SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Lecture 12
Internet, Database,
Cyber Crime
Lecturer: Sumaira Hussain
S.M.I University
Internet
A collection of interconnected networks –
looks like a single, unified network
Internet
 Enables users located at far-way locations to easily
share information with others located all over the
world
 Enables users to easily and inexpensively
communicate with others located all over the world
 Enables the users to operate and run programs on
computers located all over the world
 The Internet is unlike any previous human
invention. It is a world-wide resource, accessible to
all of the humankind.
Key Characteristics
 Geographic Distribution
Global - reaches around the world
 Robust Architecture
Adapts to damage and error
 Speed
Data can travels at near ‘c’ on
copper, fiber, airwaves
Key Characteristics
 Universal Access
Same functionality to everyone
 Growth Rate
The fastest growing technology ever
 Freedom of Speech
Promotes freedom of speech
 The Digital Advantage
Is digital: can correct errors
Internet Networking Protocol
Communications on the Internet is controlled by a set of two
protocols: TCP and IP
TCP/IP Transmission Control Protocol/Internet Protocol
TCP breaks down the message to be sent over the Internet into
packets
IP routes these packets through the Internet to get them to their
destination
When the packets reach the destination computer, TCP
reassembles them into the original message
IP Address
 A unique identifier for a computer on a
TCP/IP network
 Format: four 8-bit numbers separated
by periods. Each 8-bit number can be
0 to 255
 Example: www.smiu.edu.pk
(192.254.232.36)
Domain Name
 A domain name is a meaningful, easy-
to-remember ‘label’ for an IP address
 Example: www.smiu.edu.pk
(192.254.232.36)
Domain Name System
 DNS is the way that Internet domain
names are located & translated into IP
addresses
Internet Services
 FTP
 Telnet
 Web
 eMail
 Instant messaging
 VoIP
File Transfer Protocol (FTP)
Used to transfer files between computers
on a TCP/IP network (e.g. Internet)
Simple commands allow the user to:
 List, change, create folders on a remote
computer
 Upload and download files
 Typical use: Transferring Web content from
the developer’s PC to the Web server
Telnet Protocol
Using Telnet, a user can remotely log on to a
computer (connected to the user’s through a
TCP/IP network, e.g. Internet) & have
control over it like a local user, including
control over running various programs
 In contrast, FTP allows file operations only
 Typical use: Configuring and testing of a
remote Web server
Web
 The greatest, shared resource of
information created by humankind
 A user may access any item on the
Web through a URL, e.g.
http://smiu.edu.pk/under-graduate-programs.php
Protocol
Identifier
Server Address Directory & File Name
E-Mail
 Computer-to-computer messaging
 Components:
eMail Clients
 Programs used for writing, sending, receiving, and
displaying eMail messages Example: YahooMail
SMTP: Simple Mail Transfer Protocol
 A protocol used to send and receive eMail
messages over a TCP/IP network
POP3: Post Office Protocol
 A protocol used for receiving eMail messages
 A POP3 server maintains text files (one file per user
account) containing all messages received by a
user
Instant Messaging
 The IM services available on the
Internet (e.g. ICQ, AIM, MSN
Messenger, Yahoo! Messenger) allow
us to maintain a list of people
(contacts) that we interact with
regularly
 We can send an instant messages to
any of the contacts in our list as long
as that contact is online
Voice over IP (VoIP)
 Voice delivered from one device to
another using the Internet Protocol
 Voice is first converted into a digital
form, is broken down into packets, and
then transmitted over a TCP/IP
network (e.g. Internet)
Data & Information
 Data refers to raw facts & figures
 Information is an organized form of
data
Data Integrity
 Integrity refers to maintaining the correctness and
consistency of the data
– Correctness: Free from errors
– Consistency: No conflict among related data items
 Integrity can be compromised in many ways:
– Typing errors
– Transmission errors
– Hardware malfunctions
– Program bugs
– Viruses
– Fire, flood, etc.
Database
 A collection of data organized in such
a fashion that the computer can
quickly search for a desired data item
Database Management System
 DBMS takes care of the storage, retrieval, and
management of large data sets on a database
 It provides SW tools needed to organize &
manipulate that data in a flexible manner
 It includes facilities for:
– Adding, deleting, and modifying data
– Making queries about the stored data
– Producing reports summarizing the required contents
Database Characteristics
 Similar items of data form a column
 Fields placed in a particular row are strongly
interrelated
 One can sort the table w.r.t. any column
 That makes searching straight forward e.g., for all
the books written by a certain author
 Similarly, searching for the 10 cheapest/most
expensive books can be easily accomplished
through a sort
 Effort required for adding a new column to the table
is much smaller
Example
Title Author Publisher Price InStock
The Terrible
Twins
Bhola
Champion
BholiBooks 199 Y
Calculus &
Analytical
Geometry
Smith
Sahib
Good
Publishers
325 N
Accounting
Secrets
Zamin
Geoffry
Sung-e-
Kilometer
Publishers
29 Y
Example
Customer Title Shipment Type
Saad The Terrible
Twins
24-10-2014 Air
Asad Calculus &
Analytical
Geometry
23-03-2014 Surface
Ali Accounting
Secrets
12-06-2014 Air
They share a column, & are related through it
A program can match info from a field in one table with info in a
corresponding field of another table to generate a 3rd table that combines
requested data from both tables
Question
who has spent the most money on
the online bookstore
Answer
Customer Price
Saad 199
Asad 325
Ali 29
Relational Database
 Databases consisting of two or more related tables are
called relational databases
 A typical relational database may have anywhere from
10 to over a thousand tables
 Each column of those tables can contain only a single
type of data (contrast this with spreadsheet columns!)
 Table rows are called records; row elements are called
fields
 A relational database stores all its data inside tables,
and nowhere else
 All operations on data are done on those tables or those
that are generated by table operations
RDBMS
 Relational DBMS software
 Contains facilities for creating, populating,
modifying, and querying relational
databases
 Examples:
–Access – DB2
–FileMaker Pro – Objectivity/DB
–SQL Server – MySQL
–Oracle – Postgres
Terminologies
 Primary Key is a field that uniquely identifies each record
stored in a table
 Queries are used to view, change, and analyze data. They
can be used to:
– Combine data from different tables, efficiently
– Extract the exact data that is desired
 Forms can be used for entering, editing, or viewing data, one
record at a time
 Reports are an effective, user-friendly way of presenting data.
 Data normalization is the process of efficiently organizing
data in a database. There are two goals of the normalization
process:
– Eliminate redundant data
– Storing only related data in a table
Cyber Crime
07 February 2000
• Users trying to get on to the Web sites of Yahoo, couldn’t!
• Reason: Their servers were extremely busy!
• They were experiencing a huge number of hits
• The hit-rate was superior to the case when a grave incident (e.g. 9/11) occurs,
and
people are trying to get info about what has happened
• The only problem was that nothing of note had taken place!
What was going on?
• A coordinated, distributed DoS (Denial of Service) attack was taking place
• Traffic reached 1 GB/s; many times of normal!
• In the weeks leading to the attack, there was a noticeable rise in the number of
scans that Internet servers were receiving
• Many of these scans appeared to originate from IP addresses that traced back to
Korea, Indonesia, Taiwan, Australia
Three Phases of the DoS
1. Search for Drones
• The attackers set about acquiring the control over the computers to be used in the
attack …
• by scanning – using e.g. Sscan SW – a large numbers of computers attached to the
Internet
• Once a computer with a weak security scheme is identified, the attackers try a
break-in
• Once conquered, that computer – called a drone – will be used to scan others
2. Arming the Drones
• After several drones have been conquered, the DoS SW is loaded on to them
• Examples: Tribal Flood Network, Trinoo, TFN2K
• Like a time-bomb, that SW can be set to bring itself into action at a specified time
• Alternatively, it can wait for a commencement command from the attacker
3. The Actual Attack
• At the pre-specified time or on command, the SW implanted on all of the drones
wakes-up and starts sending a huge number of messages to the targeted servers
• Responding to those messages overburdens the targeted servers and they become
unable to perform their normal functions
DoS Attack: A Cyber Crime
 DoS is a crime, but of a new type - made possible by the
existence of the Internet
 A new type of policing and legal system is required to tackle
such crimes and their perpetrators
 Internet does not know any geographical boundaries,
therefore jurisdiction is a key issue when prosecuting the
cyber-criminal
Cyber crime can be used to …
 Damage a home computer
 Bring down a business
 Weaken the telecom, financial, or even defense-related
systems of a country
Viruses
 Self-replicating SW that eludes detection and is
designed to attach itself to other files
 Infects files on a computers through:
– Floppy disks, CD-ROMs, or other storage media
– The Internet or other networks
 Viruses cause tens of billions of dollars of damage each
year
 One such incident in 2001 – the LoveBug virus – had an
estimated cleanup/lost productivity cost of US$8.75
billion
 The first virus that spread world-wide was the Brain
virus, and was allegedly designed by someone in Lahore
Antivirus SW
 Designed for detecting viruses & inoculating
 Continuously monitors a computer for known
viruses and for other tell-tale signs like:
– Most – but, unfortunately not all – viruses increase
the size of the file they infect
– Hard disk reformatting commands
– Rewriting of the boot sector of a hard disk
 The moment it detects an infected file, it can
automatically inoculate it, or failing that, erase it

Weitere ähnliche Inhalte

Was ist angesagt?

Peter Norton’s Introduction to Computers
Peter Norton’s Introduction to ComputersPeter Norton’s Introduction to Computers
Peter Norton’s Introduction to ComputersUjjwal 'Shanu'
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information TechnologyRa'Fat Al-Msie'deen
 
Introduction to Hardware and Software
Introduction to Hardware and SoftwareIntroduction to Hardware and Software
Introduction to Hardware and SoftwarePravinGhosekar
 
Internet and Information Technology (IT)
Internet and Information Technology (IT)Internet and Information Technology (IT)
Internet and Information Technology (IT)Amber Bhaumik
 
Introduction to Computer & ICT
Introduction to Computer & ICTIntroduction to Computer & ICT
Introduction to Computer & ICTPravinGhosekar
 
Ics chapter wise notes | ics papers | ICS test | ICS book | ics | test papers
Ics chapter wise notes | ics papers | ICS test | ICS book | ics | test papersIcs chapter wise notes | ics papers | ICS test | ICS book | ics | test papers
Ics chapter wise notes | ics papers | ICS test | ICS book | ics | test papersNaumanMalik30
 
Introduction to information technology lecture 1
Introduction to information technology   lecture 1Introduction to information technology   lecture 1
Introduction to information technology lecture 1CBAKhan
 
information of system technology
information of system technologyinformation of system technology
information of system technologybilal anjum
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internetFrankie Jones
 
Information Technology
Information TechnologyInformation Technology
Information TechnologyAman Purohit
 
XML and Societal Impacts Of IT
XML and Societal Impacts Of ITXML and Societal Impacts Of IT
XML and Societal Impacts Of ITSagar Kalra
 
Chapter 01 bengkel pembelajaran
Chapter 01 bengkel pembelajaranChapter 01 bengkel pembelajaran
Chapter 01 bengkel pembelajaranRahmah Lob Yussof
 
Difference between system software and application software
Difference between system software and application softwareDifference between system software and application software
Difference between system software and application softwareSujon Kumar Dey
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
Lesson 2 - Basics of Computers
Lesson 2 - Basics of ComputersLesson 2 - Basics of Computers
Lesson 2 - Basics of ComputersEricka Tagarda
 
fundamentals of information technology
fundamentals of information technologyfundamentals of information technology
fundamentals of information technologySoundaryaB2
 

Was ist angesagt? (20)

Peter Norton’s Introduction to Computers
Peter Norton’s Introduction to ComputersPeter Norton’s Introduction to Computers
Peter Norton’s Introduction to Computers
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
Introduction to Hardware and Software
Introduction to Hardware and SoftwareIntroduction to Hardware and Software
Introduction to Hardware and Software
 
Internet and Information Technology (IT)
Internet and Information Technology (IT)Internet and Information Technology (IT)
Internet and Information Technology (IT)
 
Introduction to Computer & ICT
Introduction to Computer & ICTIntroduction to Computer & ICT
Introduction to Computer & ICT
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Unit Iv
Unit IvUnit Iv
Unit Iv
 
Ics chapter wise notes | ics papers | ICS test | ICS book | ics | test papers
Ics chapter wise notes | ics papers | ICS test | ICS book | ics | test papersIcs chapter wise notes | ics papers | ICS test | ICS book | ics | test papers
Ics chapter wise notes | ics papers | ICS test | ICS book | ics | test papers
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Introduction to information technology lecture 1
Introduction to information technology   lecture 1Introduction to information technology   lecture 1
Introduction to information technology lecture 1
 
information of system technology
information of system technologyinformation of system technology
information of system technology
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internet
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
XML and Societal Impacts Of IT
XML and Societal Impacts Of ITXML and Societal Impacts Of IT
XML and Societal Impacts Of IT
 
Chapter 01 bengkel pembelajaran
Chapter 01 bengkel pembelajaranChapter 01 bengkel pembelajaran
Chapter 01 bengkel pembelajaran
 
Difference between system software and application software
Difference between system software and application softwareDifference between system software and application software
Difference between system software and application software
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Lesson 2 - Basics of Computers
Lesson 2 - Basics of ComputersLesson 2 - Basics of Computers
Lesson 2 - Basics of Computers
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to Computers
 
fundamentals of information technology
fundamentals of information technologyfundamentals of information technology
fundamentals of information technology
 

Andere mochten auch

Emerging database technology multimedia database
Emerging database technology   multimedia databaseEmerging database technology   multimedia database
Emerging database technology multimedia databaseSalama Al Busaidi
 
Datawarehouse Overview
Datawarehouse OverviewDatawarehouse Overview
Datawarehouse Overviewashok kumar
 
Mobile dbms
Mobile dbmsMobile dbms
Mobile dbmsTech_MX
 
Multimedia Database
Multimedia Database Multimedia Database
Multimedia Database Avnish Patel
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Zara Tariq
 
Literary Genres
Literary GenresLiterary Genres
Literary Genreskrporter
 
Introduction to Literature (Poetry, Drama, Prose)
Introduction to Literature (Poetry, Drama, Prose)Introduction to Literature (Poetry, Drama, Prose)
Introduction to Literature (Poetry, Drama, Prose)Dian Fadhilawati
 
Genres Of Literature
Genres Of LiteratureGenres Of Literature
Genres Of LiteratureACurd
 

Andere mochten auch (13)

Sweta kumari
Sweta kumariSweta kumari
Sweta kumari
 
Spatial Database Systems
Spatial Database SystemsSpatial Database Systems
Spatial Database Systems
 
Emerging database technology multimedia database
Emerging database technology   multimedia databaseEmerging database technology   multimedia database
Emerging database technology multimedia database
 
Datawarehouse Overview
Datawarehouse OverviewDatawarehouse Overview
Datawarehouse Overview
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Mobile dbms
Mobile dbmsMobile dbms
Mobile dbms
 
Multimedia Database
Multimedia Database Multimedia Database
Multimedia Database
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)
 
Literary Genres
Literary GenresLiterary Genres
Literary Genres
 
Types of Genres
Types of GenresTypes of Genres
Types of Genres
 
Genre Analysis
Genre AnalysisGenre Analysis
Genre Analysis
 
Introduction to Literature (Poetry, Drama, Prose)
Introduction to Literature (Poetry, Drama, Prose)Introduction to Literature (Poetry, Drama, Prose)
Introduction to Literature (Poetry, Drama, Prose)
 
Genres Of Literature
Genres Of LiteratureGenres Of Literature
Genres Of Literature
 

Ähnlich wie Internet, Database, Cyber Crime

GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraAmit Chandra
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetFarhanMalik93
 
Unit 6.pptxtfufhjjjjhbvgcfcfcfcfcfcffcfcf
Unit 6.pptxtfufhjjjjhbvgcfcfcfcfcfcffcfcfUnit 6.pptxtfufhjjjjhbvgcfcfcfcfcfcffcfcf
Unit 6.pptxtfufhjjjjhbvgcfcfcfcfcfcffcfcfKwadjoOwusuAnsahQuar
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the InternetAdjeiKwadjo
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxVishwaTej10
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appliTheon Jum
 
Network Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxNetwork Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxSazidHossain9
 
computer networks
computer networks computer networks
computer networks MiXvideos
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and ManagementBry Cunal
 
EDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxEDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxGambari Amosa Isiaka
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notesRavi Rajput
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxGaganaP13
 

Ähnlich wie Internet, Database, Cyber Crime (20)

Ict lecture11b,12,13
Ict lecture11b,12,13 Ict lecture11b,12,13
Ict lecture11b,12,13
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
 
Modules1
Modules1Modules1
Modules1
 
Unit 6.pptxtfufhjjjjhbvgcfcfcfcfcfcffcfcf
Unit 6.pptxtfufhjjjjhbvgcfcfcfcfcfcffcfcfUnit 6.pptxtfufhjjjjhbvgcfcfcfcfcfcffcfcf
Unit 6.pptxtfufhjjjjhbvgcfcfcfcfcfcffcfcf
 
Computer networks
Computer networksComputer networks
Computer networks
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptx
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
Network Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxNetwork Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptx
 
computer networks
computer networks computer networks
computer networks
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
EDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxEDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptx
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 
Networks: The Big Picture
Networks: The Big PictureNetworks: The Big Picture
Networks: The Big Picture
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptx
 
Computer 3
Computer 3Computer 3
Computer 3
 
Hardware1
Hardware1Hardware1
Hardware1
 

Mehr von Gaditek

Digital marketing strategy and planning | About Business
Digital marketing strategy and planning | About BusinessDigital marketing strategy and planning | About Business
Digital marketing strategy and planning | About BusinessGaditek
 
Intro to social network analysis | What is Network Analysis? | History of (So...
Intro to social network analysis | What is Network Analysis? | History of (So...Intro to social network analysis | What is Network Analysis? | History of (So...
Intro to social network analysis | What is Network Analysis? | History of (So...Gaditek
 
Marketing ethics and social responsibility | Criticisms of Marketing
Marketing ethics and social responsibility | Criticisms of MarketingMarketing ethics and social responsibility | Criticisms of Marketing
Marketing ethics and social responsibility | Criticisms of MarketingGaditek
 
understanding and capturing customer value | What Is a Price?
understanding and capturing customer value | What Is a Price?understanding and capturing customer value | What Is a Price?
understanding and capturing customer value | What Is a Price?Gaditek
 
The marketing environment | Suppliers | Marketing intermediaries
The marketing environment | Suppliers | Marketing intermediariesThe marketing environment | Suppliers | Marketing intermediaries
The marketing environment | Suppliers | Marketing intermediariesGaditek
 
strategic planning | Customer Relationships | Partnering to Build
strategic planning | Customer Relationships | Partnering to Build strategic planning | Customer Relationships | Partnering to Build
strategic planning | Customer Relationships | Partnering to Build Gaditek
 
Digital marketing | what is marketing?
Digital marketing | what is marketing?Digital marketing | what is marketing?
Digital marketing | what is marketing?Gaditek
 
Fundamentals of Computer Design including performance measurements & quantita...
Fundamentals of Computer Design including performance measurements & quantita...Fundamentals of Computer Design including performance measurements & quantita...
Fundamentals of Computer Design including performance measurements & quantita...Gaditek
 
Dealing with exceptions Computer Architecture part 2
Dealing with exceptions Computer Architecture part 2Dealing with exceptions Computer Architecture part 2
Dealing with exceptions Computer Architecture part 2Gaditek
 
Dealing with Exceptions Computer Architecture part 1
Dealing with Exceptions Computer Architecture part 1Dealing with Exceptions Computer Architecture part 1
Dealing with Exceptions Computer Architecture part 1Gaditek
 
Pipelining of Processors
Pipelining of ProcessorsPipelining of Processors
Pipelining of ProcessorsGaditek
 
Instruction Set Architecture (ISA)
Instruction Set Architecture (ISA)Instruction Set Architecture (ISA)
Instruction Set Architecture (ISA)Gaditek
 
differential equation Lecture#14
differential equation  Lecture#14differential equation  Lecture#14
differential equation Lecture#14Gaditek
 
differential equation Lecture#12
differential equation Lecture#12differential equation Lecture#12
differential equation Lecture#12Gaditek
 
differential equation Lecture#11
differential equation Lecture#11differential equation Lecture#11
differential equation Lecture#11Gaditek
 
differential equation Lecture#13
differential equation Lecture#13differential equation Lecture#13
differential equation Lecture#13Gaditek
 
differential equation Lecture#10
differential equation Lecture#10differential equation Lecture#10
differential equation Lecture#10Gaditek
 
differential equation Lecture#9
differential equation  Lecture#9differential equation  Lecture#9
differential equation Lecture#9Gaditek
 
differential equation Lecture#8
differential equation Lecture#8differential equation Lecture#8
differential equation Lecture#8Gaditek
 
differential equation Lecture#7
differential equation Lecture#7differential equation Lecture#7
differential equation Lecture#7Gaditek
 

Mehr von Gaditek (20)

Digital marketing strategy and planning | About Business
Digital marketing strategy and planning | About BusinessDigital marketing strategy and planning | About Business
Digital marketing strategy and planning | About Business
 
Intro to social network analysis | What is Network Analysis? | History of (So...
Intro to social network analysis | What is Network Analysis? | History of (So...Intro to social network analysis | What is Network Analysis? | History of (So...
Intro to social network analysis | What is Network Analysis? | History of (So...
 
Marketing ethics and social responsibility | Criticisms of Marketing
Marketing ethics and social responsibility | Criticisms of MarketingMarketing ethics and social responsibility | Criticisms of Marketing
Marketing ethics and social responsibility | Criticisms of Marketing
 
understanding and capturing customer value | What Is a Price?
understanding and capturing customer value | What Is a Price?understanding and capturing customer value | What Is a Price?
understanding and capturing customer value | What Is a Price?
 
The marketing environment | Suppliers | Marketing intermediaries
The marketing environment | Suppliers | Marketing intermediariesThe marketing environment | Suppliers | Marketing intermediaries
The marketing environment | Suppliers | Marketing intermediaries
 
strategic planning | Customer Relationships | Partnering to Build
strategic planning | Customer Relationships | Partnering to Build strategic planning | Customer Relationships | Partnering to Build
strategic planning | Customer Relationships | Partnering to Build
 
Digital marketing | what is marketing?
Digital marketing | what is marketing?Digital marketing | what is marketing?
Digital marketing | what is marketing?
 
Fundamentals of Computer Design including performance measurements & quantita...
Fundamentals of Computer Design including performance measurements & quantita...Fundamentals of Computer Design including performance measurements & quantita...
Fundamentals of Computer Design including performance measurements & quantita...
 
Dealing with exceptions Computer Architecture part 2
Dealing with exceptions Computer Architecture part 2Dealing with exceptions Computer Architecture part 2
Dealing with exceptions Computer Architecture part 2
 
Dealing with Exceptions Computer Architecture part 1
Dealing with Exceptions Computer Architecture part 1Dealing with Exceptions Computer Architecture part 1
Dealing with Exceptions Computer Architecture part 1
 
Pipelining of Processors
Pipelining of ProcessorsPipelining of Processors
Pipelining of Processors
 
Instruction Set Architecture (ISA)
Instruction Set Architecture (ISA)Instruction Set Architecture (ISA)
Instruction Set Architecture (ISA)
 
differential equation Lecture#14
differential equation  Lecture#14differential equation  Lecture#14
differential equation Lecture#14
 
differential equation Lecture#12
differential equation Lecture#12differential equation Lecture#12
differential equation Lecture#12
 
differential equation Lecture#11
differential equation Lecture#11differential equation Lecture#11
differential equation Lecture#11
 
differential equation Lecture#13
differential equation Lecture#13differential equation Lecture#13
differential equation Lecture#13
 
differential equation Lecture#10
differential equation Lecture#10differential equation Lecture#10
differential equation Lecture#10
 
differential equation Lecture#9
differential equation  Lecture#9differential equation  Lecture#9
differential equation Lecture#9
 
differential equation Lecture#8
differential equation Lecture#8differential equation Lecture#8
differential equation Lecture#8
 
differential equation Lecture#7
differential equation Lecture#7differential equation Lecture#7
differential equation Lecture#7
 

Kürzlich hochgeladen

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Kürzlich hochgeladen (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

Internet, Database, Cyber Crime

  • 1. Lecture 12 Internet, Database, Cyber Crime Lecturer: Sumaira Hussain S.M.I University
  • 2. Internet A collection of interconnected networks – looks like a single, unified network
  • 3. Internet  Enables users located at far-way locations to easily share information with others located all over the world  Enables users to easily and inexpensively communicate with others located all over the world  Enables the users to operate and run programs on computers located all over the world  The Internet is unlike any previous human invention. It is a world-wide resource, accessible to all of the humankind.
  • 4. Key Characteristics  Geographic Distribution Global - reaches around the world  Robust Architecture Adapts to damage and error  Speed Data can travels at near ‘c’ on copper, fiber, airwaves
  • 5. Key Characteristics  Universal Access Same functionality to everyone  Growth Rate The fastest growing technology ever  Freedom of Speech Promotes freedom of speech  The Digital Advantage Is digital: can correct errors
  • 6. Internet Networking Protocol Communications on the Internet is controlled by a set of two protocols: TCP and IP TCP/IP Transmission Control Protocol/Internet Protocol TCP breaks down the message to be sent over the Internet into packets IP routes these packets through the Internet to get them to their destination When the packets reach the destination computer, TCP reassembles them into the original message
  • 7. IP Address  A unique identifier for a computer on a TCP/IP network  Format: four 8-bit numbers separated by periods. Each 8-bit number can be 0 to 255  Example: www.smiu.edu.pk (192.254.232.36)
  • 8. Domain Name  A domain name is a meaningful, easy- to-remember ‘label’ for an IP address  Example: www.smiu.edu.pk (192.254.232.36)
  • 9. Domain Name System  DNS is the way that Internet domain names are located & translated into IP addresses
  • 10. Internet Services  FTP  Telnet  Web  eMail  Instant messaging  VoIP
  • 11. File Transfer Protocol (FTP) Used to transfer files between computers on a TCP/IP network (e.g. Internet) Simple commands allow the user to:  List, change, create folders on a remote computer  Upload and download files  Typical use: Transferring Web content from the developer’s PC to the Web server
  • 12. Telnet Protocol Using Telnet, a user can remotely log on to a computer (connected to the user’s through a TCP/IP network, e.g. Internet) & have control over it like a local user, including control over running various programs  In contrast, FTP allows file operations only  Typical use: Configuring and testing of a remote Web server
  • 13. Web  The greatest, shared resource of information created by humankind  A user may access any item on the Web through a URL, e.g. http://smiu.edu.pk/under-graduate-programs.php Protocol Identifier Server Address Directory & File Name
  • 14. E-Mail  Computer-to-computer messaging  Components: eMail Clients  Programs used for writing, sending, receiving, and displaying eMail messages Example: YahooMail SMTP: Simple Mail Transfer Protocol  A protocol used to send and receive eMail messages over a TCP/IP network POP3: Post Office Protocol  A protocol used for receiving eMail messages  A POP3 server maintains text files (one file per user account) containing all messages received by a user
  • 15. Instant Messaging  The IM services available on the Internet (e.g. ICQ, AIM, MSN Messenger, Yahoo! Messenger) allow us to maintain a list of people (contacts) that we interact with regularly  We can send an instant messages to any of the contacts in our list as long as that contact is online
  • 16. Voice over IP (VoIP)  Voice delivered from one device to another using the Internet Protocol  Voice is first converted into a digital form, is broken down into packets, and then transmitted over a TCP/IP network (e.g. Internet)
  • 17. Data & Information  Data refers to raw facts & figures  Information is an organized form of data
  • 18. Data Integrity  Integrity refers to maintaining the correctness and consistency of the data – Correctness: Free from errors – Consistency: No conflict among related data items  Integrity can be compromised in many ways: – Typing errors – Transmission errors – Hardware malfunctions – Program bugs – Viruses – Fire, flood, etc.
  • 19. Database  A collection of data organized in such a fashion that the computer can quickly search for a desired data item
  • 20. Database Management System  DBMS takes care of the storage, retrieval, and management of large data sets on a database  It provides SW tools needed to organize & manipulate that data in a flexible manner  It includes facilities for: – Adding, deleting, and modifying data – Making queries about the stored data – Producing reports summarizing the required contents
  • 21. Database Characteristics  Similar items of data form a column  Fields placed in a particular row are strongly interrelated  One can sort the table w.r.t. any column  That makes searching straight forward e.g., for all the books written by a certain author  Similarly, searching for the 10 cheapest/most expensive books can be easily accomplished through a sort  Effort required for adding a new column to the table is much smaller
  • 22. Example Title Author Publisher Price InStock The Terrible Twins Bhola Champion BholiBooks 199 Y Calculus & Analytical Geometry Smith Sahib Good Publishers 325 N Accounting Secrets Zamin Geoffry Sung-e- Kilometer Publishers 29 Y
  • 23. Example Customer Title Shipment Type Saad The Terrible Twins 24-10-2014 Air Asad Calculus & Analytical Geometry 23-03-2014 Surface Ali Accounting Secrets 12-06-2014 Air They share a column, & are related through it A program can match info from a field in one table with info in a corresponding field of another table to generate a 3rd table that combines requested data from both tables
  • 24. Question who has spent the most money on the online bookstore
  • 26. Relational Database  Databases consisting of two or more related tables are called relational databases  A typical relational database may have anywhere from 10 to over a thousand tables  Each column of those tables can contain only a single type of data (contrast this with spreadsheet columns!)  Table rows are called records; row elements are called fields  A relational database stores all its data inside tables, and nowhere else  All operations on data are done on those tables or those that are generated by table operations
  • 27. RDBMS  Relational DBMS software  Contains facilities for creating, populating, modifying, and querying relational databases  Examples: –Access – DB2 –FileMaker Pro – Objectivity/DB –SQL Server – MySQL –Oracle – Postgres
  • 28. Terminologies  Primary Key is a field that uniquely identifies each record stored in a table  Queries are used to view, change, and analyze data. They can be used to: – Combine data from different tables, efficiently – Extract the exact data that is desired  Forms can be used for entering, editing, or viewing data, one record at a time  Reports are an effective, user-friendly way of presenting data.  Data normalization is the process of efficiently organizing data in a database. There are two goals of the normalization process: – Eliminate redundant data – Storing only related data in a table
  • 29. Cyber Crime 07 February 2000 • Users trying to get on to the Web sites of Yahoo, couldn’t! • Reason: Their servers were extremely busy! • They were experiencing a huge number of hits • The hit-rate was superior to the case when a grave incident (e.g. 9/11) occurs, and people are trying to get info about what has happened • The only problem was that nothing of note had taken place! What was going on? • A coordinated, distributed DoS (Denial of Service) attack was taking place • Traffic reached 1 GB/s; many times of normal! • In the weeks leading to the attack, there was a noticeable rise in the number of scans that Internet servers were receiving • Many of these scans appeared to originate from IP addresses that traced back to Korea, Indonesia, Taiwan, Australia
  • 30. Three Phases of the DoS 1. Search for Drones • The attackers set about acquiring the control over the computers to be used in the attack … • by scanning – using e.g. Sscan SW – a large numbers of computers attached to the Internet • Once a computer with a weak security scheme is identified, the attackers try a break-in • Once conquered, that computer – called a drone – will be used to scan others 2. Arming the Drones • After several drones have been conquered, the DoS SW is loaded on to them • Examples: Tribal Flood Network, Trinoo, TFN2K • Like a time-bomb, that SW can be set to bring itself into action at a specified time • Alternatively, it can wait for a commencement command from the attacker 3. The Actual Attack • At the pre-specified time or on command, the SW implanted on all of the drones wakes-up and starts sending a huge number of messages to the targeted servers • Responding to those messages overburdens the targeted servers and they become unable to perform their normal functions
  • 31. DoS Attack: A Cyber Crime  DoS is a crime, but of a new type - made possible by the existence of the Internet  A new type of policing and legal system is required to tackle such crimes and their perpetrators  Internet does not know any geographical boundaries, therefore jurisdiction is a key issue when prosecuting the cyber-criminal Cyber crime can be used to …  Damage a home computer  Bring down a business  Weaken the telecom, financial, or even defense-related systems of a country
  • 32. Viruses  Self-replicating SW that eludes detection and is designed to attach itself to other files  Infects files on a computers through: – Floppy disks, CD-ROMs, or other storage media – The Internet or other networks  Viruses cause tens of billions of dollars of damage each year  One such incident in 2001 – the LoveBug virus – had an estimated cleanup/lost productivity cost of US$8.75 billion  The first virus that spread world-wide was the Brain virus, and was allegedly designed by someone in Lahore
  • 33. Antivirus SW  Designed for detecting viruses & inoculating  Continuously monitors a computer for known viruses and for other tell-tale signs like: – Most – but, unfortunately not all – viruses increase the size of the file they infect – Hard disk reformatting commands – Rewriting of the boot sector of a hard disk  The moment it detects an infected file, it can automatically inoculate it, or failing that, erase it