SlideShare a Scribd company logo
1 of 12
Download to read offline
Network, Intranet & Internet
At the end of the lesson, students should able to:
• Define what is Network, Intranet & Internet.
• Explain how Network, Intranet & Internet works.
• Define what Is Web Browser.
•Understand what is World Wide Web.
• Explain how Web Browser works and how to find
information.
• Define and Explain how E-mail Works.
• Know how to apply Security & Privacy when surfing.
Network
   Collection of hardware, interconnected
    by communication channel that allows
    us to share resources & information
How Network Works



  Computer     Network Cable – (RJ45)




 Network Hub
                       Server
Intranet & How It Works
   Secure Connection of computers
    using Internet Protocol (IP) to share
    resources within an Organization.

                            Resources are shared in
                            a server.
                            User can access within
                            the organization network
                            and cannot be access
                            outside organization
                            network.
Internet
 Internet is an interconnected computer
  networks that use standard Internet
  Protocol Suite (TCP/IP).
 It connects billions of users that consists of
  academic, business, private or government
  networks.
How Internet Works
                  CLIENT
                                     WEB SERVER                                OTHER
  MULTIPLE




                  SERVER
                                                                               SERVER
  OF:




                                     THE INTERNET



                                            Modem        Broadban      3G Network
                                                         d
MULTIPLE




       INTRANET


                           Router-
OF:




                           Modem

                                                    PC        Laptop       I Pad 2
World Wide Web
 System of information distribution
  using the Internet.
 Linked document written based on
  HTML (Hyper Text Markup Language)
 Contains Graphic, Audio, Video, etc.
 Navigation Links: allows user
  interaction with the web.
 Data transfer uses HTTP (Hyper Text
  Transfer Protocol)
Web Browser
 Application software for
  retrieving, presenting and surfing
  information on the internet.
 It access the World Wide Web using
  URL (Uniform Resource Identifier)
  example : www.yahoo.com.
 Example of Web Browser:
Internet Explorer
                                       HOME            TOOLS
                ENTER URL   NEW TAB
                  HERE
 MENU
  BAR




FAVOURITE
    S
   BAR




 SEARCH
   BOX




                                             VIEW
                                      FAVOURITES, FEEDS &
Finding Information on the net
   Using Search Engine
    ◦ www.google.com
    ◦ www.yahoo.com
    ◦ www.bing.com

   Online Encyclopedia
    ◦ www.wikipedia.com
Email
   Electronic Mail eg.
    cikgujohan@yahoo.com
   Method of exchanging digital messages
    from an author to one or more recipients.
   Compose, Receive, Forward, Reply, CC
    & BCC, Delete, Archive, and so on.
   Share/attach
    documents, file, song, picture.
   Popular free email provider:
    ◦ www.gmail.com
    ◦ www.mail.yahoo.com
Security & Privacy while
surfing
 Protect your PC with Updated
  Antivirus.
 Never give out personal information
  (username / password) – number etc.
 Social Network: Never use your real
  name / picture.
 Never download games/movies/songs
  from entrusted site.
 Always run full computer scan to avoid
  malware from phishing our data.

More Related Content

What's hot

2.2.1.1 the evolution of internet
2.2.1.1 the evolution of internet2.2.1.1 the evolution of internet
2.2.1.1 the evolution of internethazirma
 
1. web technology basics
1. web technology basics1. web technology basics
1. web technology basicsJyoti Yadav
 
Evolution of www ppt
Evolution of www pptEvolution of www ppt
Evolution of www pptsequels
 
Different types of operating systems
Different  types  of  operating  systems Different  types  of  operating  systems
Different types of operating systems Mehul Jain
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide WebSamudin Kassan
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSSVigneshkumar Ponnusamy
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computershaider ali
 
Evolution of internet
Evolution of internetEvolution of internet
Evolution of internetyash chavan
 
Lect 1. introduction to programming languages
Lect 1. introduction to programming languagesLect 1. introduction to programming languages
Lect 1. introduction to programming languagesVarun Garg
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetTanvir Raihan
 
The History Of The Internet Presentation
The  History Of The  Internet  PresentationThe  History Of The  Internet  Presentation
The History Of The Internet Presentationdgieseler1
 
Chapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebChapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebPatty Ramsey
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer systemmkhisalg
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and softwareDr. Ahmed Al Zaidy
 

What's hot (20)

2.2.1.1 the evolution of internet
2.2.1.1 the evolution of internet2.2.1.1 the evolution of internet
2.2.1.1 the evolution of internet
 
1. web technology basics
1. web technology basics1. web technology basics
1. web technology basics
 
Evolution of www ppt
Evolution of www pptEvolution of www ppt
Evolution of www ppt
 
Different types of operating systems
Different  types  of  operating  systems Different  types  of  operating  systems
Different types of operating systems
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide Web
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
 
Evolution of internet
Evolution of internetEvolution of internet
Evolution of internet
 
System software
System softwareSystem software
System software
 
Hardware
HardwareHardware
Hardware
 
Introduction to Web Services
Introduction to Web ServicesIntroduction to Web Services
Introduction to Web Services
 
Lect 1. introduction to programming languages
Lect 1. introduction to programming languagesLect 1. introduction to programming languages
Lect 1. introduction to programming languages
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
The History Of The Internet Presentation
The  History Of The  Internet  PresentationThe  History Of The  Internet  Presentation
The History Of The Internet Presentation
 
Chapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebChapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide Web
 
Data and information
Data and informationData and information
Data and information
 
Hci activity#1
Hci activity#1Hci activity#1
Hci activity#1
 
World wide web ppt
World wide web pptWorld wide web ppt
World wide web ppt
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer system
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and software
 

Viewers also liked

Business Forms Management on Corporate Intranets
Business Forms Management on Corporate IntranetsBusiness Forms Management on Corporate Intranets
Business Forms Management on Corporate IntranetsCraig Burma
 
Using an Intranet Within a Company
Using an Intranet Within a CompanyUsing an Intranet Within a Company
Using an Intranet Within a CompanyK Y
 
Case study of pay pal
Case study of pay palCase study of pay pal
Case study of pay palJean Lordeus
 
Perimeter Protected Access Design Pattern
Perimeter Protected Access Design PatternPerimeter Protected Access Design Pattern
Perimeter Protected Access Design PatternMike Reams
 
Web & Intranet Planning Workshop (half day)
Web & Intranet Planning Workshop (half day)Web & Intranet Planning Workshop (half day)
Web & Intranet Planning Workshop (half day)Prescient Digital Media
 
What is the organisational difference between Internet & Intranet?
What is the organisational difference between Internet & Intranet?What is the organisational difference between Internet & Intranet?
What is the organisational difference between Internet & Intranet?Nurhazman Abdul Aziz
 

Viewers also liked (20)

Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 
Business Forms Management on Corporate Intranets
Business Forms Management on Corporate IntranetsBusiness Forms Management on Corporate Intranets
Business Forms Management on Corporate Intranets
 
Using an Intranet Within a Company
Using an Intranet Within a CompanyUsing an Intranet Within a Company
Using an Intranet Within a Company
 
Case study of pay pal
Case study of pay palCase study of pay pal
Case study of pay pal
 
Perimeter Protected Access Design Pattern
Perimeter Protected Access Design PatternPerimeter Protected Access Design Pattern
Perimeter Protected Access Design Pattern
 
Flash modul INTRODUCTION
Flash modul INTRODUCTIONFlash modul INTRODUCTION
Flash modul INTRODUCTION
 
Flash modul 2
Flash modul 2Flash modul 2
Flash modul 2
 
Flash modul 1
Flash modul 1Flash modul 1
Flash modul 1
 
Photoshop - Module 7
Photoshop - Module 7Photoshop - Module 7
Photoshop - Module 7
 
Photoshop - Module 5
Photoshop - Module 5Photoshop - Module 5
Photoshop - Module 5
 
Itec 610 case_study_team_5_final_080910_a
Itec 610 case_study_team_5_final_080910_aItec 610 case_study_team_5_final_080910_a
Itec 610 case_study_team_5_final_080910_a
 
Photoshop - Module 6
Photoshop - Module 6Photoshop - Module 6
Photoshop - Module 6
 
Photoshop - Module 2
Photoshop - Module 2Photoshop - Module 2
Photoshop - Module 2
 
Photoshop - Module 8
Photoshop - Module 8Photoshop - Module 8
Photoshop - Module 8
 
Photoshop - Module 4
Photoshop - Module 4Photoshop - Module 4
Photoshop - Module 4
 
Web & Intranet Planning Workshop (half day)
Web & Intranet Planning Workshop (half day)Web & Intranet Planning Workshop (half day)
Web & Intranet Planning Workshop (half day)
 
Photoshop - Module 1
Photoshop - Module 1Photoshop - Module 1
Photoshop - Module 1
 
Photoshop - Module 3
Photoshop - Module 3Photoshop - Module 3
Photoshop - Module 3
 
What is the organisational difference between Internet & Intranet?
What is the organisational difference between Internet & Intranet?What is the organisational difference between Internet & Intranet?
What is the organisational difference between Internet & Intranet?
 
KEYBOARD BASICS CONCEPT
KEYBOARD BASICS CONCEPTKEYBOARD BASICS CONCEPT
KEYBOARD BASICS CONCEPT
 

Similar to CHAP 3 - NETWORK, INTRANET & INTERNET

Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyDr. Jayarama Reddy
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyDr. Jayarama Reddy
 
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentialschris30931
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4University of Delhi
 
Week two lecture
Week two lectureWeek two lecture
Week two lectureHarry Essel
 
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDIINFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDIAman Dwivedi
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetPunithRaj49
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetFarhanMalik93
 
Network Basics & Internet
Network Basics & InternetNetwork Basics & Internet
Network Basics & InternetVNSGU
 
Introduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.pptIntroduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.pptJOHN BABATUNDE LEE
 
Intrenet and its uses
Intrenet and its usesIntrenet and its uses
Intrenet and its usesRaj Parekh
 
01 intro to internet (re-upload)
01 intro to internet (re-upload)01 intro to internet (re-upload)
01 intro to internet (re-upload)bluejayjunior
 
Week10_networking_2
Week10_networking_2Week10_networking_2
Week10_networking_2ispkosova
 
Sai internet ppt
Sai   internet ppt Sai   internet ppt
Sai internet ppt Sai Swamy
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internetTallat Satti
 

Similar to CHAP 3 - NETWORK, INTRANET & INTERNET (20)

Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama Reddy
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama Reddy
 
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentials
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
 
Week two lecture
Week two lectureWeek two lecture
Week two lecture
 
Ccia unit 3
Ccia unit 3Ccia unit 3
Ccia unit 3
 
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDIINFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
 
Network Basics & Internet
Network Basics & InternetNetwork Basics & Internet
Network Basics & Internet
 
Introduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.pptIntroduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.ppt
 
PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2
 
Intrenet and its uses
Intrenet and its usesIntrenet and its uses
Intrenet and its uses
 
Internet
InternetInternet
Internet
 
01 intro to internet (re-upload)
01 intro to internet (re-upload)01 intro to internet (re-upload)
01 intro to internet (re-upload)
 
Week10_networking_2
Week10_networking_2Week10_networking_2
Week10_networking_2
 
Lecture 1- introduction
Lecture  1- introductionLecture  1- introduction
Lecture 1- introduction
 
Internet
InternetInternet
Internet
 
Sai internet ppt
Sai   internet ppt Sai   internet ppt
Sai internet ppt
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 

More from Cikgu Johan Johari

More from Cikgu Johan Johari (6)

Flash modul 5
Flash modul 5Flash modul 5
Flash modul 5
 
Flash modul 4
Flash modul 4Flash modul 4
Flash modul 4
 
Flash modul 3
Flash modul 3Flash modul 3
Flash modul 3
 
CHAP 4 - SOCIAL IMPACT OF ICT
CHAP 4 - SOCIAL IMPACT OF ICTCHAP 4 - SOCIAL IMPACT OF ICT
CHAP 4 - SOCIAL IMPACT OF ICT
 
CHAP 2 - FILE MANAGEMENT
CHAP 2 - FILE MANAGEMENTCHAP 2 - FILE MANAGEMENT
CHAP 2 - FILE MANAGEMENT
 
CHAP 1 - INTRODUCTION TO COMPUTERS
CHAP 1 - INTRODUCTION TO COMPUTERSCHAP 1 - INTRODUCTION TO COMPUTERS
CHAP 1 - INTRODUCTION TO COMPUTERS
 

Recently uploaded

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Recently uploaded (20)

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

CHAP 3 - NETWORK, INTRANET & INTERNET

  • 1. Network, Intranet & Internet At the end of the lesson, students should able to: • Define what is Network, Intranet & Internet. • Explain how Network, Intranet & Internet works. • Define what Is Web Browser. •Understand what is World Wide Web. • Explain how Web Browser works and how to find information. • Define and Explain how E-mail Works. • Know how to apply Security & Privacy when surfing.
  • 2. Network  Collection of hardware, interconnected by communication channel that allows us to share resources & information
  • 3. How Network Works Computer Network Cable – (RJ45) Network Hub Server
  • 4. Intranet & How It Works  Secure Connection of computers using Internet Protocol (IP) to share resources within an Organization. Resources are shared in a server. User can access within the organization network and cannot be access outside organization network.
  • 5. Internet  Internet is an interconnected computer networks that use standard Internet Protocol Suite (TCP/IP).  It connects billions of users that consists of academic, business, private or government networks.
  • 6. How Internet Works CLIENT WEB SERVER OTHER MULTIPLE SERVER SERVER OF: THE INTERNET Modem Broadban 3G Network d MULTIPLE INTRANET Router- OF: Modem PC Laptop I Pad 2
  • 7. World Wide Web  System of information distribution using the Internet.  Linked document written based on HTML (Hyper Text Markup Language)  Contains Graphic, Audio, Video, etc.  Navigation Links: allows user interaction with the web.  Data transfer uses HTTP (Hyper Text Transfer Protocol)
  • 8. Web Browser  Application software for retrieving, presenting and surfing information on the internet.  It access the World Wide Web using URL (Uniform Resource Identifier) example : www.yahoo.com.  Example of Web Browser:
  • 9. Internet Explorer HOME TOOLS ENTER URL NEW TAB HERE MENU BAR FAVOURITE S BAR SEARCH BOX VIEW FAVOURITES, FEEDS &
  • 10. Finding Information on the net  Using Search Engine ◦ www.google.com ◦ www.yahoo.com ◦ www.bing.com  Online Encyclopedia ◦ www.wikipedia.com
  • 11. Email  Electronic Mail eg. cikgujohan@yahoo.com  Method of exchanging digital messages from an author to one or more recipients.  Compose, Receive, Forward, Reply, CC & BCC, Delete, Archive, and so on.  Share/attach documents, file, song, picture.  Popular free email provider: ◦ www.gmail.com ◦ www.mail.yahoo.com
  • 12. Security & Privacy while surfing  Protect your PC with Updated Antivirus.  Never give out personal information (username / password) – number etc.  Social Network: Never use your real name / picture.  Never download games/movies/songs from entrusted site.  Always run full computer scan to avoid malware from phishing our data.