Although the task of retrieving a webpage can be completed in a matter of seconds, it is actually a complex process. Firstly, your device sends a request to the Domain Name System through a router and modem (These are now commonly built into one device), this message then travels to an exchange via a telephone line (ADSL) or Fibre Optic cable (FTTH) and then on to the Internet Service Provider’s network and their DNS. This domain name is then searched …show more content…
An Internet Service Provider is a telecommunications company which provides Internet access to businesses and people. Historically, an ISP was also the provider of a customer’s telephone service as a telephone line is required for either Dial Up or Asymmetric Digital Subscriber Line (ADSL) connection. However, there has recently been an increase in the number of customers using Fibre To The Home (FTTH), which doesn’t require a BT Telephone line. FTTH has introduced a more competition into the ISP market. The issue with ADSL is the physical limitations of telephone lines, for example, Sky Broadband’s connection has a limit of 17MB/s and in some areas ADSL speeds can drop to just 2MB/s. On the other hand, Virgin Media trailing a 1000MB/s FTTH connection and has rolled out speeds of up 152 MB/s to most of the country. Due to the increased number of devices that can be connected to a home network, the limitations of ADSL means that the the usability of websites has been affected. A large number of people using the same slow ADSL connection could mean that speeds decreased and therefore website take longer to load and complete tasks. A slow download speed is arguably the biggest user side …show more content…
There are numerous ways for hackers to gain access to a user’s computer however the most common way is through a file that has been dowloaded from the world wide web. Hackers have also made use of email by attaching files or hyperlinks to malicious websites. A more recent example of hackers gaining access to internet users’ information is Heartbleed. Heart bleed was discovered in April 2014 as a vulnerability in the Secure Socket Layer security system used on website. This weakness led to the security of almost 4.5 million patient records in the US being compromised.
Phishing has also become a common tactic adopted by malicious users of the internet. Phishing is where a reputable organisation, be it a bank or retailer’s website is copied identically and used to trick customers to log in and therefore handing over their credentials accidentally.
Viruses, which are malicious pieces of software that replicates itself on a computer, have also been transferred through downloads from