Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
7 views74 pages

Internet & Cyber Security Basics

The document provides an overview of the Internet, its history, and various components such as domains, URLs, web browsers, and search engines. It also discusses networking concepts, types of networks, e-banking systems, and cybersecurity threats like malware and hacking. Additionally, it covers technical aspects like the OSI model, IP addresses, and network devices.

Uploaded by

subhadeepsubha89
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views74 pages

Internet & Cyber Security Basics

The document provides an overview of the Internet, its history, and various components such as domains, URLs, web browsers, and search engines. It also discusses networking concepts, types of networks, e-banking systems, and cybersecurity threats like malware and hacking. Additionally, it covers technical aspects like the OSI model, IP addresses, and network devices.

Uploaded by

subhadeepsubha89
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 74

Internet +

Networking & Cyber Security


INTERNET: Interconnected Network
• Global system of interconnected computer networks.
• Uses the standard protocol suite (TCP/IP) to link several
billion devices worldwide
History of Internet
1969: APRANET (Advance research project agency) was the first network of world.
1971: Email by Ray Tomlinson
1983: TCP/IP became the standard communication method for APRANET
1989: WWWC (World Wide Web Consortium)
1990-91: First web browser called world wide web created by Sir Tim Berners Lee
1995: Internet launched in India by VSN
Used to identify services provided
through the internet, such as websites,
email services and more.
• There are two types of domains:
➢ Top level domain
➢ Sub domain
Lists of domains
.com commercial organizations
.org non-profit organizations
.info information service providers
.edu educational institutions
.gov government websites
.def defence sites
.co.in commercial in India
.net network centres
URL
• Stands for Uniform Resource Locator
• It’s the web address of an online resource.
Eg: http://www.knowledgeaccount.com
Web Browsers
• Example of application software
• Provides a platform to access the services of internet or network.
Example: www (world wide web) which was later renamed as NEXUS, opera,
Mozilla, Firefox, google chrome, safari etc.
Search Engine
• Online tool that searches for results in database based on the search query
(keyword) submitted by the internet user.
• These find the results in their database, sort them and make an ordered
list of these results based on the search algorithm.
• This list is generally called the search engine results page (SERP).
• First ever search engine in the world was Archie which was developed by
Alan Emtage
Examples: yahoo, google, etc.
Hyperlink
• Reference to a data that the reader can directly follow either by clicking or
by hovering or that is followed automatically.
Website
• Set of related web pages served from a single web domain.
Home page
• Also known as index page or main page
Downloading
• Transmission of a file or data from one computer to another over a
network, usually from a larger server to a user server.
• It refers to the general transfer of data or to transferring a specific file.
• Download manager is used which manages the downloading of files from
the internet which
may be built into a web browser or as a usually more sophisticated program.
Uploading
• Means data is being sent from your computer to the internet.
• It includes sending email, posting photos on a social media site etc.
• Even clicking on a link on a web page sends a tiny data upload.
E-Banking
• Product designed for the purposes of online banking that enables you to
have easy and safe access to your bank account.
• Major types of e-banking includes online internet banking, mobile
banking, automated teller machine (ATM), debit and credit cards.
• Different types of online financial transactions are:
National electronic fund transfer (NEFT)
• Nation wise payment system facilitating one to one funds transfer.
• Individual, firm and corporates can electronically transfer funds
from any bank to any individual, firm or corporates.
• Even such individuals who do not have bank accounts (walk-in
customers) can also deposit cash at the NEFT enabled branches to
transfer funds using NEFT
Real Time Gross settlement (RTGS)
• Continuous settlement of funds transfers individually on an order basis
(without netting).
• It means processing of instructions at the time they are received rather
than at some time later.
• Funds settlement takes place in the books of RBI so they are final and
irrevocable.
• System is meant for large value transactions (min. amount is 2 lakh)
Electronic Clearing System (ECS)
• ECS is an alternative method for effecting payment
transactions in respect of the utility-bill payments such as
telephone bills, electricity bills, etc., which would obviate
the need for issuing and handling paper instruments and
thereby facilitate improved customer service by banks /
companies / corporations / government departments, etc.,
collecting / receiving the payments
Immediate Payment Service (IMPS)
• IMPS offers an instant, 24X7, interbank electronic fund transfer
service through mobile phones. IMPS is an emphatic tool to
transfer money instantly within banks across India through mobile,
internet and ATM which is not only safe but also economical both
in financial and non-financial perspectives
Types Of Networks
• Mainly there three networks in networking (LAN, MAN, WAN)
LAN (Local area network)
• A LAN is a group of computer and devices which are connected
in a limited area such as school, home, and office building.
Ethernet, bus network are the most common examples of LAN.
MAN (Metropolitan area network)
• MAN is consisting of a computer network across an entire city.
The size of the Metropolitan area network is larger than LANs and
smaller than WANs, but covers the larger area of a city or town.
Eg: Cable TV is an example of MAN.
WAN (Wide Area Network)
• A WAN can cover large geographical area such as country,
continent or even a whole world. Internet connection is an
example of WAN.
PAN (Personal Area Network)
• PAN offers to make connections of multiple devices or other
equipment under the single user’s environment within 10 meters
to 30 feet. PAN network enables with few computer devices,
telephones, electronic devices, laptop, PDAs, printers, smart
phone, and other wearable computer devices
CAN (Campus Area Network)
• CAN network helps to link couples of LANs with small geographical
space such as schools, university campuses, and corporate buildings.
SAN (Storage Area Network)
• SAN is a specialized, high-speed network that provides block-level
network access to storage.
VPN (virtual private network)
• VPN extends a private network across a public network, such as the
Internet. It enables users to send and receive data across shared or
public networks as if their computing devices were directly connected
to the private network.
Cloud computing
• A type of Internet-based
computing that provides
shared computer
processing resources and
data to computers and
other devices on demand.
IP address
IP address is used to uniquely identify a system in a network.
It is also known as Logical address of our system.
It is of two types: IPV4 (32bits/4Bytes) and IPV6 (128bits/16Bytes).
OSI MODEL OSI (Open system interconnection) model
• An architecture or model, not a protocol.
• Describes “How to transfer the data from sender to receiver”.
• It is a seven layered Model.
Functions of Layers
• Physical layer – To define the specifications of medium.
To convert the data in the form of bits and transmit it
over medium. To define topologies, medium, speed,
transmission modes.
• Data Link Layer – Construction of data frame. Error
detection and controlling. Data flow controlling. Physical
addressing (Mac Addressing)
Network layer – Logical addressing (IP addressing), Routing and Packet
delivery.
• Transport layer – It provides a reliability of error free, end to end data
delivery and correct destination. Segmentation and reassembly.
• Session layer – Time management, communication controlling,
Synchronization.
• Presentation layer – Data is presented in the form size, type,
encryption-decryption and compression.
• Application layer – It provides a user interface or platform to transmit
or receive the data.
Example: web browser.
Gateway – It works on all the layers of OSI model. Gateway is a combination
of Software and hardware. It is used to connect different types of two or
more networks having different protocols, services and environments.
Bridge - It works on data link layer of OSI Model. It is used to connect same
or similar types of two or more networks. It is also used to divide a big
network into two or more small networks.
Router - It works at the Network Layer. It sends the data packets to desired
destination by choosing the best path available thus reducing network
traffic Router works as a data traffic controller in a network. Addressing and
routing are the functions of Router.
MODEM - Modulator and demodulator is the full-form of MODEM. It works
on Physical layer. The function of MODEM is Modulation and demodulation.
Modulation means Digital to analogue or Demodulation means analogue to
digital. It is used to connect computers for communication via telephone
lines.
•Hub: It works at the Physical layer. It just acts like a connector of several
computers i.e. simply connects all the devices on its ports together. It
broadcasts all the data packets arriving at it with no filtering capacity.
Switch: It works at the Data Link Layer. It is used for dividing a network into
segments called subnets. It provides filtering of data packets and prevents
network traffic also. A switch is also known as an intelligent hub.
Repeater – It works in physical layer. Repeaters are used to recharge or
regenerate or reboost the week signals to transmits the signals for long
distance.
MAC address - It is also known as Physical address of our system. The size of
MAC address is 48 Bits/6 Bytes.MAC address works on Data link layer of OSI
model.MAC address is of Hexadecimal format. Format of MAC address is
07 : 01 : 02 : 22 : 3C : 4D
Manufacturer ID Ethernet Card Serial Number
Malware – Malware is stands for malicious software. It is small program that
can come in our system form anywhere and then infects or harms our system.
Virus, Worm, Trojan horse, Spyware, Adware, Rootkit, Key loggers, Logic
bomb, Ransomware
VIRUS (Vital Information resource under siege)
• A virus is a program that replicates its own code by attaching itself to other
executable files in such a way that the virus code is executed when the
infected executable file is executed. Almost all viruses are attached to an
executable file, which means the virus may exist on a system but will not be
active or able to spread until a user runs or opens the malicious host file or
program. Types of viruses are File Virus, Macro Virus, Multipartite Virus,
Boot sector Virus/Master Boot Record Virus, Stealth Virus, Cavity (Space
Filler) Virus, Tunnelling Virus, Polymorphic Virus, Cluster Virus.
WORM (Write once read many): A computer worm is a program
that replicates itself and makes use of a PC's network connectivity to transfer
a copy of itself to other computers within that network. Worms are distinct
from viruses in that they do not require a host program to run.
Trojan Horse: In computing, Trojan horse, or Trojan, is any malicious
computer program which is used to hack into a computer by misleading users
of its true intent. A Trojan does not self replicate.
• Spyware is a type of malware that is installed on a user's computer to
collect personal information or monitor internet browsing activities.
• Rootkit is an application that hides its own presence or presence of other
malwares on the computer, using some of the lower layers of the
operating system (API function redirection, using of undocumented OS
functions, etc.), which makes them almost undetectable by common anti-
malware software.
• Adware is software that contains advertisements embedded in the
application. Adware is considered a legitimate alternative offered to
consumers who do not wish to pay for software
Keylogger - A keylogger is a type of surveillance software that has the
capability to record every keystroke you make to a log file, usually
encrypted. A key logger recorder can record instant messages, e-mail, and
any information you type at any time using your keyboard.
Logic Bomb - A logic bomb is a piece of code inserted into an operating
system or software application that implements a malicious function after a
certain amount of time, or specific conditions are met.
Ransomware - It is a type of malicious software designed to block access to a
computer system until
a sum of money is paid.
Hacking, Hacker and Cracker - In computer networking, hacking is any
technical effort to manipulate the normal behaviour of network connections
and connected systems. A hacker is any person engaged in hacking.
Malicious attacks on computer networks are officially known as cracking.
Types of Hacking
➢ Ethical hacking (Legal hacking)
➢ Non-ethical hacking (Illegal)
Types of hackers
1. White hat hackers (Ethical hacking)
2. Black hat hackers (Non-ethical hacking)
3. Gray Hat hackers (Combination of both black and white hat hackers)
4. Script Kiddie (not a professional, but use download software for hacking).

Phishing - Phishing is the attempt to acquire sensitive information such as


usernames, passwords, and credit card details (and sometimes, indirectly,
money) by masquerading as a trustworthy entity in an electronic
communication.
Packet Sniffing -Packet sniffing is the act of capturing packets of data flowing
across a computer network. The software or device used to do this is called
a packet sniffer.
Spoofing – A spoofing attack is when an attacker or malicious program
successfully acts on another person’s (or program’s) behalf by impersonating
data. Some common types of spoofing attacks include ARP spoofing, DNS
spoofing and IP address spoofing. These types of spoofing attacks are
typically used to attack networks, spread malware and to access
confidential information and data.
Snooping – Snooping refers to listening to a conversation. For example, if
you login to a website that uses no encryption, your username and
password can be sniffed off the network by someone who can capture the
network traffic between you and the web site
Firewall –A computer firewall is a software program that prevents
unauthorized access to or from a private network. Firewalls are tools that
can be used to enhance the security of computers connected to a network,
such as LAN or the Internet
1. কেোন ো ওনেবসোইনের প্রথম পৃষ্ঠোনে কে বনে? [SSC MTS 2017]
(a) ক োমনপজ*
(b) কমই কপজ
(c) কিজোই কপজ
(d) কেোন োেোই ে
1. কেোন ো ওনেবসোইনের প্রথম পৃষ্ঠোনে কে বনে? [SSC MTS 2017]
(a) ক োমনপজ*
(b) কমই কপজ
(c) কিজোই কপজ
(d) কেোন োেোই ে
3. ইন্টোরন নে সোধোরণত কেো েকিউেোর েযোঙ্গুনেজ বযব োর েরো ে?
[SBI 2009]
(a) Basic
(b) COBOL
(c) JAVA*
(d) PASCAL
4. URL-র কেষ কত কে অক্ষর কেনসর প্রেৃকত প্রেোে েনর? [FCI 2012]
(a) কিোনমই -র োম*
(b) েোন েকেকিকে
(c) সোিভোর
(d) কপ্রোনেোেে
5. িোরনতর বতভমোন 1 ং কসোেযোে ক েওেোকেভং সোইে 'কেসবুে'-র প্রকতষ্ঠোতো
কে?[SSC CGL 2013]
(a) অরেুে বোইেুনেোনে
(b) মোেভ জুেোরবোর্ভ*
(c) কবে কর্েস
(d) মোকেভ েুপোর
6. ওনেব কপজ-র এেকে কবনেষ েব্দ, যোনে কিে েরনে আর এেকে কপজ
খুনে যোে। তোনে কে বনে? [Punjab & Sind 2010)
(a) অযোঙ্কর
(b) োইপোরকেঙ্ক*
(c) করেোনরন্স
(d) URL
7. 'Unsolicited e-mail'-কে বেো ে-[SBI 2011]
(a) ক উজ গ্রুপ
(b) ইউজ ক ে
(c) বযোেনব
(d) স্প্যোম*
8. 'পোসওেোিভ' বযব োরেোরীনের কে েরনত সো োযয েনর? [SBI 2009)
(a) কসনেম তোড়োতোকড় প্রনবে েরনত
(b) সমনের সদ্ব্যব োর েরনত
(c) েোইনের কর্োপ ীেতো রক্ষো েরনত*
(d) েোইনের র্ঠন র সরেীেরণ েরনত
9. Chat কে? ISBI 2009]
(a) ইন্টোরন নের মোধযনম, কযখোন কবকিন্ন েোইে upload ও download েরো
যোে
(b) এেকে অ েোই স্থো , কযখোন বযব োরেোরীরো কেকখত রূনপ কযনেোন ো
কবষনে আনেোচ ো েরনত পোনর
(c) েকিউেোর ক েওেোনেভর মোধযনম েোইনের আেো প্রেো
(d) তোৎক্ষকণে েোইপ েরো েনথোপেথ *
10. কেোন ো কপ্রোগ্রোনমর প্রনবেোকধেোনর বোধো সৃ কিেোরী কর্োপ ীে কেোিনে বনে-
[SBI 2009]
(a) পোসওেোিভ*
(b) পোসনপোেভ
(c) একি কেোি
(d) অযোেনসস কেোি
11. ইন্টোরন নের সোিভোর কথনে েকিউেোনরর তথয সংগ্র েরোর পদ্ধকতনে
বনে-JUBI 2011
(a) পুকেং
(b) কপকেং
(c) িোউ নেোকিং *
(d) ট্রোন্সেোকমভং
12. E-Commerce কেোিো ীগুকেনে কে েরনত সো োযয েনর?[BOB 2008)
(a) কবকিন্ন গুরুত্বপূণভ কবজন স করনপোেভ ইসু য েরনত
(b) অ েোইন বযবসো েরনত*
(c) কবকিন্ন কসদ্ধোন্তমূেে প্রকিেোে কযোর্েো েরনত
(d) েোর্জপনের কে োপোও ো ট্রোে েরনত
13. ইন্টোরন ে কে েরনত সো োযয েনর? [BOB 2008]
(a) ই-কমে পোঠোনত
(b) ওনেব কপজ কেখনত
(c) পৃকথবীর কবকিন্ন সোিভোনরর সোনথ সংযুক্ত নত
(d) উপনরোক্ত সব*
14. কবকের িোর্ ওনেবসোইনের এেকে কবনেষ কপজ থোনে, যো ঐ
ওনেবসোইনের অ যো য কপনজর প্রনবেদ্ব্োর ক সোনব েোজ েনর। তোনে বেো ে-
[SBI 2009]
(a) সোচভ ইকি
(b) ক োমনপজ*
(c) ব্রোউসোর
(d) URL
15. যকে কেোন ো ওনেবসোইে প্রোেেই বযব োর েরো েোনর্, তো নে বোরবোর ঐ
ওনেবসোইনের Address েোইপ ো েরো তোনে____েরো কযনত পোনর।
(Syndicate Bank 2010)
(a) Save
(b) Copy
(c) Bookmark*
(d) Delete
16. ইন্টোরন ে ে____-র কসনেম। [Syndicate Bank Clerk 2010)
(a) সেেওেযোর গুচ্ছ
(b) ওনেব কপজ
(c) ওনেবসোইে
(d) ইন্টোর েোন নেে ক েওেোেভ *
17. ____ ে এেকে সেেওেযোর কপ্রোগ্রোম, যো ওনেব কপজ কেখনত সো োযয
েনর। [SBI Associate 2010]
(a) সোইে
(b) ক োে
(c) কেংে
(d) ব্রোউজোর*
18. এেকে e-mail address-এ এেকে user Id, তোর পনর _____কচহ্ন ও
e-mail সোিভোনরর োম থোনে [Allahabad PO 2010]
(a) @*
(b) #
(c) &
(d) *
19. ____-কিতোনের েকিউেোনরর সো োনযয কজক সপে কে নত সো োযয েনর।
[Allahabad Bank PO 2010]
(a) E-world
(b) E-commerce*
(c) E-spend
(d) E-Business
20.____ ে এেধরন র কিকজেোে েযোনমরো, যো েকিউেোনরর সোনথ যুক্ত
থোনে এবং কিকিও ে েোনরকন্সং-এ সো োযয েনর।
[SBI Associate PO 2010]
(a) ওনেব েযোম*
(b) ওনেব কপে
(c) ব্রোউজোর েযোম
(d) ব্রোউজোর কপে
21. েকিউেোর কথনে কেোন ো েোইে ইন্টোরন নে ট্রোন্সেোর েরোর পদ্ধকতনে
বনে- [Allahabad Bank PO 2011)
(a) িোউ নেোকিং
(b) আপনেোকিং*
(c) FTP
(d) JPEG
22. িোেো ট্রোন্সকমে -র কস্প্ি পকরমোপ েরোর জ য সোধোরণত কেো এেে
বযব োর েরো ে?[SSC CHSL 2011]
(a) কমর্ো োজভ
(b) েযোনরেেোর পোর কসনেন্ড
(c) কবে পোর কসনেন্ড*
(d) যোন োনসনেন্ড
23. 'Alta vista' ে- [SSC CGL 2011]
(a) কপ্রোগ্রোম
(b) সেেওেযোর
(c) ব্রোউজোর
(d) সোচভ ইকি *
24. -বযব োরীনের বযোঙ্ক অযোেোউনন্টর তথয কপনত ও কবে জমো কেনত সো োযয
েনর।[SSC GD 2012]
(a) েূ রকেক্ষো
(b) অ েোই বযোকঙ্কং*
(c) E-Commerce
(d) মোকিকমকিেো
25. কবমো ো েব্দকে খুুঁনজ বোর েনরো।[SSC MTS 2013]
(a) ইন্টোরন ে এক্সনলোরোর
(b) ক েনেপ
(c) কমোকজেো
(d) এনক্সে *
26. Internet-র অপর োম ে- [SSC MTS 2013]
(a) Gopher
(b) Intranet
(c) Cyber Space*
(d) WWW
27. Internet-এ সবনথনে কবেী বযবহৃত কপ্রোনেোেে কেো কে?
[SSC CGL 2013]
(a) HTTP
(b) TCP/IP*
(c) SMTP
(d) SLIP
28. এে ধরন র ইন্টোরন ে অযোেোউন্ট, যো সরোসকর ক ে-র সোনথ সংযুক্ত ে,
তো ে- (SSC CHSL 2013
(a) কেে অযোেোউন্ট
(b) েোন ভে অযোেোউন্ট
(c) সোিভোর অযোেোউন্ট
(d) TCP/IP অযোেোউন্ট*
29. এেকে e-mail কসনেম েত ধরন র recipient থোনে?
[SSC MTS 2014]
(a) কত *
(b) চোর
(c) এে
(d) েুই
30. সেেওেযোর অযোকলনেেন র কক্ষনে বযবহৃত CRM-র পুনরো েথো কে?
[SSC MTS 2014]
(a) Customer's Relatives Meet
(b) Channel Route Market
(c) Customer Relationship Management*
(d) Customer Retention Manager
31. এেজ বযকক্ত কয ইন্টোরন নে Online Exploring-এ প্রচুর সমে বযে
েনর , তোনে কে বনে? [SSC CPO 2014]
(a) ক ে অযোকিে*
(b) ক েগুরু
(c) সোইবোর ে
(d) সোইবোর কেে
32. ইন্টোরন ে কেেন োেকজর শুরুর কেনে ইন্টোরন ে কপজ ততরী েরোর জ য
কয েযোঙ্গুনেজ বযব োর েরো ত, তো ে-[SSC CGL 2014]
(a) XML
(b) HTML*
(c) DHTML
(d) ASP
33. URL-র পুনরো েথো কে?
[SSC GD Constable 2015]
(a) Uniform Resource Locater*
(b) Unique Resource Locater
(c) Uniform Remote Locater
(d) Unique Remote Locater

You might also like