Lecture2 Networking

advertisement
Lecture2
Networking
Overview
•
•
•
•
•
•
•
Email and spam
World Wide Web
Censorship
Freedom of expression
Children and inappropriate content
Breaking trust on the Internet
Internet addiction
1-2
Networking = Online Behavior
Spam
Sexting
Censorship
Online Pornography
Identity Theft
Email
Web
Internet
3-3
Email and Spam
How Email Works
• Email: Messages embedded in files transferred
between computers
• Messages broken into packets
• Routers transfer packets from sender’s mail
server to receiver’s mail server
1-4
Routers Pass Email from LAN to LAN
1-5
Spam
• Spam: Unsolicited, bulk email
• Spam is profitable
– Profitable even if only 1 in 100,000 buys product
• Amount of email that is spam has ballooned
– 8% in 2001
– 90% in 2009
1-6
The Spam
1-7
Spam
• How Companies get email addresses
– Web sites, chat-room conversations, newsgroups
– Computer viruses harvest addresses from PC address
books
– Dictionary attacks
– Contests
• Spam filters block most spam before it reaches users’
inboxes
1-8
• Reaction to Spam
Slide 4- 9
2. The World Wide Web
Attributes of the Web
• It is decentralized
• Every Web object has a unique address
• It is based on the Internet
1-10
How We Use the Web
•
•
•
•
•
•
•
•
•
•
Shopping
Socializing (e.g., Facebook)
Contributing content (e.g., wikis, blogs)
Blogging
Learning
Entering virtual worlds
Paying taxes
Gambling
Taking humanitarian action
Lots more!
1-11
Tim B-L’s 1st Web Browser - WWW
Slide 4- 12
From http://www.w3.org/History/1994/WWW/Journals/CACM/screensnap2_24c.gif
Twitter
•
•
•
•
More than 200 million users
Blogging tool
(+) Social networks lead to politicization
(-) Ties in social networks too weak for highrisk activism
1-13
Governmental Control: Too Much or Too Little?
• Burma ,Cuba, North Korea: Internet virtually
inaccessible
• Saudi Arabia: centralized control center
• United States: Repeated efforts to limit access of
minors to pornography
1-14
Censorship
Forms of Direct Censorship
• State ownership of media
• Prepublication review
• Licensing and registration
• Control media ,also can lead for censorship.
3-15
Definition of Internet censorship
Internet Censorship Is Control
The Dissemination Of And Access To
Information On The Internet, And Are
Used In control Technology relies On A
Firewall Or Proxy, And This Is Done By
Forcing All Dealers with The Network To
Pass
Through Proxy Servers Before Access To
The Network,
1-16
Challenges Posed by the Internet
•
•
•
•
Many-to-many communications
Dynamic connections
Huge numbers of Web sites
Extends beyond national borders, laws
1-17
Freedom of Expression
Freedom of Expression: History
• Not exist prior restraints on publication
… publish as you, please.
• American states adopted freedom of expression
• Freedom of Expression, Threat to loyalty
• Various restrictions on freedom of expression exist
3-18
Children and Inappropriate Content
Web Filters
• Web filter: Software that prevents display of
certain Web pages
– May be installed on an individual PC
• Methodologies
– Examine content for Inappropriate words/phrases
1-19
Child Internet Protection Act
• You have to filter their networks of
libraries of content inappropriate for
children
1-20
Sexting
• describe the creation and transmission of sexual
images by minors.
• In a 2009 survey, 9% of U.S. teenagers admitted to
sending a sext, 17% admitted to receiving a sext
• Case of Jesse Logan
• Case of Phillip Alpert
• Case of Ting-Yi Oei
1-21
Breaking Trust on the Internet
Identity Theft
• Identity theft: When a person uses another person’s
electronic identity
• identity theft is credit card fraud
• Financial institutions contribute to problem by making it easy
to open new accounts
• About 10 million cases of identity theft in U.S. in 2010
1-22
Identity Theft
• Nearly half of cases from lost credit card, checkbook, etc.
• In 20% of cases, credit card number stolen at time of making
purchase.
• About 1 million cases of identity theft annually in United
States from online activities
1-23
Chat-Room Predators
• Chat room: Supports real-time discussions
among many people connected to network
• Instant messaging and chat rooms replacing
telephone for many people
• Some pedophiles meeting children through
chat rooms
1-24
Download