Brief explanation of cookies and their purposes in web browsing.
Store user preferences, login information, and manage online shopping carts.
Session Cookies: Temporary cookies deleted when the browser closes.
Persistent Cookies: Remain on the user’s device until they expire or are manually deleted.
Session Cookies:
Temporary; only active during a browsing session.
Example: Allows user to remain logged in on shopping sites.
Persistent Cookies:
Track user activity and preferences across sessions.
Store critical information (e.g., login credentials).
Workflow of cookies when revisiting sites.
Theory behind website requests and their display process.
Authentication flow in web requests and server communications.
Explains the multifaceted functions of web browsers.
Examination of comprehensive functions handled by browsers.
Discusses advanced computing topics, such as blockchain.
Defines digital currency and electronic transactions.
Nature: Invisible; data format exists on databases.
Used as electronic payment.
Comparison to traditional payment systems.
Illustrates typical bank interactions for money transfer.
Demonstrates the role of central banks in transactions.
Concerns:
Confidentiality risks.
Security challenges.
Describes cryptocurrency and its non-centralized nature.
Mention of Elon Musk and his influence on digital currency values.
Explanation of mining and transactional fee processes.
Traditional currencies are regulated; cryptocurrencies are communal.
Defines blockchain and its security applications.
Chain Concept: How transactions are linked to blocks, ensuring data integrity.
Elements: Hash value, timestamp, previous block reference, transaction data.
Discusses why modifications to blockchain are complex, enhancing security against hacking.
Emphasizes network consensus and its role in validating transactions securely.
Overview of cyber threats, prevention strategies, and importance of awareness.
Detailed classifications of attacks, such as Denial of Service and Data Interception.
Definitions and types of malware explaining their functions and impacts on systems.
Specific characteristics of viruses, trojans, worms, spyware, adware, and ransomware.
Comparison between viruses and worms.
Types of phishing strategies and how to safeguard against them.
Explanation of pharming, its implications, and preventive measures.
Case studies exploring risks and phishing scenarios in-depth.
Discusses strategies and tools for enhancing online security defenses.
Benefits of anti-virus software and its impact on maintaining system integrity.
Diverse methods including passwords, biometrics, and two-step verification for user security.
Emphasizing the critical nature of keeping software updated and managing privacy settings.
Describes their function and significance in protecting network security.
Importance of SSL/TLS in protecting online transactions, data integrity, and privacy.
Sample questions focusing on cyber security, firewalls, and data protection mechanisms to prepare students for assessments.