CS Module 1
CS Module 1
CS Module 1
*Web technology:-
Web Technology refers to the various tools and techniques that are utilized in the process of
communication between different types of devices over the Internet.
A web browser is used to access web pages. Web browsers can be defined as programs that
display text, data, pictures, animation, and video on the Internet.
Hyperlinked resources on the World Wide Web can be accessed using software interfaces
provided by Web browsers.
World Wide Web (WWW): The World Wide Web is based on several different
technologies: Web browsers, Hypertext Markup Language (HTML), and Hypertext
Transfer Protocol (HTTP).
Web Browser: The web browser is application software to explore www (World Wide
Web). It provides an interface between the server and the client and requests to the server
for web documents and services.
Web Server: Web server is a program which processes the network requests of the
users and serves them with files that create web pages. This exchange takes place using
Hypertext Transfer Protocol (HTTP).
Web Pages: A webpage is a digital document that is linked to the World Wide Web
and viewable by anyone connected to the internet has a web browser.
Web Development: Web development refers to the building, creating, and maintaining
of websites. It includes aspects such as web design, web publishing, web programming,
and database management. It is the creation of an application that works over the
internet i.e. websites.
Frontend Development: The part of a website that the user interacts directly is
termed as front end. It is also referred to as the „client side‟ of the application.
Backend Development: Backend is the server side of a website. It is the part of the
website that users cannot see and interact. It is the portion of software that does not
come in direct contact with the users. It is used to store and arrange data.
API: API is an abbreviation for Application Programming Interface which is a
collection of communication protocols and subroutines used by various programs to
communicate between them.
Web Protocols: Web protocols are set of rules followed by everyone communicating over the
web.
Other Protocols:
TCP/IP Model
UDP
FTP
SMTP
SOAP
Graphics: Graphical elements are one of the key feature of any webpage. They can be used to
convey important points better than text does and beautify the webpage.
Canvas: The HTML “canvas” element is used to draw graphics via JavaScript.
Internet:
The internet is a global network of interconnected computers and servers that allows people
to communicate, share information, and access resources from anywhere in the world.
The Internet is a global network comprised of smaller networks that are interconnected
using standardized communication protocols.
The Internet standards describe a framework known as the Internet protocol suite. This
model divides methods into a layered system of protocols.
1. Application layer (highest) – concerned with the data(URL, type, etc.). This is
where HTTP, HTTPS, etc., comes in.
• The Web is the only way to access information through the Internet. It‟s a system of
Internet servers that support specially formatted documents. The documents are
formatted in a markup language called HTML, or “HyperText Markup Language”,
which supports a number of features including links and multimedia. These
documents are interlinked using hypertext links and are accessible via the Internet.
URI: URI stands for ‘Uniform Resource Identifier’. A URI can be a name, locator, or
both for an online resource whereas a URL is just the locator. URLs are a subset of URIs.
• A URL is a human-readable text that was designed to replace the numbers (IP
addresses) that computers use to communicate with servers.
• A URL consists of a protocol, domain name, and path (which includes the specific
subfolder structure where a page is located) like-
protocol://WebSiteName.topLevelDomain/path
1. Protocol – HTTP or HTTPS.
2. WebSiteName – geeksforgeeks, google etc.
3. topLevelDomain- .com, .edu, .in etc.
4. path- specific folders and/or subfolders that are on a given website.
1. Communication: The internet and web have made communication faster and easier
than ever before. We can now send emails, chat online, make video calls, and use social
media platforms to connect with people all over the world.
2. Information sharing: The web has made it possible to access vast amounts of
information on any topic from anywhere in the world. We can read news articles, watch
videos, listen to podcasts, and access online libraries and databases.
3. Online shopping: The internet and web have revolutionized the way we shop. We
can now browse and purchase products online, from clothes and groceries to electronics
and furniture.
6. Business: The internet and web have transformed the way businesses operate.
Companies can now use e-commerce platforms to sell products and services,
collaborate with remote workers, and access global markets.
7. Research: The internet and web have made it easier for researchers to access and
share information. We can now access scientific journals and databases, collaborate
with other researchers online, and conduct surveys and experiments through online
platforms.
1. Privacy and security: The internet and web are vulnerable to various security
threats, such as hacking, identity theft, and phishing attacks. These threats can
compromise our personal information, such as login credentials, financial information,
and personal data.
2. Cyberbullying: The anonymity of the internet and web can lead to cyberbullying,
where individuals are harassed or threatened online. Cyberbullying can have severe
consequences, including depression, anxiety, and suicide.
3. Online addiction: The internet and web can be addictive, and individuals can spend
hours browsing social media or playing online games, leading to neglect of other
important aspects of their lives.
4. Disinformation: The internet and web are filled with inaccurate or false
information, which can lead to misinformation, propaganda, and conspiracy theories.
5. Digital divide: Access to the internet and web is not universal, and many
individuals, particularly those in low-income areas or rural communities, lack access to
reliable and high-speed internet.
Infrastructure:
The communications infrastructure of the Internet consists of its hardware components and a
system of software layers that control various aspects of the architecture. with any computer
network, the Internet physically consists of routers, media (such as cabling and radio links),
repeaters, modems etc.
Service tiers
• Packet routing across the Internet involves several tiers of Internet service providers.
• End-users who only access the Internet when needed to perform a function or obtain
information, represent the bottom of the routing hierarchy.
• At the top of the routing hierarchy are the tier 1 networks, large telecommunication
companies that exchange traffic directly with each other via very high speed fiber-
optic cables and governed by peering agreements.
• Tier 2 and lower-level networks buy Internet transit from other providers to reach at
least some parties on the global Internet, though they may also engage in peering.
• Internet exchange points are major traffic exchanges with physical connections to
multiple ISPs. Large organizations, such as academic institutions, large enterprises,
and governments, may perform the same function as ISPs, engaging in peering and
purchasing transit on behalf of their internal networks.
Access
• The Internet may often be accessed from computers in libraries and Internet
cafés. Internet access points exist in many public places such as airport halls and
coffee shops. Various terms are used, such as public Internet kiosk, public access
terminal, and Web payphone.
• Many hotels also have public terminals that are usually fee-based. These terminals are
widely accessed for various usages, such as ticket booking, bank deposit, or online
payment. Wi-Fi provides wireless access to the Internet via local computer
networks. Hotspots providing such access include Wi-Fi cafés, where users need to
bring their own wireless devices, such as a laptop or PDA. These services may be free
to all, free to customers only, or fee-based.
Mobile communication
The International Telecommunication Union (ITU) estimated that, by the end of 2017, 48%
of individual users regularly connect to the Internet, up from 34% in 2012.[69] Mobile
Internet connectivity has played an important role in expanding access in recent years,
especially in Asia and the Pacific and in Africa.[70]
Internet society:
REGULATIONS :-There are five predominant laws to cover when it comes to cybersecurity:.
Information Technology Act, 2000 The Indian cyber laws are governed by the
Information Technology Act, penned down back in 2000.
The importance of this Act is to offer reliable legal inclusiveness to eCommerce,
facilitating registration of real-time records with the Government. But with the cyber
attackers getting sneakier, topped by the human tendency to misuse technology, a
series of amendments followed. The ITA, enacted by the Parliament of India,
highlights the grievous punishments and penalties safeguarding the e-governance, e-
banking, and e-commerce sectors.
Section 43 - Applicable to people who damage the computer systems without
permission from the owner. The owner can fully claim compensation for the entire
damage in such cases.
Section 66 - Applicable in case a person is found to dishonestly or fraudulently
committing any act referred to in section 43. The imprisonment term in such instances
can mount up to three years or a fine of up to Rs. 5 lakh.
Section 66B - Incorporates the punishments for fraudulently receiving stolen
communication devices or computers, which confirms a probable three years
imprisonment. This term can also be topped by Rs. 1 lakh fine, depending upon the
severity.
Section 66C - This section scrutinizes the identity thefts related to imposter digital
signatures, hacking passwords, or other distinctive identification features. If proven
guilty, imprisonment of three years might also be backed by Rs.1 lakh fine.
Section 66 D - This section was inserted on-demand, focusing on punishing cheaters
doing impersonation using computer resources. Indian Penal Code (IPC) 1980
Identity thefts and associated cyber frauds are embodied in the Indian Penal Code
(IPC), 1860 - invoked along with the Information Technology Act of 2000.
The legislature ensured that all the regulatory compliances are well-covered,
including cyber forensics, e-discovery, and cybersecurity diligence. The Companies
(Management and Administration) Rules, 2014 prescribes strict guidelines confirming
the cyber security obligations and responsibilities upon the company directors and
leaders.
Concept of cyber security
OR
• In addition to financial damage suffered by the business, a data breach can also inflict
untold reputational damage.
• Cyber-attacks these days are becoming progressively destructive. Cybercriminals are using
more sophisticated ways to initiate cyber attacks.
It also means trying to keep the identity of authorized parties involved in sharing and holding
data private and anonymous. Often confidentiality is compromised by cracking poorly
encrypted data, Man-in-the-middle (MITM) attacks, disclosing sensitive data.
• Data encryption
• Two-factor authentication
• Biometric verification
Integrity :-
• Cryptographic checksums
• Using file permissions
• Uninterrupted power supplies
• Data backups Availability
Availability
making sure that authorized parties are able to access the information when needed.
Standard measures to guarantee availability include:
Backing up data to external drives
Implementing firewalls
Having backup power supplies
Data redundancy.
1) Web-based attacks
2) System-based attacks Web-based attacks
1. Injection attacks It is the attack in which some data will be injected into a web application
to manipulate the application and fetch the required information. Example- SQL Injection,
code Injection, log Injection, XML Injection etc.
2. DNS Spoofing DNS Spoofing is a type of computer security hacking. Whereby a data is
introduced into a DNS resolver's cache causing the name server to return an incorrect IP
address, diverting traffic to the attackers computer or any other computer. The DNS spoofing
attacks can go on for a long period of time without being detected and can cause serious
security issues.
3. Session Hijacking It is a security attack on a user session over a protected network. Web
applications create cookies to store the state and user sessions. By stealing the cookies, an
attacker can have access to all of the user data.
4. Phishing :-Phishing is a type of attack which attempts to steal sensitive information like
user login credentials and credit card number. It occurs when an attacker is masquerading as a
trustworthy entity in electronic communication.
5. Brute force It is a type of attack which uses a trial and error method. This attack generates
a large number of guesses and validates them to obtain actual data like user password and
personal identification number. This attack may be used by criminals to crack encrypted data,
or by security, analysts to test an organization's network security.
Volume-based attacks- Its goal is to saturate the bandwidth of the attacked site, and is
measured in bit per second. Protocol attacks- It consumes actual server resources, and
is measured in a packet.
Application layer attacks- Its goal is to crash the web server and is measured in
request per second.
7. Dictionary attacks This type of attack stored the list of a commonly used password and
validated them to get original password.
8. URL Interpretation It is a type of attack where we can change the certain parts of a URL,
and one can make a web server to deliver web pages for which he is not authorized to
browse.
9. File Inclusion attacks It is a type of attack that allows an attacker to access unauthorized or
essential files which is available on the web server or to execute malicious files on the web
server by making use of the include functionality.
10. Man in the middle attacks It is a type of attack that allows an attacker to intercepts the
connection between client and server and acts as a bridge between them. Due to this, an
attacker will be able to read, insert and modify the data in the intercepted connection.
System-based attacks
These are the attacks which are intended to compromise a computer or a computer network.
Some of the important system-based attacks are as follows
1. Virus It is a type of malicious software program that spread throughout the computer files
without the knowledge of a user. It is a self-replicating malicious computer program that
replicates by inserting copies of itself into other computer programs when executed. It can
also execute instructions that cause harm to the system.
3. Trojan horse It is a malicious program that occurs unexpected changes to computer setting
and unusual activity, even when the computer should be idle. It misleads the user of its true
intent. It appears to be a normal application but when opened/executed some malicious code
will run in the background.
5. Bots A bot (short for "robot") is an automated process that interacts with other network
services. Some bots program run automatically, while others only execute commands when
they receive specific input. Common examples of bots program are the crawler, chatroom
bots, and malicious bots.
Challenges:-
Today cybersecurity is the main component of the country's overall national security and
economic security strategies.
1. Ransomware Evolution
2. Blockchain Revolution
3. IoT Threats
IoT stands for Internet of Things. It is a system of interrelated physical devices which
can be accessible through the internet.
The connected physical devices have a unique identifier (UID) and have the ability to
transfer data over a network without any requirements of the human-to-human or
human-to-computer
interaction. The firmware and software which is running on IoT devices make
consumer and businesses highly susceptible to cyber-attacks.
every organization needs to work with cybersecurity professionals to ensure the
security of their password policies, session handling, user verification, multifactor
authentication, and security protocols to help in managing the risk.
4. AI Expansion
It is an area of computer science which is the creation of intelligent machines that do work
and react like humans. Some of the activities related to artificial intelligence include speech
recognition, Learning, Planning, Problem-solving, etc.
The key benefits with AI into our cybersecurity strategy has the ability to protect and defend
an environment when the malicious attack begins, thus mitigating the impact.
5. Serverless Apps Vulnerability
The serverless apps invite the cyber attackers to spread threats on their system easily because
the users access the application locally or off-server on their device. Therefore it is the user
responsibility for the security precautions while using serverless application.
The serverless apps do nothing to keep the attackers away from our data. The serverless
application doesn't help if an attacker gains access to our data through a vulnerability such as
leaked credentials, a compromised insider or by any other means then serverless.
The serverless applications are typically small in size. It helps developers to launch their
applications quickly and easily. They don't need to worry about the underlying infrastructure.
The web-services and data processing tools are examples of the most common serverless
apps.
Internet Web
It is also known as the The Web is a model for sharing information using
Network of Networks. the Internet.
Network protocols are used to Accesses documents and online sites through
transport data. browsers.
Internet Web
Used for communication, Used for publishing and accessing web pages,
sharing of resources, and multimedia content, and other resources on the
accessing information from Internet
around the world