1.1k likes | 1.39k Views
Internet Protocols. www- World Wide Web. Developed by European Laboratory for Particle Physics to allow information sharing between internationally dispersed Physics scientists TCP - Transmission Control Protocol IP - Internet Protocol HTTP - Hyper Text Transfer Protocol
E N D
Internet Protocols • www- World Wide Web. Developed by European Laboratory for Particle Physics to allow information sharing between internationally dispersed Physics scientists • TCP- Transmission Control Protocol • IP- Internet Protocol • HTTP- Hyper Text Transfer Protocol • FTP-File Transfer Protocol
Cyber • The word Cyber is derived from the Greek word Kubernetes meaning steerman. It is used in computer or electronic context. It denotes the control of a thing represented by the word that precedes Cyber. Eg. Cyber crime
Cyber crime • Cyber crime includes the use of a telecommunication device such as Internet or Mobile phone for activities such as Fraud, Theft, Forgery, Harassing, Threatening etc.
Online Cheating • Phishing • Spoofing • Pharming • Internet Auction • Health care Fraud • Online Gambling
Safe Online activities • Stay anonymous- choose a genderless name 2. Never give name or full address to strangers 3. Don’t respond to harassing or negative messages 4. Avoid uncomfortable situation quickly
5. Watch what you say- don’t flirt online 6. Learn more about internet privacy 7. Don’t give email ID to strangers 8. Frequently change your password and answer to the ‘secret question’ 9. Don’t disclose your password to any one, not even to your friends 10. Don’t hesitate in filing a complaint with the police if there is any cyber fraud
IT Act 2008 • Computer & Mobile Related Offences • If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two to three years or with fine which may extend to five lakh rupees or with both.
IT Act Section 66 A • Punishment for sending offensive messages through communication services. • Creating or forwarding any electronic mail message, images, videos etc for the purpose of causing annoyance or inconvenience to a person. • Non-bailable offence. Shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both.
IT Act Section 67 • Punishment for publishing or transmitting obscene material in electronic form • publishing or transmitting any material in an electronic form through SMS, MMS, Blue tooth or email.
IT Act Section 66 E • Punishment for violation of privacy. • Intentionally captures, publishes or transmits the image of a private area of a person without his or her consent. • Shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both
Chat Rooms • Take extreme care during online chatting and browsing blogs and web pages like Orkut. Hackers are waiting for you • Do not reply to anonymous messages and do not give mail ID or full address in such web pages • Use a genderless login name while creating e-mail ID • Frequently change passwords
Online Chatting Take extreme care during online chatting and browsing blogs and web pages like Orkut. Hackers are waiting for you
Cheating Web sites • Pop up Ads • Pornographic sites • Cheating key words – Boy, Girl, Toys, Games • Cheating websites. Original site – www.kerala.gov.in Cheating site – www.keralagov.com Spoofed Websites
CELL PHONES • Perry Long invented Cell phone communication system in 1940. • Erricson in 1956 developed the first fully automatic Mobile phone called MTA(Mobile Telephone system A). This was commercially released in Sweden.
In April 1973, Dr Martin Cooper, former general manager for the systems division at Motorola, invented the mobile phone prototype and made the first call to Joel Engel, his rival, head of research at Bell Labs.
Mobile Phone Systems Two digital mobile phone services are. 1. GSM ( Global System for Mobile Communication) 2.CDMA (Code Division Multiple Access )System.
The mobile phone system is referred to as “cellular telephone system because the coverage area is divided into “cells “each of which has a base station antenna.
The system consist of a Base station antenna which communicates with the mobile phones through Radio Frequency (RF) transmission in the 2.5-3 Giga Hertz range ( Microwave).
The mobile phone tower can communicate to 8 mobile phones in 1 second through time sharing method. The signals are in the form of packets to give two way transmission.
How it communicates? • When we talk on the mobile phone, it takes the sound and encodes on to a continuous “sine wave”. The sine wave radiates out from the antenna of the phone and fluctuates evenly through space.
The signals moving in air are electromagnetic signals. These waves are picked up by the receiver in the base station tower. The base station antenna emits radiations continuously to make a link with the subscribers.
Time Sharing The cell phone tower can communicate with 8 mobile phones in a second. This is called time sharing
GSM & CDMA Phones • GSM - Global System for Mobile communications • It is the most popular mobile phone standard in the world. • CDMA - Code Division Multiple Access It is the channel access method utilized by various radio communication technologies.
GPS Phone GPS or Global Positioning System is the navigation device used for the purpose of determining the present location of a person. GPS is used in military, aviation, marine, geographical surveys, site mapping applications.
Satellite Phone • Satellite telephone, is a type of mobile phone that connects to orbiting satellites instead of terrestrial cell sites.
Smart Phone • A new introduction in mobile technology. • A smart phone offers advanced features, like a computer. It e-mail, Internet browsing and e-book reader facilities in addition to usual facilities.
SIM • Subscriber Identification Module (SIM) • The SIM is a form of digital Smart Card containing the user's subscription information and a phone book.
Secret of SIM • SIM Securely stores the service subscriber key having 15 digits • First 3 digits – Indicates Mobile country code • Second 2 digits – Mobile network code. BSNL, Airtel, Reliance etc. • Third 10 digits – Mobile station identification number. Local station that is connecting.
When you first activates the SIM card, every details like, mobile phone make, pin number, area code, area of activation, server code etc will be recorded automatically in the SIM as well as in the server data base. • So it is easy to trace the mobile communication and location if there is a complaint regarding misuse.
Mobile Phone Terminology • URL – Universal Resource Locator • iPod – intelligent Portable occular device • MPEG – Moving Picture Expert Group • MP3 – Moving Picture – 3( Audio layer 3) • Wi-Fi – Brand name of Wi-Fi Alliance-WLAN
GPRS – General Packet Radio Service - Blackberry system VoIP Phone – Voice over Internet Protocol. The most common type of VoIPis Skype.
EV DO • EV-DO -Evolution-Data Optimized • It is a telecommunication standard for the wireless transmission of data through radio signals. It is typically used for Broad band Internet access. • Example is Wireless modem.
Bluetooth • Blue tooth – It is the technology of Open wireless protocol used for wireless communication between the mobile phone and other Bluetooth activated devices . It is named after Harald blattandBluetooth II, the King of Denmark
Cell Phone A Real Friend…… But… Inconsiderate, Annoying, and Stupid in public places
Like millions of others, you may be the victim of cell phone abuse. • What is cell phone abuse? Let us imagine a situation ……..
You are in a public place trying to concentrate on something or in serious discussion with your friend or enjoying a peaceful moment…… • A stranger 5 to 10 feet away starts talking on his cell phone loudly……
Your concentration breaks or your conversation ends or your peaceful moment disturbs……. • Now you are a victim of cell phone abuse. • You may develop one or more symptoms of cell phone abuse
Symptoms of Mobile abuse • Inability to concentrate on what you are doing 2. Mild or severe irritability or annoyance 3. Sensitivity to ring tones 4. Initially thinking that the cell phone user is actually talking to you
5. Wishing that the user would finish the call 6. Wishing that the user would leave the place 7. Wishing that the battery would die
Cell phone abuse results in • 1. Cyber crime • 2. Invasion of privacy • 3. Health hazards • 4. Social problems • 5.Psychological problems • 6. Financial loss
Radiation Hazards of Mobile Phone