Class 10 Info Tech 402 Unit 4 Web Application and Security Notes download pdf

SESSION 3: INTRODUCTION TO INSTANT MESSAGING

Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver. Most instant messaging software includes the option for performing file transfers, audio chat, video calling and conferencing, sharing desktops, etc.

Key Features of an instant messaging are as follows:

  • Text Messages can be sent to one or more people (Similar to SMS)
  • Audio calling and conferencing.
  • Video calling and conferencing.
  • File transfers (Not limited to documents, spreadsheets, audio files, video files, etc.)
  • Message history (Save messages for future reference).

INSTANT MESSAGING SERVICES

There are two kinds of instant messaging software – application-based and Web-based.

Application Based:- This software are downloaded and installed on the user’s computer. Eg. Google Talk, Yahoo! Messenger, Skype, Window Live Messenger, Rediff Bol etc.

Web Based:-They are accessed using browsers such as Internet Explorer etc. Eg. MSN Web Messenger, Yahoo! Messenger for the Web , Meebo , IMO etc.

CREATING AN INSTANT MESSAGING ACCOUNT

In this exercise, you will learn to create an instant messaging account for using Google Talk.

Note: You need to download and install Google Talk application from www.google.com/talk prior to this exercise.

LAUNCHING GOOGLE TALK

• To launch Google Talk, Click Start > Programs >Google Talk>Google Talk.

• You can also double-click on the Google Talk icon on the desktop if available.

You need to have a list of contacts that are available for chat. If you don’t have any

contacts, you can add their Gmail account to your contact list by sending an invite. If you don’t have a Gmail account already you can create a new Gmail account.

SESSION 4: CHATTING WITH A CONTACT – GOOGLE TALK

  • Whenever your friend in the contact list is online you can see the person along with a green dot.
  • You can start sending text chat messages instantly by double-clicking on a contact.

There are some general rules and etiquette to be followed while chatting.

  • Messages should be short and to the point.
  • Always introduce yourself by name if your screen name doesn’t reflect it.
  • Always ask if the other person has time to chat first – regardless of how important you think what you have to say is, it’s not going to be well received if the recipient is busy.
  • Give people time to respond – Multiple questions sent to a recipient before they’ve had a chance to answer can seem more like an interrogation rather than a conversation.

WEB PAGES – BLOG

A blog is a discussion style site used by non-technical users for creating personal web pages. Blog is similar to an online personal diary and similar to use. A blog is used to convey messages, events, news, announcements etc.

Blogs are usually managed through web browser which needs an internet connection. A blog can also be created through Offline Blog Software and later publish the content when the internet connection is available.

Examples of Websites that offer blog services:-www.blogger.com

www.wordpress.com

www.weebly.com

www.blog.com

SESSION 5: USING OFFLINE BLOG EDITORS

If you do not have an active internet connection, you can create blogs using a blog application and publish the blog whenever internet connectivity is available.

There are several free offline blog editors available that can be downloaded and installed on the local computer such as:

  • Qumana
  • Windows Live Writer
  • Blogdesk

SESSION 6: ONLINE TRANSACTIONS

Online Transaction: The transactions over the internet are called Online Transactions.

Like purchasing of goods, selling of goods, booking a ticket, payment of fees etc. all comes under the category of Online transactions

Examples

For Buying Goods :- amazon, jabong, myntra, flipkart , ebay etc.

For Booking of Tickets :- IRCTC

For Payment of School Fee :- epay

Payments tools to use Online transaction

For completing an online transaction we must need:-

  1. Valid Debit Card
  2. Valid Credit Card
  3. Net Banking Subscription

SESSION 7: INTERNET SECURITY

It is a branch of computer security specifically related to the internet, involving browser security and also network security.

Objectives of Internet Security

The main objective of internet security is to establish rules and measures to use against attacks over the internet.

Online Threats

The threats / vulnerabilities that uses World Wide Web (Internet) to

facilitate crimes are called Online Threats.

Like:-

  1. Phishing :- The act of acquiring personal / private and sensitivedata from personal computers for use in fraudulent activities. For eg. Mails from unknown persons that ask for your credit / debit card details.
  2. Email spoofing :– It is the creation of email messages with a forgedsender address. For eg. Sending an email with a forged email address which appears to be original. These mails are infected mails which contain worms.
  3. Chat Spoofing:-Spoofing means hoax, trick, or deceive whichcontains false information. Hiding / Faking the identity of another person over the internet is called chat spoofing

Best practices for security over the Internet

1) Use strong passwords: A combination of alphanumeric and special characters could be used for creating a password that is not so easy to crack or guessed by other users.

General Guidelines for a strong password

  1. Keep the length of the password at least 12-14 characters if permitted.
  2. Avoid keeping passwords based on repetition words, dictionary words, usernames, pet names etc.
    • Include numbers and symbols in passwords.
  3. Use Capital and lowercase letters.
  4. Avoid using the same password for multiple sites or purposes.
  5. Avoid using something that the public or workmates know you strongly like or dislikes.
  • Backup your data: Always keep copies of data in CD, pendrivesetc, so it could be helpful in situation when there is a loss of data.
  • Use Encryption software: Use encrypted software available withinthe operating software to protect data from unauthorized users.
  • Keep username and password private: Never save passwords orusernames on computers that are used in shared environments like net café.
  • Registering with website: Read privacy policy whenever youregister with a website, the policy will include information about how the website use personal data.
  • Do not share personal information: Be cautious when filling outforms on internet. Because your personal information or emails could be used by unauthorized users to send fake or unwanted emails. So, first research and verify if it’s a trusted website or not before providing personal information to any website.
  • Secure transactions: It is always recommended to use only secure websites for online shopping or transactions because these websites store your credit card or online banking personal information. Verify if the website uses secure transactions, usually it is indicated through a digital certificate represented as a golden lock in the web browser’s address bar.
  • Use Antivirus and antispyware software: These softwares protect your computer from any changes by malwares/threats. Keep these softwares up to date.
  • Do not immediately respond to mails from unknown users: Some mails, that promise you jobs or announce lottery results, may contain virus or scripts or they can try to gather your personal information. Never open the attachments from unknown persons.
  • Install firewalls: Firewalls keep your system and networksecure. They could be software or hardware. So, Install and configure your firewall.
  • Regularly update your operating system and software applications.
  • When you visit websites, cookies are created on your system that may contain your personal or logon details. Clear browser cookies frequently so that your logon details could not be tracked by unauthorized users

You cannot copy content of this page

Scroll to Top