Difference between revisions of "Online Learning"

(Lesson 1 - The Internet and its Pitfalls)
(Lesson 1 - The Internet and its Pitfalls)
Line 16: Line 16:
  
 
* [[How does the Internet actually work?]]
 
* [[How does the Internet actually work?]]
 
The Internet is the ultimate distributed network. This means that it has no central authority or server. You cannot just switch it off albeit some countries have been known to shutdown connections to the global Internet infrastructure in order to prevent communications with the outside world. Many complex systems make up what we refer to as 'the Internet'. These are simplified and broken down into three mutually-dependent processes in this chapter - Connect, Locate and Interact.
 
  
 
This chapter is a requirement to understanding other topics covered in Lesson 1 and throughout the Internet Security Course.  
 
This chapter is a requirement to understanding other topics covered in Lesson 1 and throughout the Internet Security Course.  
 
 
Exercise 1 Assignment
 
 
Use a Geo-IP traceroute tool (http://traceroute.monitis.com/ ) to view how your connection is routed to a particular website.
 
 
Exercise 2 Assignment
 
 
View your computer's IP by visiting http://hostip.info. You can also view the IP addresses associated with your favourite websites through this system.
 
 
Exercise 3 Assignment
 
 
Exercise: 1. Use the http://hostip.info tool to find out the IP addresses of your favourite websites. 2. Open the Control Panel and locate your Network Connection settings (LAN or Wireless). Manually set the DNS servers to OpenDNS addresses (208.67.222.222208.67.220.220) or use two of the root DNS servers
 
 
  
 
* [[What is Internet surveillance?]]
 
* [[What is Internet surveillance?]]
  
 
A distinction must be made between what we perceive as surveillance in the physical world – a person watching and shadowing your movements, and what occurs on the Internet.  
 
A distinction must be made between what we perceive as surveillance in the physical world – a person watching and shadowing your movements, and what occurs on the Internet.  
 
 
Exercise 4 Assignment
 
 
Install the Wireshark network protocol analyzer (http://www.wireshark.org/) to view traffic on the local network (this exercise is only for those using a cable connection to the network).
 
  
  

Revision as of 19:45, 8 May 2014

This work was done in collaboration and the support of Transitions Online

Introduction

Computers and the Internet are all about information gathering, storage and exchange. Hence, the topic of security in the digital realm relates to the security of information and its communication. The Internet, in theory, provides everyone with an equal opportunity to access and disseminate information. Yet, as time has shown, this is not always the case. Governments and corporations realize the importance and value of controlling information flows, and of being able to decide when to restrict them. The security of information is further complicated by malicious individuals creating computer viruses and hacking into computer systems, often with no other motive than causing damage.

Confusion and complexity is heightened by the abundance of software, hardware and electronic devices built to interact with an increasingly sophisticated and complicated network. Users have to immerse themselves in concepts and technology that seem to be far removed from the real world. The security of your information, online identity and the privacy of your communications falls first and foremost upon your shoulders and requires comprehension of how the Internet and your computer actually work.

The Internet has profoundly changed social interaction and the dissemination of ideas and knowledge. Publication is no longer restricted by geographic or financial boundaries, and any citizen could become a journalist and reach a global audience.

This online training course has several objectives. It aims to educate and raise awareness to the technical aspects behind computer and Internet operations as a precursor to explaining inherent digital risks and vulnerabilities. Because it is virtually impossible to predict and describe in advance every security situation that one could encounter – the emphasis here is to provide enough background information and explanation of risks to make the user aware of the problem and able to make an educated and appropriate response. The other objective is to provide solutions to the most common security threats faced by journalists working in politically repressive countries, as well as links and references to software tools and manuals for further study and exploration of the subject.


Lesson 1 - The Internet and its Pitfalls

This chapter is a requirement to understanding other topics covered in Lesson 1 and throughout the Internet Security Course.

A distinction must be made between what we perceive as surveillance in the physical world – a person watching and shadowing your movements, and what occurs on the Internet.


Lesson 2 – Privacy! On the Internet?

Lesson 3 – Goodbye Censorship!

Lesson 4 - Digital information management

Lesson 5 – Digital investigative journalism

Lesson 6 – Seven steps to better passwords