Almost 1/3 of humanity is on the Internet. Two billion out of almost 7 billion people are connected to the Internet and the percentage is rising annually.
The “New Concepts” describing the evolving importance of Universality, Immediacy and Anonymity on the Internet, were discussed in III. Exposure.
Rugged is….. understanding and incorporating new and unexpected ideas to safeguard self, family, friends and businesses on the Internet.
- Knowing what the current threats are
- Learning enough to protect family, friends and business
- Adapting as it evolves
Social Media and Web 2.0 — First 5000 days of the Web (2007) (Kevin Kelly, Editor of Wired) If you don’t have the most current version of Flash use this link instead: http://www.ted.com/talks/lang/eng/kevin_kelly_on_the_next_5_000_days_of_the_web.html )
Tim Berners-Lee invented the World Wide Web (WWW) in 1989. He had a vision for what the web will ultimately evolve into, he called the “Semantic Web”. His vision was that when the semantic web was fully realized anyone would be able to type a question (much as we do in search engines now), but on the semantic web all connected computers would search, correlate and analyze all relevant data. Results from a semantic web question would be a thoughtful analysis of what was asked instead of what we now get which is thousands or millions of references to websites containing the words searched for. Current web searches don’t actually analyze information. They simply look for word frequencies (much like a dictionary lookup — current searches don’t draw conclusion like the semantic web would be capable of). Current searches only return links to URLs leaving it to the human to read each URL correlate, and analyze it. Wolphram-Alpha is a precursor to the ‘semantic web’. Ask it a few questions to see the difference between it and a search engine. The semantic web is still a long way away, beyond even the next level of capabilities that will define Web 3.0 (which as yet is undefined). More about learning through computers and WolframAlpha (If you don’t have the most current version of Flash use this link: http://www.ted.com/talks/conrad_wolfram_teaching_kids_real_math_with_computers.html
“The Web” when it first emerged in the 1990s was full of static pages, much like a book you could read but couldn’t write in. It wasn’t possible for a web user to add content to a web page through a browser. To differentiate the static web from the new capability of web servers to interact with browsers on user computers, the retronym “Web 2.0” emerged. In Web 2.0, programs on web servers use “mobile code” (sent over the Internet), to run in browsers, email, and other applications. Mobile code means a server anywhere on the Web can run programs on individual computers without the user knowing or intervening. Active content refers to the code on the servers that allows users to be interactive with the web server. In this way, user computers have the capablity of sending information to a server that can then be run on any other computer that subsequently connects to the same web server. This is what generated the rise of interactive Social Media or New Media such as Facebook, Twitter, Amazon, Blogs, Wiki’s, Internet telephone, streaming video, virual reality environments and more. As this capability advances the content of this video becomes possible: (If you don’t have the most current version of Flash use this link: http://www.ted.com/talks/lang/eng/pattie_maes_demos_the_sixth_sense.html
Key elements for staying safe on the Web now have to deal with learning how to protect personal information from “free” social media which are free because they sell user information to marketers and others.
- Email: the greatest method of infecting individual computers is by people clicking on malicious links in email. (If it is impossible to refrain from clicking email links, then read email in a sandbox — See IX. Plan for more information).
- Facebook: 10% of those under 18 have ALREADY HAD THEIR IDENTITY STOLEN, because of the amount of PII that is being posted to “new media” sites, like Facebook. It is such a huge security issue a Secure Facebook! page has been added to the menu above. The founder of Facebook has implied that he isn’t concerned about individual’s security on Facebook because people forget about it after a while. Facebook is notorious for changing their settings frequently and without telling users what has changed. Please click the V. Internet menu, above and select Facebook.
- Phishing — is using a fake web page that looks similar enough to a company’s web page to get a person to enter financial or other data onto the criminal’s fake web page. This link Phish or No Phish? has five excellent examples of phished pages next to the authentic page to show the techniques used in constructing phishing pages.
- Does your last name begin with a letter from M to Z? If so, you may be more susceptible to clicking on phishing links! Summary of article from Journal of Consumer Research
What can a hacker see just by you visiting their webpage?
Can someone identify your computer among the 2 billion on the Internet? See how unique your computer is http://panopticlick.eff.org/
This link http://browserspy.dk/ has a list of items a hacker can collect, just by you visiting his website. Click on one of the items in the list of tests on the left hand side and on the right it will give the information it is collecting right now from your visit. Hackers can use that information to trigger a program that can run an exploit tailored to your computer. You may not understand how to use it, but hackers call it”fingerprinting” and it’s the first step in deciding what exploits to use on a target. Look at the Fonts — virtually no two computers have EXACTLY the same fonts so you can either identify a specific computer based on the collection of fonts or, if you’re a bad guy, mimic the fonts of someone you want to frame (!).