Difference Between Surfing And Surfing

Superior Essays
Firstly, the World Wide Web is not the Internet. The web is a feature of the internet, which is a network of computer networks whereas the World Wide Web is a series of interlinked HTML webpages connected by Hyperlinks. Therefore, “surfing” the Web and “surfing” the internet are two different things.
Although the task of retrieving a webpage can be completed in a matter of seconds, it is actually a complex process. Firstly, your device sends a request to the Domain Name System through a router and modem (These are now commonly built into one device), this message then travels to an exchange via a telephone line (ADSL) or Fibre Optic cable (FTTH) and then on to the Internet Service Provider’s network and their DNS. This domain name is then searched
…show more content…
An Internet Service Provider is a telecommunications company which provides Internet access to businesses and people. Historically, an ISP was also the provider of a customer’s telephone service as a telephone line is required for either Dial Up or Asymmetric Digital Subscriber Line (ADSL) connection. However, there has recently been an increase in the number of customers using Fibre To The Home (FTTH), which doesn’t require a BT Telephone line. FTTH has introduced a more competition into the ISP market. The issue with ADSL is the physical limitations of telephone lines, for example, Sky Broadband’s connection has a limit of 17MB/s and in some areas ADSL speeds can drop to just 2MB/s. On the other hand, Virgin Media trailing a 1000MB/s FTTH connection and has rolled out speeds of up 152 MB/s to most of the country. Due to the increased number of devices that can be connected to a home network, the limitations of ADSL means that the the usability of websites has been affected. A large number of people using the same slow ADSL connection could mean that speeds decreased and therefore website take longer to load and complete tasks. A slow download speed is arguably the biggest user side …show more content…
There are numerous ways for hackers to gain access to a user’s computer however the most common way is through a file that has been dowloaded from the world wide web. Hackers have also made use of email by attaching files or hyperlinks to malicious websites. A more recent example of hackers gaining access to internet users’ information is Heartbleed. Heart bleed was discovered in April 2014 as a vulnerability in the Secure Socket Layer security system used on website. This weakness led to the security of almost 4.5 million patient records in the US being compromised.
Phishing has also become a common tactic adopted by malicious users of the internet. Phishing is where a reputable organisation, be it a bank or retailer’s website is copied identically and used to trick customers to log in and therefore handing over their credentials accidentally.
Viruses, which are malicious pieces of software that replicates itself on a computer, have also been transferred through downloads from

Related Documents

  • Great Essays

    B. A web object typically contains many web pages. C. A web page typically contains many web objects 10. A PC user opens her Internet Explorer web browser, types the www.certskills.com/books web address, and presses Enter. The web browser acting alone cannot send a request for that web address directly; it needs help.…

    • 1494 Words
    • 6 Pages
    Great Essays
  • Great Essays

    1. Read the paper; http://www.garykessler.net/library/tcpip.html. Based on this paper (supplement as needed with other material from the Internet), please answer the following. Solution:  Define ARP – one sentence summary is sufficient ARP is an acronym for Address Resolution Protocol which is a network layer protocol used to convert or map IP address into physical address like MAC address.  Explain the difference between network and machine addresses A network address is a unique address which is used as identifier for a node/computer on a network which is internet or intranet.…

    • 1622 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    So if you have several computers on a subnet you can prioritize the applications as well as the devices. 9. (5 points) How does HTTP use TCP and DNS use UDP? The computer will open a HTTP session by opening a TCP connection to the HTTP server. The computer will then send a request to the server, the server responds and sends the data to the HTTP server.…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Computer Viruses Research

    • 2066 Words
    • 9 Pages

    This can range from protecting Facebook conversation chats to protecting online bank account information. Even with things that are password protected hackers still seem to gain access to personal information. Hackers use different kinds of malware to cause damage to their victims. There are many kinds of malware in this world. However, there are…

    • 2066 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    Cybercriminal Crimes

    • 779 Words
    • 4 Pages

    They can amass a plethora of social security numbers, bank account numbers, emails, and credit card numbers from unsuspecting individuals. Before anyone even realizes it cybercriminals can use this stolen information to open multiple accounts and ruin the life of their victim. Many times these criminals never get caught. This is becoming a growing threat throughout the internet-connected…

    • 779 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Essay On Cybersecurity

    • 1115 Words
    • 5 Pages

    “Anything that can connect to the Internet can be vulnerable to certain exploits, and that could end up helping someone get into a network or system and cause much data loss, as well as disruption of services that are provided by the group being affected the by ‘hacker’ (Cormier)”. Cybersecurity is used to stop the hackers, but it does not work all the time. “Thieves using computers can rob banks and steal corporate trade secrets from the other side of the world (Flamini 157).” They can take down government and business websites within minutes (Flamini 157). Cyberwarfare is becoming huge because the technology…

    • 1115 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Isp Research Paper

    • 828 Words
    • 4 Pages

    DNS DNS is means Domain Name Server, this is a system that automatically translates Internet addresses to the numeric machine addresses that computers use, it is the internet’s primary directory service. URL A URL stands for Uniform/Universal resource locator is a reference that specifies a web resources location, URL’s are also used for file transfer (FTP), email (mailto) and database access (JDBC) There are different parts to a URL, such as: Http - this is called a protocol, and it is used in communication between the browser and web server, also protocol is essentially a set of rules for the browser and server. : - The colon separates the protocol from the…

    • 828 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    User Side Factors Analysis

    • 1086 Words
    • 5 Pages

    Is used in front of the webpage name e.g. www.newlook.com . This system supports specifically formed documents that have been formatted in the language of HTML. The reason that this is done is because the form of HTML is not easily understood by many so this would mean that the World Wide Web makes it to access and view many different documents by clicking on hot spots. TCP/IP TCP/IP allows connection hosts on the internet.…

    • 1086 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Ntc300 Unit 1

    • 1895 Words
    • 8 Pages

    Each interface must have a unique IP address that identifies that interface. In our earlier conversations we examined MAC addressing and how layer two capable devices we able to utilize the MAC address to route packets to the desired destination. MAC address switching used layer…

    • 1895 Words
    • 8 Pages
    Improved Essays
  • Superior Essays

    They may also perform tests and exposure assessments. • Cracker – Black hat A cracker gains unauthorized access to computer systems for personal gains with unethical intentions, such as stealing corporate data, violate privacy rights, stealing funds, etc. In the recent past, the official website of the government of Maharashtra was hacked on September 20, 2007. The state government took the help of the Cyber Crime Branch to investigate the case. The website contained detailed information about government departments, circulars, reports, and similar other important data.…

    • 1304 Words
    • 6 Pages
    Superior Essays