Você está na página 1de 3

CONTENTS

I. UNDERSTANDING THE INTERNET 1

A. LOCAL AREA AND WIDE AREA NETWORK (LAN AND WAN) 1


B. TCP/IP 1

II. OVERVIEW OF INTERNET APPLICATIONS 2

III. HISTORICAL DEVELOPMENT OF THE INTERNET 3

IV. THE INTERNET EXPLOSION 4

V. INTERNET ARCHITECTURE 4

A. INTERNET PROTOCOL (IP) ADDRESSING 4


B. DOMAIN NAMING SYSTEM 4

VI. BASIC INTERNET SERVICES 5

VII. HARDWARE/SOFTWARE REQUIREMENTS 6

A. COMPUTER 6
B. MODEM 6
C. TELEPHONE LINE 6
D. SOME SOFTWARE 6

VIII. INTERNET SERVICE PROVIDERS (ISP) 7

A. LEVELS OF INTERNET ACCESS 7

IX. WEB BROWSING 8

A. WORLD-WIDE WEB 8
B. NAVIGATING THE WEB 9

1. Hypertext 9
2. Uniform Resource Locator (URL) 9

C. WEB BROWSER – ABOUT MOZILLA FIREFOX 10

1. The Navigation Toolbar 11


2. The Menu Bar 11
3. The Main Display Panel 12
4. Navigation Tab Bar 12

X. FINDING INFORMATION ON THE INTERNET 13

A. USING A PORTAL 13
B. USING AN INTERNET SEARCH ENGINE 14

XI. E-MAIL 16

A. ELECTRONIC MAIL 16
B. EMAIL MODELS 16
C. EMAIL ADDRESS 16
D. PARTS OF AN E-MAIL 17
E. SENDING AN E-MAIL MESSAGE 18

F. READING AN E-MAIL MESSAGE 18


G. REPLYING TO/FORWARDING MESSAGES 19
H. USING WEB-BASED E-MAIL SERVICES 20
I. REGISTERING/GETTING AN ACCOUNT 20
J. HOW TO SET UP A REE YAHOO EMAIL ACCOUNT 21
K. SEARCHING E-MAIL ADDRESSES 23

XII. INSTANT MESSAGE 23

A. WHAT IS AN INSTANT MESSAGE? 23


B. HOW TO START YAHOO! MESSENGER? 24

1. Download and Install the Software 24


2. Get a Yahoo! ID 24

C. ADDING A CONTACT TO YAHOO! MESSENGER LIST 25


D. ADDRESS BOOK AND MESSENGER LIST 26
E. STATUS 27
F. SEND AN INSTANT MESSAGE 28
G. RECEIVING AN INSTANT MESSAGE 28

XIII. STRATEGIC USES OF THE INTERNET 29

A. COMMUNICATIONS AND RESEARCH 29


B. E-COMMERCE 29
C. THE NET IN THE CLASSROOM 29

1. Usenet Newsgroups 29
2. Other Educational Internet Resources 30
3. Resource-Based Learning and Inquiry-Based Learning 30
4. Distance Learning 31

D. RESEARCH AND DEVELOPMENT 31


E. EXERCISES 32

1. Online Scavenger Hunt 32


2. Online Treasure Hunt 33
3. Web Quest 34
4. Additional Elements 35

F. RUBRIC FOR EVALUATING WEBQUESTS 37

SECURITY OF THE INTERNET 42

I. OVERVIEW OF INTERNET SECURITY 42

A. WHAT IS INTERNET SECURITY? 42


B. BASIC SECURITY CONCEPTS 42
C. WHY CARE ABOUT SECURITY? 43

II. HISTORY 43

III. NETWORK SECURITY INCIDENTS 44

A. SOURCES OF INCIDENTS 45
B. TYPES OF INCIDENTS 45
C. INCIDENTS AND INTERNET GROWTH 46
D. INCIDENT TRENDS 47

IV. INTERNET VULNERABILITIES 48

A. WHY THE INTERNET IS VULNERABLE 48


B. TYPES OF TECHNICAL VULNERABILITIES 49

V. IMPROVING SECURITY 49

A. SECURITY POLICY, PROCEDURES, AND PRACTICES 49


B. SECURITY TECHNOLOGY 51

VI. INFORMATION WARFARE 52


VII. THE FUTURE 53

A. INTERNET WORKING PROTOCOLS 53


B. INSTRUSION DETECTION 53
C. WEB-RELATED PROGRAMMING AND SCRIPTING LANGUAGES 53

HOME NETWORK SECURITY 54

I. COMPUTER SECURITY 54

II. TECHNOLOGY 55

III. COMPUTER SECURITY RISKS TO HOME USERS 56

A. INTENTIONAL MISUSE OF YOUR COMPUTER 56


B. ACCIDENTS AND OTHER RISKS 58

IV. ACTIONS HOME USERS CAN TAKE TO PROTECT THEIR COMPUTER SYSTEMS 58

INFORMATION ETHICS
59

I. WHAT IS INFORMATION ETHICS? 59

II. THE DIFFERENCE BETWEEN ETHICS AND LAWS 59

III. INTELLECTUAL PROPERTY 60

A. COPYRIGHT 60
B. FAIR USE DOCTRINE 60
C. SOFTWARE LICENSING 60
D. PIRATED SOFTWARE 62

IV. PRIVACY 63

A. E-MAIL 63
B. VIOLATING ONE’S PRIVACY – WHAT IS SPYWARE? 64
C. ACCEPTABLE USE POLICY 66
D. THE TEN COMMANDMENTS FOR COMPUTER ETHICS 66
E. NETIQUETTE 68
F. CASES 69

Você também pode gostar