Web Access Over the Internet Contents Introduction ..................................................................................................................................... 3 The Technologies of Web Access over the Internet ....................................................................... 5 The Different Types of Webs Access over the Internet. ................................................................. 6 The Security and Privacy Considerations of Web Access over the Internet .................................. 7 Conclusion ...................................................................................................................................... 8 References ....................................................................................................................................... 9 Bibliography ................................................................................................................................. 10 Introduction Web access over the Internet refers to the ability to access and browse websites and webbased applications using a web browser, such as Google Chrome, Mozilla Firefox, or Microsoft Edge, over the Internet. The Internet is a global network of interconnected computer networks, and web access is one of the most common ways people use the Internet. When you type in a website address or URL (Uniform Resource Locator) into your web browser, the browser sends a request to the website's server over the internet, and the server responds by sending back the requested web page (Gralla, 1998). Web access over the Internet has become a ubiquitous part of modern life, enabling people to access an ever-increasing amount of information, communicate, shop, bank, and perform many other tasks online. This essay will explore the various aspects of web access over the Internet, including the technologies involved, the different types of web access, and the security and privacy considerations that need to be considered. Web access over the Internet involves a complex series of interactions between different devices, networks, and servers. The following is a high-level overview of how web access over the Internet works: 1. Establishing an Internet Connection: To access the web, a user first needs to have an Internet connection. This can be through a wired or wireless connection provided by an Internet Service Provider (ISP), or through a mobile data network provided by a cellular provider (Gralla, 1998). 2. Entering a URL: Once the user has established an internet connection, they can enter the Uniform Resource Locator (URL) of a website they want to access in the address bar of their web browser. The URL contains the domain name of the website, such as “www.google.com” and is used by the browser to locate the website's server. 3. Resolving the Domain Name: The domain name entered by the user is sent to a Domain Name System (DNS) server, which translates the domain name into an IP address. This IP address is used to locate the server that hosts the website (Gralla, 1998). 4. Sending a Request: Once the IP address of the server is known, the user's web browser sends a request to the server for the website's files. This request is sent using the Hypertext Transfer Protocol (HTTP) or its encrypted version, HTTPS. 5. Processing the Request: When the server receives the request, it checks if the user has permission to access the requested files. If permission is granted, the server gathers the necessary files and sends them back to the user's browser in the form of a response. 6. Receiving the Response: The user's browser receives the response from the server and renders the webpage for display. The webpage is constructed using HyperText Markup Language (HTML), which defines the structure and content of the webpage, and Cascading Style Sheets (CSS), which defines the visual style and layout of the webpage. 7. Displaying the Webpage: Once the browser has received the webpage files, it renders the webpage on the user's device. This includes displaying text, images, videos, and other multimedia elements on the webpage. 8. Interacting with the Webpage: The user can interact with the webpage by clicking on links, filling out forms, or performing other actions. These interactions are processed by the user's browser and sent back to the server as requests for additional files or updates to the webpage. 9. Closing the Connection: Once the user is done interacting with the webpage, they can close the connection to the server by closing the web browser or navigating to a different website. This process may involve multiple devices and networks, such as routers, switches, and firewalls, that work together to ensure the smooth transfer of data between the user's device and the website's server. Understanding how web access over the internet works is essential for anyone who wants to navigate the web and access online content (Zeber et al., 2020). The Technologies of Web Access over the Internet Web access over the Internet involves the use of various technologies to enable communication between web browsers and servers. The primary technologies involved include: 1. HTTP (Hypertext Transfer Protocol): HTTP is the primary protocol used for web communication. It defines how web browsers and servers communicate and transfer data, including text, images, and video. 2. HTML (Hypertext Markup Language): HTML is the primary language used for creating web pages. It defines the structure and layout of web pages, including text, images, links, and other multimedia elements. 3. CSS (Cascading Style Sheets): CSS is a language used to define the visual style and layout of web pages. It allows web designers to create visually appealing and consistent designs across multiple web pages (Choo et al., 2013). 4. JavaScript: JavaScript is a programming language used to create interactive and dynamic elements on web pages. It allows web designers to create complex and interactive applications that can respond to user actions (Gralla, 1998). The Different Types of Webs Access over the Internet. There are several different types of web access over the Internet, including: 1. Static Web Pages: Static web pages are web pages that are created and stored on a web server and are delivered to web browsers exactly as they are. They are typically created using HTML and CSS and do not change unless they are manually edited (Choo et al., 2013). 2. Dynamic Web Pages: Dynamic web pages are web pages that are created and customized based on user inputs and are generated by web applications running on the server. They are typically created using server-side programming languages like PHP, Python, or Ruby, and can include dynamic content like user-generated data, news feeds, and other dynamic elements. 3. Rich Internet Applications: Rich Internet Applications (RIAs) are web applications that are designed to provide a desktop-like user experience, including responsive interfaces, interactive animations, and multimedia elements. They are typically created using a combination of HTML, CSS, and JavaScript, and can leverage various libraries and frameworks to enable advanced functionality. 4. Mobile Web Access: Mobile web access refers to the ability to access web pages and web applications on mobile devices like smartphones and tablets. Mobile web access typically requires web pages to be optimized for smaller screens and slower data connections and can leverage technologies like responsive web design and mobile-specific frameworks to provide a seamless user experience (Maple, 2017). The Security and Privacy Considerations of Web Access over the Internet Web access over the Internet can present various security and privacy challenges, including: 1. Malware and Phishing: Malware and phishing attacks can occur when users visit websites or download files that contain malicious code or links. These attacks can result in the theft of personal information or financial data and can compromise the security of users' computers and networks. 2. Data Breaches: Data breaches can occur when websites or web applications are compromised, resulting in the theft of users’ personal data like email addresses, passwords, and other sensitive information. These breaches can result in identity theft and other forms of fraud and can damage users' trust in the affected websites or companies. 3. Tracking and Surveillance: Web access over the internet can be used to track users' online activities and behaviors, including the websites they visit, the products they purchase, and the searches they make. This information can be used to create detailed profiles of users and to deliver targeted advertising, but it can also raise concerns about privacy and surveillance. 4. Encryption: Encryption is a technique used to protect sensitive information by encoding it so that it can only be read by authorized parties. Encryption is used in web access over the internet to protect users' sensitive data like passwords, credit card numbers, and other personal information. The primary encryption protocol used in web access is HTTPS (Hypertext Transfer Protocol Secure), which encrypts data sent between web browsers and servers (Maple, 2017). 5. Firewalls and Antivirus Software: Firewalls and antivirus software can be used to protect users' computers and networks from malware, phishing attacks, and other online threats. Firewalls monitor incoming and outgoing web traffic and block any suspicious activity, while antivirus software scans files and web pages for malware and other malicious code. 6. Privacy Settings: Many websites and web applications offer privacy settings that allow users to control what information is shared with other users or with third-party advertisers. Users should take the time to review and adjust their privacy settings to ensure that their personal information is not being shared without their consent (Maple, 2017). Conclusion Overall, web access over the internet has transformed the way we access information, communicate with others, and conduct business. While there are certain risks and challenges associated with web access, there are also many benefits. By being aware of the potential risks and taking steps to protect their privacy and security, users can enjoy the benefits of web access over the internet while minimizing the risks (Gralla, 1998). References Choo, C. W., Detlor, B., & Turnbull, D. (2013). Web work: Information seeking and knowledge work on the World Wide Web (Vol. 1). Springer Science & Business Media. Gralla, P. (1998). How the Internet works. Que Publishing. Maple, C. (2017). Security and privacy in the internet of things. Journal of cyber policy, 2(2), 155184. Zeber, D., Bird, S., Oliveira, C., Rudametkin, W., Segall, I., Wollsén, F., & Lopatka, M. (2020). The representativeness of automated web crawls as a surrogate for human browsing. Proceedings of The Web Conference 2020, Bibliography Stallings, William. “Online Privacy: Threats and Requirements.” InformIT Database, 4 Jan. 2020, www.informit.com/articles/article.aspx?p=2995362&seqNum=2. How the Web Works.” MDN Web Docs, 18 May 2019, https://developer.mozilla.org/enUS/docs/Learn/Getting_started_with_the_web/How_the_Web_w orks 9 Types of Webs Portals with Examples. www.monocubed.com/blog/types-of-web-portal/. “Welcome to Web Access” | www.webaccessglobal.com/.