V. Internet

Almost 1/3 of humanity is on the Internet.  Two billion out of almost 7 billion people are connected to the Internet and the percentage is rising annually.

The “New Concepts” describing the evolving importance of  Universality, Immediacy and Anonymity on the Internet, were discussed in   III. Exposure.

Rugged is….. understanding and incorporating new and unexpected ideas to safeguard self, family, friends and businesses on the Internet.

  1. Knowing what the current threats are
  2. Learning enough to protect family, friends and business
  3. Adapting as it evolves

Social Media  and Web 2.0 — First 5000 days of the Web (2007) (Kevin Kelly, Editor of Wired)  If you don’t have the most current version of Flash use this link instead:  http://www.ted.com/talks/lang/eng/kevin_kelly_on_the_next_5_000_days_of_the_web.html )

Tim Berners-Lee invented the World Wide Web (WWW) in 1989.  He had a vision for what the web will ultimately evolve into, he called the “Semantic Web”.  His vision was that when the semantic web was fully realized anyone would be able to type a question (much as we do in search engines now), but on the semantic web all connected computers would search, correlate and analyze all relevant data.  Results from a semantic web question would be a  thoughtful analysis of what was asked instead of what we now get which is thousands or millions of references to websites containing the words searched for.  Current web searches don’t actually analyze information.  They simply look for word frequencies (much like a dictionary lookup — current searches don’t draw conclusion like the semantic web would be capable of).  Current searches only return links to URLs leaving it to the human to read each URL correlate, and analyze it.  Wolphram-Alpha is a precursor to the ‘semantic web’.  Ask it a few questions to see the difference between it and a search engine. The semantic web is still a long way away, beyond even the next level of capabilities that will define Web 3.0 (which as yet is undefined).  More about learning through computers and WolframAlpha (If you don’t have the most current version of Flash use this link: http://www.ted.com/talks/conrad_wolfram_teaching_kids_real_math_with_computers.html

“The Web” when it first emerged in the 1990s was full of static pages, much like a book you could read but couldn’t write in.  It wasn’t possible for a web user to add content to a web page through a browser.  To differentiate the static web from the new capability of web servers to interact with browsers on user computers, the retronym “Web 2.0” emerged.  In Web 2.0, programs on web servers use “mobile code”  (sent over the Internet), to run in browsers, email, and other applications.  Mobile code means a server anywhere on the Web can run programs on individual computers without the user knowing or intervening.   Active content refers to the code on the servers that allows users to be interactive with the web server.  In this way, user computers have the capablity of sending information to a server that can then be run on any other computer that subsequently connects to the same web server.   This is what generated the rise of interactive Social Media or New Media such as Facebook, Twitter, Amazon, Blogs, Wiki’s, Internet telephone, streaming video, virual reality environments and more.  As this capability advances the content of this video becomes possible: (If you don’t have the most current version of Flash use this link: http://www.ted.com/talks/lang/eng/pattie_maes_demos_the_sixth_sense.html

Key elements for staying safe on the Web now have to deal with learning how to protect personal information from “free” social media which are free because they sell user information to marketers and others.

  • Email:  the greatest method of infecting individual computers is by people clicking on malicious links in email. (If it is impossible to refrain from clicking email links, then read email in a sandbox — See IX. Plan for more information).
  • Facebook:   10% of those under 18 have ALREADY HAD THEIR IDENTITY STOLEN, because of the amount of PII that is being posted to “new media” sites, like Facebook.  It is such a huge security issue a Secure Facebook! page has been added to the menu above.  The founder of Facebook has implied that he isn’t concerned about individual’s security on Facebook because people forget about it after a while.  Facebook is notorious for changing their settings frequently and without telling users what has changed.   Please click the V. Internet menu, above and select Facebook.
  • Phishing is using a fake web page that looks similar enough to a company’s web page to get a person to enter financial or other data onto the criminal’s fake web page.  This link  Phish or No Phish?  has five excellent examples of phished pages next to the authentic page to show the techniques used in constructing phishing pages.
  • Does your last name begin with a letter from M to Z? If so, you may be more susceptible to clicking on phishing links!  Summary of article from Journal of Consumer Research

What can a hacker see just by you visiting their  webpage?

Can someone identify your computer among the 2 billion on the Internet?  See how unique your computer is http://panopticlick.eff.org/ 

This link http://browserspy.dk/  has a list of items a hacker can collect, just by you visiting his website.  Click on one of the items in the list of tests on the left hand side and on the right it will give the information it is collecting right now from your visit.  Hackers can use that information to trigger a  program that can run an exploit tailored to your computer.  You may not understand how to use it, but hackers call it”fingerprinting” and it’s the first step in deciding what exploits to use on a target.  Look at the Fonts — virtually no two computers have EXACTLY the same fonts so you can either identify a specific computer based on the collection of fonts or, if you’re a bad guy, mimic the fonts of someone you want to frame (!).

Advertisements

56 Responses to V. Internet

  1. JTB says:

    Great information on the Phish or No Phish link. There was a lot of things that I was unaware of that I will definately share with the family. I will be looking into the Extended SSL.

  2. tv says:

    This section is interested comparing to the first four sections.

  3. GTM says:

    Statistics in this section are interesting…. identity theft, and % internet users.

  4. CHR says:

    Ditto JTB comment – Phish or No Phish exercise was very informative.

  5. Heather says:

    With the ever changing enviornment of technology it is hard to imagine we can keep up with the vast amounts of threats out there. These kinds of articles help, hope they get updated with the technology!

  6. Mr. D says:

    I allways caution folks about social sites and e-mail usage: Don’t put anything out there that you would want the whole world to see.

  7. Mr. D says:

    WolframAlpha is bookmarked on my computer. It is absolutely *amazing*.

  8. Jean says:

    Loved the Math video – good article.

  9. Jose H says:

    The fake web site’s were amazing, I only got one correct.

  10. HM says:

    The fake sites really were hard to tell.

  11. ava shaw says:

    Ten percent of our children’s identities have already been stolen and we don’t even know it yet! That is mind boggling.

  12. Kubla says:

    Skynet will always win.

  13. pamela says:

    I agree with previous post, most interesting section yet.

  14. hacker says:

    Phish or No Phish?…5 out of 5 correct… it’s not that hard to figure out once you’ve seen a few (hundred) of them.

  15. IT Genius says:

    The internet will someday replace television as the most watched media.

    • Ryker Abel says:

      We don’t even have cable or satelite service at home. We use Hulu and Netflix for everything that we don’t buy directly.

  16. Lounge says:

    The information about ID theft in children is urging me to make sure my own are protected.

  17. Pandora says:

    Phish or No Phish? was interesting…….got them all correct!

  18. jmfair6j says:

    The Phish or No Phish? was a great link. A few things I didn’t know.

  19. colston says:

    So far the most surprising thing to me in these articles is the threat to children’s identity, I hadn’t thought about that one…

  20. bbb says:

    We should give our employees the Phish or No Phish? test. Most would fail, but it would get them to think a little more next time prior to accessing a site.

  21. Abby says:

    Interesting read about last names that start with M to Z. I wonder if QVC could confirm the M-Z viewers purchase faster than the A to M viewers.

  22. Gina says:

    I think it’s best practice to not be on any social media sites since there is a possibility of getting your personal information stolen.

  23. Charlie says:

    As moore’s law continues to be applied, won’t even 14 letter passwords be easily crackable, then 20 letters, then 40, etc. Should we be moving away from 1 factor authentication altogher?

  24. Prof. Beanbones says:

    No matter how you slice the cake there is no hiding from the internet, you must protect yourself because your info will end up there sooner or later and you cannot control how other companies “secure” your info.

  25. 71070 says:

    The statistics are amazing. Who knew!

  26. The Eye says:

    2B out of 7B people on the Internet–this a staggering number–had no idea.

  27. onehundred says:

    Phishing site comparisons – very good. Patti Maes video ending with maybe brain implants – maybe not.

  28. RLG says:

    Social Media is effectively killing privacy today. Facebook and other similar web applications are encouraging the sharing of personal information in order to build their databases for marketing purposes – the problem is that they don’t know where to stop.

  29. NM says:

    The Test on Phish or No Phish was very good.

  30. IT Person says:

    I found WolframAlpha interesting. Need to rethink how questions are asked though.

  31. Nathan says:

    Enlightening to get a glimpse into the next evolution of the Internet particularly the concept of graphing the Digital onto the Atomic. It reminded me of the movie “The Matrix”. Scary to think that one day I might wake-up and find myself in the Matrix.

  32. NYA says:

    I find the obsession with social media fascinating. While the initial connection to people you haven’t seen in 20+ years is exciting (it is like going to a high school reunion without having to fly back home), I find that I usually go behind and delete the people that I am not really “friends” with in real life.

  33. Arctic says:

    One way to avoid some of these problems………..Common Sense!

  34. drj2011 says:

    The ideas about math and computer language training in school and colleges are very true, and will have to be addressed by educators.

  35. TDK-52798 says:

    Amazed at the number of people using computers without worrying about security issues.

  36. Longshot9 says:

    If only we taught math with a real world application. Ask the kids how much XP they earn for 4 hours of virtual farming versus 4 hours of smithing and watch how fast they figure it out. That which is interesting and practical will be absorbed. Make it relevant.

  37. OctalMan says:

    One spirit that led to the internet was benevolent, one was warlike. The Greeks called the latter Talos. http://en.wikipedia.org/wiki/Talos . Hephaestus is said to have invented him. Hephaestus is the original Geek. http://en.wikipedia.org/wiki/Hephaestus

  38. MArkIsOnTopMyPyramidOfBlame says:

    Ive learned and always teach my friends and students not to fall for fishing emails. Always check for the S in the Https in the URL when going to certain sites like banks and paypal. Sadly this is not anymore secure…..

  39. Buster says:

    Ok, something new to look for. The green address bar

  40. RS says:

    Liked the Phish or No Phish. Didn’t know about the green bar.

  41. AID says:

    Interesting to learn about ‘semantic web’, ‘how unique your computer is’.

  42. Guest says:

    Who would have guessed, 2 million email per second and first letter of your last name. Very interesting.

  43. gfr says:

    having a facebook page is just too much risk in my view…I’ll pass!

  44. EGK says:

    The Internet is starting to smell Phishy!

  45. Mark D. says:

    I’m quoting this from one of the video presentations above, mainly because it’s remarkable.

    “To Do…

    There is only One machine.
    The web is it’s OS.
    All screens look into the One.
    No bits will live outside the web.
    To share is to gain.
    Let the One read it.
    The One is us.”

  46. JW says:

    Phish or No Phish? was an interesting link. I will be sure to spread the news.

  47. Clement Adeola says:

    Internet World Wide Web has revolutionized the way we do things and also the way we view the World around us. It has made the World look like a Global Village where people leaning, exchange idea and also learn about different culture. But it traverse various countries communities and institutions the more risky, complex it become.

  48. Sharkman says:

    Social media sites are still in their infancy. They need time to shake out the bugs, which they are. The next generation will solve the problems of today, however, they will then be dealing with the issues of their day. It’s a vicious cycle (and I’m an generally optimist!!).

  49. 51445 says:

    Do not provide any personal / private information through email sunless you are 100% of the emails you have received or you might be trapped by phishing emails.

    • 51445 says:

      Also Do not provide any personal / private information through unless you have verified the caller or you might be trapped by phishing calls.

  50. Rebecca Kruse says:

    Social Media and Web 2.0 information provided is very interesting.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s