16 Copyright Goodheart-Willcox Co., Inc. Learning Goals After completing this section, you will be able to: • Describe the operation of the Internet. • Use a search engine to locate information. • Identify types of computer threats. Terms antivirus software Boolean operator browser censorship cookie data vandalism hacking hypertext markup language (HTML) malware packet phishing search engine Section 1.2 Internet and Malware The Internet is an interconnected network of networks used for communication. File transfers, electronic mail, messaging, news feeds, and the web are all made possible by the Internet. There are several parts to the Internet. These parts include computers, communication hardware, software, and standards. The World Wide Web is a collection of programs, called web servers, running on Internet networks all over the world. On these servers are over 50 billion hypertext pages, each one with its own uniform resource locator (URL) or web address. Searching through this information is supported by software called a search engine. Learning how to use the Internet is important, but so is maintaining one’s safety while doing so. Protection of digital data requires a combination of technologically advanced hardware, frequently updated software programs, and safe practices and procedures. Not only do you need to have the equipment, applications, and cyber-protection programs, you need to know how to properly use these items. Ultimately, it is the individual computer user who is responsible for cybersecurity. Monkey Business Images/Shutterstock.com