In the following you will find brief descriptions of some essential Internet terms.

 

Back to: Get familiar with the basics of the Internet

Back to: Potential dangers on the Internet

Back to list

  World Wide Web (WWW)

The World Wide Web, commonly known as the Web, is a subset of the Internet. The Web consists of pages that can be accessed by entering the website name in form of a Uniform Resource Locator (URL) in the Web browser.

The URL contains the Hypertext Transfer Protocol (HTTP) which enables the access over the Internet.

The Internet is then the actual network of networks where all the information resides.

  Hypertext Transfer Protocol (HTTP)

HTTP is the protocol used to transfer data over the Internet. It is part of the Internet protocol set. The HTTP provides functions utilized for transmitting webpage data in an unsecured manner.

Therefore, HTTPS (Secured) should be used when ever personal or sensitive data is entered on a website, like for online banking. It is the same as HTTP, but uses a secure socket layer (SSL) for security purposes.

Uniform Resource Locator (URL)  

This term is often used when entering the address for a web page in the browser. Usually, the URL is displayed in the browsers address bar.

A typical URL consists of separate parts. For example it could have the form http://www.example.com/index.html, which indicates a protocol (http or https), a host name (www.example.com) and a file name (index.html).

  Cookies (HTTP-, web-, Internet-, browser cookies)(Not this kind of cookie)

Here, a cookie is a small piece of data sent from a website and stored in a file on the user's device by the web browser.

Cookies were developed for websites to remember information received from the user. This can be data you entered on the website like your name, address, telephone number and so on.

But then, further information about you is possible to store there as well.

Link (Hyperlink)  

A hyperlink, or simply a link, is a reference to data that the reader can directly follow by clicking or tapping.

A link points to a whole document or to a specific element within a document. Same applies for websites. Clicking a link will directly lead to the defined document or website.

The displayed text in a link can be different from the given document or website where it will lead to. It makes the document easier to read.

On the other hand, it is a risk that the link leads to a fake website that may contain harmful software. By moving the cursor on the link, you can check where the link points to.

 

Domain Name Service (DNS)  

It is a service that translates easier to remember website names to numerical IP addresses needed for identifying computer services. On the internet, DNS automatically converts the names typed in a web browser to the IP addresses of web servers hosting those sites. This is necessary because, websites are accessed based on IP addresses.

In principle this works like a telephone book.

User tracking 

Is a practice where, operators of websites collect information about you and your activities on the visited site, like:

  • your IP address

  • Internet Service Provider name

  • browser and operating system type

  • time that you spent on the website

  • what you have looked at and where you have clicked

 

Potentially Unwanted Program or Application (PUP/PUA)

When installing free software, sometimes unwanted programs are added at the same time. In some cases, without your notice.

An unwanted program might modify the behaviour of other programs, or it is an additional security risk.

This is one good reason to follow cautiously the installation process carefully.

Doxing   

Doxing is a method of collecting all available information about an individual using any sources on the internet.

The name comes from “Documents” or “Docx”.

Doxing is based purely on the skills of the hacker to gather valuable information about his target and use this information to his benefit.

In-App Purchases  

In-app purchasing describes a method for buying goods and services from inside an application on mobile devices. Users make an in-app purchase to:

  • expand the functionality of a program

  • to access special content

  • get extra features in an app such as power-ups

  • pass to restricted levels

  • get virtual money

  • or other boosts

Very often this method is used in online-games.

There are various types of payments for the ordered items. An annoying type is automatically extended until you terminate the purchase.

Social engineering 

In the context of information security, it is the psychological manipulation of people so that they release confidential information. A number of tactics may be used, including: taking advantage of human kindness.

Phishing  

Phishing is the attempt to capture sensitive information like user names, passwords, credit card numbers and online banking access codes.

It is used often for criminal activities, by pretending to be a trustworthy source in an electronic communication.There are specific ways used for getting sensitive information.

A typical method is you receive an email from a well-known sender. For an urgent reason you should provide sensitive information on their website. For this a link is provided in the email. After clicking the link, a website opens that look like one from a well-known sender. In reality the site belongs to someone else, usually a hacker that will use the given information for criminal purposes.

 

 QR Code Scam (Qrshing)  

Qrshing is a form of phishing. It uses Quick Response or “QR” codes to direct users to a fake website that distributes malware or asks for confidential information.
There are several possible ways to utilize QR codes for scamming.

Scamming 

Scamming is used to describe any fraudulent business or scheme that takes money or other goods from a person. For example, one scheme is a relationship of trust is build over the Internet. Finally, it leads to a fraudulent act or operation.

Child grooming (Cyber grooming)

The purpose of child grooming is to establish a trustful relationship with a child. Over the Internet abusers will pretend as children and make arrangements to meet with them in person. An alarm signal is when the child should change the platform to a one with secure communication. Very often the objective is sexual abuse of a child. A more general name is cyber grooming.

Drive-by Downloads (Nothing to do with Drive In) 

Drive-by downloads are malicious software downloaded to a computer, tablet or smartphone when the user views a compromised Web page.

The malware is then automatically installed without any notice, as it is done in silent mode.

Ransomware (blackmail software)   

This type of malware prevents the accessing of a system or the own files by:

  • Locking the systems’ screen
  • encrypting the users’ own files

Users are forced to pay a ransom for getting back the access to the system or own files.

 Paying the ransom does not guarantee that users will get back access to the locked system or encrypted files.

Geo-blocking or geoblocking 

It is a technology that restricts access to content on the Internet based upon the user's geographical location. To determine the user's location very often his IP address is checked. There are various reasons for geo-blocking, such as films and television shows, primarily for copyright and licensing reasons.

Virtual Private Network (VPN)  

A VPN is a private network that uses a public network (usually the Internet) to connect to remote sites.

To secure the communication inside a VPN, the traffic is encrypted. Depending on the location and speed of the server, loading of websites may take a little longer.

A VPN might enable you to get access to web content that is in your country not available, because it pretends you are located in another country.

Fake news, fake shops, and fake profiles 

On the Internet everything is virtual and may not necessary exist in reality.

An online shop may have nice pictures or videos and good descriptions, but not a single item in the warehouse. Quite often they have very low prices compared to other online shops. After you have ordered something, you will not receive the item you paid for, or nothing at all.

Fake news has recently increased. It is relatively easy to spread messages on the Internet whose content is not true. Very often fake news spreads on social media.

Fake user profiles are used to hide the real identify to others on the Internet. This is very often used on social media related services. There are several reasons to hide the real identity on the web good and bad.

Deep fake  

A deep fake (deepfake) is a digitally forged image or video of a person that makes them appear to be someone else. It is the next level of intentionally producing fake content that takes advantage of artificial intelligence (AI).
This technology can be utilized for amusing videos but also for the distribution of fake content with negative impact. Deep fake technology is evolving to a point where it will be most likely problematic to distinguish fake videos from authentic ones.

Bots, chat bots, or social bots  

Bots (Internet bots or web robots) are applications that perform certain tasks automated and very fast. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher speed than would be possible for a human.

Chat bots or social bots are used to communicate via auditory or textual methods with other users on Internet-based services. Such applications are designed to convincingly simulate how a human would behave as a conversational partner. Chat bots are typically used in customer service or information acquisition.

Because Bots are getting smarter, their area of use is increasing, even for commercial purposes.

On the other hand, they can also be used for malicious purposes.

The darknet (dark net)  

The darknet is a network, built on top of the normal Internet and it can only be accessed with specific software, like Tor (The onion router).

The darknet allows hiding your identity.

It is a resort for legal and illegal activities.

On the other hand it is the only place to get access to uncensored information in countries where this is not possible.


  Back to start of text

Back to: Get familiar with the basics of the Internet

Back to: Potential dangers on the Internet

Back to list