Difference between revisions of "The Internet and its pitfalls"
(Created page with " How does the Internet actually work? Page The Internet is the ultimate distributed network. This means that it has no central authority or server. You cannot just switch it...") |
(→Conclusion) |
||
(3 intermediate revisions by the same user not shown) | |||
Line 5: | Line 5: | ||
This chapter is a requirement to understanding other topics covered in Lesson 1 and throughout the Internet Security Course. | This chapter is a requirement to understanding other topics covered in Lesson 1 and throughout the Internet Security Course. | ||
+ | |||
+ | |||
+ | Exercise 1 Assignment | ||
+ | |||
+ | Use a Geo-IP traceroute tool (http://traceroute.monitis.com/ ) to view how your connection is routed to a particular website. | ||
+ | |||
+ | |||
+ | Exercise 2 Assignment | ||
+ | |||
+ | View your computer's IP by visiting http://hostip.info. You can also view the IP addresses associated with your favourite websites through this system. | ||
+ | |||
+ | |||
+ | Exercise 3 Assignment | ||
+ | 1. Use the http://hostip.info tool to find out the IP addresses of your favourite websites. 2. Open the Control Panel and locate your Network Connection settings (LAN or Wireless). Manually set the DNS servers to OpenDNS addresses (208.67.222.222208.67.220.220) or use two of the root DNS servers. | ||
+ | |||
+ | |||
+ | What is Internet surveillance? | ||
+ | |||
+ | A distinction must be made between what we perceive as surveillance in the physical world – a person watching and shadowing your movements, and what occurs on the Internet. | ||
+ | Assignment Hidden from students: Exercise 4 Assignment | ||
+ | |||
+ | Install the Wireshark network protocol analyzer (http://www.wireshark.org/) to view traffic on the local network (this exercise is only for those using a cable connection to the network). | ||
+ | |||
+ | |||
+ | |||
+ | Conclusion | ||
+ | |||
+ | The Internet was not built with privacy in mind. Your data passes through numerous other computers and network equipment before arriving at its destination. Authorities that have set-up and control this equipment can monitor your data and restrict your access to certain websites and Internet resources. |
Latest revision as of 18:46, 8 May 2014
How does the Internet actually work? Page
The Internet is the ultimate distributed network. This means that it has no central authority or server. You cannot just switch it off albeit some countries have been known to shutdown connections to the global Internet infrastructure in order to prevent communications with the outside world. Many complex systems make up what we refer to as 'the Internet'. These are simplified and broken down into three mutually-dependent processes in this chapter - Connect, Locate and Interact.
This chapter is a requirement to understanding other topics covered in Lesson 1 and throughout the Internet Security Course.
Exercise 1 Assignment
Use a Geo-IP traceroute tool (http://traceroute.monitis.com/ ) to view how your connection is routed to a particular website.
Exercise 2 Assignment
View your computer's IP by visiting http://hostip.info. You can also view the IP addresses associated with your favourite websites through this system.
Exercise 3 Assignment
1. Use the http://hostip.info tool to find out the IP addresses of your favourite websites. 2. Open the Control Panel and locate your Network Connection settings (LAN or Wireless). Manually set the DNS servers to OpenDNS addresses (208.67.222.222208.67.220.220) or use two of the root DNS servers.
What is Internet surveillance?
A distinction must be made between what we perceive as surveillance in the physical world – a person watching and shadowing your movements, and what occurs on the Internet. Assignment Hidden from students: Exercise 4 Assignment
Install the Wireshark network protocol analyzer (http://www.wireshark.org/) to view traffic on the local network (this exercise is only for those using a cable connection to the network).
Conclusion
The Internet was not built with privacy in mind. Your data passes through numerous other computers and network equipment before arriving at its destination. Authorities that have set-up and control this equipment can monitor your data and restrict your access to certain websites and Internet resources.