16
Copyright Goodheart-Willcox Co., Inc.
Learning
Goals
After completing this
section, you will be able to:
• Describe the operation
of the Internet.
• Use a search engine to
locate information.
• Identify types of
computer threats.
Terms
antivirus software
Boolean operator
browser
censorship
cookie
data vandalism
hacking
hypertext markup
language (HTML)
malware
packet
phishing
search engine
Sectionnoitce S
1.2 1.2
Internet and Internet and Malware Internet and MMalwareerwala wa
The Internet is an interconnected network of
networks used for communication. File transfers,
electronic mail, messaging, news feeds, and the web
are all made possible by the Internet. There are several
parts to the Internet. These parts include computers,
communication hardware, software, and standards.
The World Wide Web is a collection of programs, called
web servers, running on Internet networks all over the
world. On these servers are over 50 billion hypertext
pages, each one with its own uniform resource
locator (URL) or web address. Searching through this
information is supported by software called a search
engine. Learning how to use the Internet is important,
but so is maintaining one’s safety while doing so.
Protection of digital data requires a combination
of technologically advanced hardware, frequently
updated software programs, and safe practices
and procedures. Not only do you need to have
the equipment, applications, and cyber-protection
programs, you need to know how to properly use these
items. Ultimately, it is the individual computer user
who is responsible for cybersecurity.
Monkey Business Images/Shutterstock.com