INTERNET BASICS
1.1 Describe a URL, its functions and components, different types of URLs, and the use of the appropriate type of URL to access a given type of server. Content may include the following:·
·
1 126 |
Class A |
128 191 |
Class B |
192 223 |
Class C |
224 239 |
Class D (multicast) |
Addresses cannot consist of all zeros, or all ones, and the entire 127 domain is reserved because 127.0.0.1 is set aside as the loopback address.
· Port TCP and UDP use port numbers for services. The port numbers for common services are:
21 |
FTP |
23 |
Telnet |
25 |
SMTP |
80 |
HTTP/WWW |
110 |
POP3 |
119 |
NNTP |
389 |
LDAP |
These ports are the default, and if you change the service to another port, those accessing it must specify the new port in their request. For example, if the web service is changed from port 80 to port 800, the URL to access the site ds-technical.com becomes: http://www.ds-technical.com:800
1.2 Identify the issues that affect Internet site
functionality (e.g., performance, security and reliability).
Content may include the following:
·
Bandwidth The amount of data that
can be simultaneously transmitted on a medium. Most
often, the amount of bandwidth that can be used by
a site is equal to the amount of bandwidth that can
reach the site. This can be changed, however, by invoking
bandwidth throttling. Throttling allows you to reduce
the amount of bandwidth the site can offer, thus leaving
the server hosting the site with additional bandwidth
that can be allocated to other services or other sites.
·
Internet connection points the majority
of users access the Internet through ISPs.
·
Audience access the audience the
users you are publishing to should be considered
when posting. If your users are predominantly low-speed
dial-up users, then files to be downloaded should
be compressed, etc.
·
Internet Service Provider (ISP) ISPs
access the Internet through Network Access Points
(NAPs).
·
Connection types connections can be
established through dial-up service, proxy service,
dedicated lines (ISDN, T1, etc.), all of which are
explored in later sections of the objectives.
·
Corrupt files corruption can occur
at any time and prevent users from accessing your
resources successfully. It is important to test your
files before posting/uploading them, and to always
continue to check them for corruption and correct,
as needed.
·
Files taking too long to load consider
the access the median audience is using to reach your
site. Instead of posting one 88-page PDF file that
will take forever to load, break the file into eleven
8-page segments that can be loaded individually.
·
Inability to open files can be caused
by browser dependencies. Try to avoid browser dependencies
whenever and wherever possible.
·
Resolution
of graphics is the number of determining factor
in the clarity of the graphics, and is expressed in
bits: the greater the number of bits, the better the
graphic. While 24-bit graphics are perfect for an
ideal world, if you want to serve all users, you should
use 8-bit graphics as that is as high as you can go
and support the 256-color monitors still in use.
1.3
Describe the concept of caching and its implications.
Content may include the following:
·
Server caching caching can be done here
but requires a great deal of RAM
·
Client caching allows sites revisited
to be brought to the browser quickly
·
Proxy caching allows users to access
site data quicker as it is always faster to send the
data at the speed of the LAN medium than at the speed
of site access
·
Cleaning out client-side cache should
be done on a routine basis such as with Tweak/UI that
can do so on each boot or activation and can restore
hard drive space
·
Server may cache information as well
·
Corrupt files
·
Web page update settings in browsers
allow you to configure how often to access/cache data,
etc.
1.4
Describe different types of search indexes static
index/site map, keyword index, full text index. Examples
could include the following:
·
Searching your site can be graphically
represented via a site map.
·
Searching content the basics of rules
for searching include:
A | Finds pages with word A |
B | Finds pages with word B |
A B | Will find words A and words B |
A B | Will find the words A and B together |
+A B | Requires word A to be in the search results |
A B | Will find words A that do not contain words B |
INTERNET CLIENTS
2.1
Describe the infrastructure needed to support an Internet
client. Content could include the following:
·
TCP/IP stack TCP/IP is a four-layer
protocol that matches up to the seven-layer OSI model
in functionality.
·
Operating system - The stack is implemented
differently in different operating systems, Windows-based
operating systems implement it as a DLL - Winsock
·
Network connection the connection can
be through any number of possibilities, including dial-up,
proxy, direct
·
Web browser uses port 80 by default,
and can be configured with a number of features (caching,
cookie acceptance, etc.) . The most popular browsers,
at this time, are Netscape and Internet Explorer both
of which run on multiple operating system platforms.
·
E-mail is commonly accessed via POP3
and sent via SMTP. This functionality can be accomplished
through the browser in many cases, or other programs.
·
Hardware platform (PC, WebTV, Internet
phone) the one necessity is the TCP/IP protocol.
2.2
Describe the use of Web browsers and various clients
(e.g., FTP clients, Telnet clients, email clients, all-in-one
clients/universal clients) within a given context of
use. Examples of context could include the following:
· When you would use each browsers are used to view the graphical content of the World Wide Web, with
FTP is used to upload and download files. Both allow for anonymous access to sites, though it can be prohibited if security is a concern. Telnet sessions allow a user to establish
a dumb-terminal connection to a server and run processes on the server as if he/she were sitting there instead of at the remote host. Email clients, as the name implies, are used
to send and receive email. Popular email packages/clients are elm, pine, Eudora.
·
The basic commands you would use (e.g.,
put and get) with each client (e.g., FTP, Telnet)
to place a single file on an FTP site, you use the put
command. To place multiple files on an FTP site,
you can use mput. To retrieve a single
file from an FTP site, use get, or use
mget to retrieve multiple files. With
telnet, the command to initiate the session is telnet
itself, the location to go to, for example:
Telnet 1.2.3.4
Or
Telnet redial.com
Once a connection is established, you must logon to the server with a valid username and password (plain text) as if you were sitting at the server. You can end the connection a number of ways, with exit being the most common command, then close the telnet application.
2.3
Explain the issues to consider when configuring the
desktop. Content could include the following:
·
TCP/IP configuration (NetBIOS name server
such as WINS, DNS, default gateway, subnet mask) NetBIOS
names (also known as computer names) exist in the Microsoft
operating system world. NetBIOS-to-IP resolution can
be done through static files (LMHOSTS) or dynamically
with a Windows Internet Naming Service (WINS) server.
As opposed to NetBIOS names (Microsoft-only), host names exist is all operating systems (Microsoft, Unix, etc.). On a small network, host name-to-IP resolution can be accomplished through the use of HOSTS files. On a large network such as the Internet this resolution can be accomplished via the use of Domain Name Service/Server machines. DNS servers divide the extent of their coverage area into zones, with a primary and secondary server for each.
To configure TCP/IP on a host, you need only three values with one being that of default gateway (the other two are IP address and subnet mask). The default gateway is the IP address of the router all data not intended for this network should go to.
A subnet mask divides the total number of hosts available for one network into a smaller number available for a number of networks. The subnet mask value is based upon the class of network you have. Default values by class, and the maximum number of hosts are:
Class | Default Subnet Mask | Total number of Hosts for Network |
A | 255.0.0.0 | > 16 million |
B | 255.255.0.0 | >65,000 |
C | 255.255.255.0 | 254 |
·
Host file configuration the host
file must exist on every machine that is performing
host name-to-IP address resolution in order for
it to work properly. It can consist of an unlimited
number of lines, with each line limited to 255 characters
in length. The format for the file is that the first
column is an IP address, and all other columns on
that line (separated by any white space tab, space,
etc.) are aliases for that IP address. The pound
sign (#) anywhere on a line makes the rest of the
line a comment.
·
DHCP versus static IP Dynamic Host
Configuration Protocol (DHCP) servers can simplify
administration of IP addresses by dynamically issuing
them to clients, and not requiring them to be hardcoded
by an administrator. DHCP is built on BOOTP (Boot
Protocol) and leases addresses from a scope. When
the leases expire, the IP addresses are placed back
in the scope for use by another client. At any time,
the leases can be renewed or released.
·
Configuring browser (proxy configuration,
client-side caching) proxy servers can be configured
to do active caching to automatically retrieve
pages that are commonly viewed and store them locally
for access for users.
2.4
Describe MIME types and their components. Content
could include the following:
·
Whether a client can understand various
types (MIME, HTML, and uuencode) MultiPurpose
Internet Mail Extensions (MIME) makes it possible
to send non-ASCII files over email and have them
supported on the client machine. Web browsers use
MIME to understand how to display non-HTML data
within the browser.
·
The
need to define MIME file types for special download
procedures such as unusual documents or graphic
formats there are standard MIME types recognized
by all, and it is possible for any user/administrator
to create their own.
2.5
Identify problems related to legacy clients (e.g.,
TCP/IP sockets and their implication on the operating
system). Content could include the following:
·
When troubleshooting problems, look
for revision dates, and manufacturer/vendor values
and use them to determine if you have the most current
software available. Troubleshooting problems and
performance issues can often be tied to compatibility
issues and differing versions of the Web browser.
2.6
Explain the function of patches and updates to client
software and associated problems. Content could
include the following:
·
Patches
should never be blindly applied as you run the risk
of taking a working system and making changes that
can adversely affect performance. When new patches
become available, you should always download them
and carefully read the documentation, which accompanies
them. If you are experiencing none of the problems
addressed by the patch, or there would be no performance
gain by applying it, then do not apply it. If the
patch looks beneficial, then try it on a single
system first to look for problems that might arise
before rolling it out to all computers.
2.7
Describe the advantages and disadvantages of using
a cookie and how to set cookies. Content could include
the following:
·
Cookies are unencrypted text files
stored on the clients computer with, or without,
the users knowledge. Cookies hold values about
the user or the users preferences (such as a shopping
cart) that can be read and written to when the user
accesses a site. Cookies contain expiration dates
(which can be equal to none); dates
last modified, last accessed, and last checked.
Whether cookies are accepted without prompting or
not is largely based upon the browsers security
settings. In IE, you can choose to set whether cookies
will:
1. Always be accepted
2. Require prompting before accepting
3. Be disabled
In all cases, the main purpose of a cookie is identification.
DEVELOPMENT
3.1
Define programming-related terms as they relate to Internet
applications development. Content could include the
following:
·
API The Application Programming Interfaces
are the building blocks by which Windows-based software
applications are built by programmers.
·
CGI the Common Gateway Interface is
a program/language that runs on servers and provides
a means to customize output to the user. It is server-based
and performs all operations there (versus ActiveX and
Java applets which run on the client). Because a process
must be initiated each time the program is run, CGI
tends to be server-intensive, while ISAPI and other
server-solutions can avoid spawning a new process with
each iteration and not be as intensive on the server.
·
SQL the Structured Query Language is
used to find/place information in a database. Using
ODBC (Open DataBase Connectors), the Web server can
interact with a SQL server and pull up information such
as from a catalog database and post the results in HTML
to the user.
·
SAPI the Speech API is used for voice
and telephony applications
·
DLL Dynamic Linking Libraries are the
method by which common executable routines are made
available in the Windows-based environment. Drivers
and executables depend upon DLLs to provide functionality
that can be accessed, making programming much easier.
·
Client and server-side scripting while
CGI and ISAPI are examples of server-side scripting,
examples of client-side scripting can include Java applets,
Active Server Pages, and ActiveX. Any execution that
occurs within the browser is known as client-side programming,
while any execution that occurs before data reaches
the browser is known as server-side.
3.2
Describe the differences between popular client-side
and server-side programming languages. Examples could
include the following:
·
Java an object-oriented programming
language created by Sun Microsystems that allows programs
to be run in almost every operating system (via a Java
Virtual Machine)
·
JavaScript created by Netscape to provide
active content on web sites
·
Perl Practical Extraction and Report
Language an interpretive language (requires an interpreter)
that can be used to write CGI scripts and perform text
processing tasks
·
C a programming language that has been
around for almost 30 years that uses a small amount
of resources and can run on most operating systems
·
C++ - the object-oriented counterpart
to C. It is used for graphical environments and runs
on most operating systems.
·
Visual Basic a graphical programming
language that is event-driven. It typically requires
an executable to be compiled before being able to be
run on a users machine
·
VBScript a non-compiled scripting language
based on Visual Basic that allows controls to be added
to web pages.
·
Jscript a non-compiled scripting language
based on Microsofts implementation of JavaScript (which
came from Netscape).
·
XML eXtensible Markup Language allows
multiple HTML links (versus the standard one) and is
a chopped down version of SGML (Standard Generalized
Markup Language). It is useful for shopping sites and
others that can have multiple results needed for an
action. Many believe XML will replace HTML eventually
for writing web pages.
·
VRML Virtual Reality Modeling Language
a plug-in that allows the display of 3-D objects within
web browsers.
·
ASP Active Server Pages run only on
the Windows NT platform and allow processing to be done
on the server (which sends back pure HTML) and on the
client (which is processed within the browser, but can
be viewed in Source.)
3.3 Describe the differences between a relational database and a non-relational database.
A flat-file database holds all data in one solitary table, while a relational database stores data in different tables (each of which can be in a different format). Relational databases are far more complicated than flat-file databases, but also much more flexible and scalable for big installations.
3.4 Identify when to integrate a database with a Web site and the technologies used to connect the two.
A database should be integrated with a web site anytime you need to return values from it to the user, or input values from the user into it. In the first scenario, a database could be used to show inventory on hand when queried by partners in your extranet. In the second scenario, a database could be used to collect mailing addresses from users who want to receive your catalog.
ODBC - Open DataBase Connector allows the Web server to interact with a SQL server.
3.5 Demonstrate the ability to create HTML pages.
Always employ cross-browser coding in your html, and verify compatibility between different browsers. Know that using the <UL> syntax will produce a non-ordered, non-numbered list. Using the <OL> syntax will produce a numbered and ordered list. To insert a command to run a script, use the syntax: <script language="JavaScript">.
The correct syntax for a link to D S Technical Solutions is <A HREF="http://www.ds-technical.com">D S Technical</A>. To insert an image, the correct syntax is <IMG SRC="image.gif ">
The "© " syntax produces the copyright symbol - ©. The <tr> syntax is used to signify rows in a table and is not a required component on all HTML pages.
3.6
Identify popular multimedia extensions or plug-ins.
Examples could include the following:
·
QTVR (quick time) Created by Apple,
it allows video, audio, and animation to be displayed
with its strength laying in the ability to show 3-D
photos and artwork
·
Flash from Macromedia, allows you to
create vector-based web sites
·
Shockwave from Macromedia, it is a Netscape
plug-in or an ActiveX control that allows
for animation on web sites, as well as audio and video.
·
Real Player plays RealAudio and RealVideo
files on the Windows and Mac operating systems
·
Windows Media Player designed by Microsoft,
and does not require any additional hardware. It plays
files with the extension of .AVI and support several
compression methods.
3.7 Describe the uses and benefits of various multimedia file formats.
JPEG (Joint Photographic Experts Group) compresses images smaller than GIF (Graphics Interchange Format), but GIF maintains resolution and sharpness even when compressed. GIF89a adds animation to GIF images by using multiple images in one file.
PNG Portable Network Graphic files resemble GIF images but do not use the patented compression algorithm employed by GIF. PDF Portable Document Format files are files (typically document) that can be read on any platform with Adobes Acrobat Reader. RTF Rich Text Format was created by Microsoft and allows commands such as fonts to be incorporated directly in the file.
TIFF Tagged Image File Format files are highly supported bitmapped graphics files that can be any resolution. PostScript files are documents containing laser printer object-oriented command language for specifying typeface, fonts, etc. EPS Encapsulated PostScript is the graphics side of PostScript.
BMP files are the default bitmapped images used in the Windows world, while MOV is the file format for movies.
MPEG Moving Picture Experts Group files are compressed digital video files considered to be of higher quality than QuickTime and others. Compression is done by only saving the changes between images instead of all the images.
AVI Audio Video Interleave is the format used by Microsofts Video for Windows.
BINHex can convert binary data into ASCII data (extension .HQX) - allowing it to be sent through email. Streaming media allows a browser to begin displaying the data as it is sent to it. With Non-streaming media, all the data must be received before processing begins.
3.8
Describe the process of pre-launch site/application
functionality testing.
Before launching a site, you must: check hot links, test different browsers, test to ensure the new site does not corrupt your e-commerce sites and that it can be accessed, perform load testing, and test with various speed connections.
NETWORKING
4.1
Describe the core components of the current Internet
infrastructure and how they relate to each other. Content
may include the following:
·
Network access points NAPs are how/where
ISPs connect to the Internet and effectively form the
backbone.
·
Backbone the main structure behind which
the Internet is built.
4.2
Identify problems with Internet connectivity from source
to destination for various types of servers. Examples
could include the following:
·
E-mail
·
Slow server
·
Website
4.3
Describe Internet domain names and DNS. Content could
include the following:
·
DNS entry types DNS records consist
of different types of information. Key among them is:
Cname | an alias name/canonical name |
Mx | mail receiver for the organization |
A | system name |
NS | authoritative computer for the domain |
. | the root server |
Com | commercial venture |
ds-technical | the company |
bubba | the computer in question |
If
bubba is the primary server for the organization
and running the web server, then www.ds-technical.com
becomes bubba.ds-technical.com.
·
Role of root domain server the root
server is responsible for the resolution of for
the organization/zone.
·
Top level or original domains edu,
com, mil, net, gov, and org exist within the United
States. Outside of the United States, two letter
country level domains are used, such as .UK, .au,
etc.
4.4
Describe the nature, purpose, and operational essentials
of TCP/IP. Content could include the following:
·
What addresses are and their classifications
(A, B, C, D) see Section 1.1
·
Determining
which ones are valid and which ones are not (subnet
masks) subnets must be created by borrowing numbers
that could be used for the address of the host to
identify the address of the subnet. While some vendors
differ, most require sequential use of the bits
from the left to the right and prevent using all
0s or all 1s. Given that, the following become
the only valid subnets for a Class C network:
Subnet Address | Maximum Number of Subnets | Maximum number of Hosts on a Class C network |
192 | 2 | 62 |
224 | 6 | 30 |
240 | 14 | 14 |
248 | 30 | 6 |
252 | 62 | 2 |
254 | 126 | invalid |
255 | 254 | invalid |
Class of network desired | Starting address | Last available address |
A | 10.0.0.0 | 10.255.255.255 |
B | 172.16.0.0 | 172.31.255.255 |
C | 192.168.0.0 | 192.168.255.255 |
4.5
Describe the purpose of remote access protocols.
Content could include the following:
·
SLIP Serial Line Internet/Interface
Protocol - the oldest line protocol of the group,
it can only be used with TCP/IP, does not offer
error correction or support dynamic IP addressing
·
PPP Point to Point Protocol - an
enhancement to SLIP, it offers error correction,
support for dynamic IP addressing, the use of protocols
other than TCP/IP and password logons
·
PPTP Point to Point Tunneling Protocol
- Microsofts enhancement over PPP, it allows for
secure connections over the Internet by tunneling
other protocols within TCP/IP packets. An alternative
to PPTP is L2F (Layer 2 Forwarding) from Cisco.
Tunneling is also known as encapsulation and both
PPTP and L2F are used to create Virtual Private
Networks (VPNs).
4.6
Describe how various protocols or services apply
to the function on a Mail system, Web system, and
file transfer system. Content could include the
following:
·
POP3 used for retrieving mail
·
SMTP used for sending mail
·
HTTP protocol of the web service
·
FTP used to upload and download
files
·
NNTP (news server) allows subscription
to news servers
·
TCP/IP protocol of the Internet
·
LDAP - Lightweight Directory Access
Protocol - is built on the X.500 standard and allows
applications to obtain directory access and information.
·
LPR the command used to print files
to the LPD service (NT) or daemon (Unix).
·
Telnet allows establishment of a
dumb terminal session
·
Gopher an archaic method of seeing
content on the Internet prior to WWW
4.7
Describe when to use various diagnostic tools for
identifying and resolving Internet problems. Content
could include the following:
·
Ping an all-purpose utility for
verifying that a remote host can be reached by bouncing
bytes of data to it
·
WinIPCfg or IP Config shows the IP
configuration data for a Windows 95/98 system
·
ARP Address Resolution Protocol
shows the resolution between IP addresses and
physical (MAC) addresses
·
Trace Routing Utility tracert
works like ping but shows the hops taken to reach
the remote host
·
Network Analyzer used to analyze
packets of data sent across the network
·
Netstat shows the statistics for
TCP/IP on a host
4.8
Describe hardware and software connection devices
and their uses. Content could include the following:
·
Network interface card (NIC) the
physical entity within the host to which the networking
cabling is connected
·
Various types of modems including
analog, ISDN, DSL, and cable:
Analog | Traditional modem requires a single phone line for a connection and is limited in speed to around 57,600bps |
ISDN | Integrated Services Digital Network, requires two phone lines, and can reach a speed around 128,000bps |
DSL | Digital Subscriber Line, uses existing phone lines (copper), and is available only in certain areas. You must be within a short distance of a switching station, and speeds can reach 9Mbps |
Cable | Works with the coaxial from the cable TV company and speeds is reduced with the number of users, but is approximately 2Mbps |
ATA | Answer |
ATD | Dial |
ATH | Hang up |
ATX | Exit |
·
Adapter same as NIC
·
Bridge used to connect two (and only
two) networks together. Can be used with nonroutable
protocols
·
Internet-in-a-box a complete solution
for Internet service
·
Cache-in-a-box available from a number
of vendors, essentially a hard drive on the network
for storing cache
·
Hub a device that sends all data that
comes in out to all ports
·
Router used to connect multiple networks
together using routing tables requires routable protocols
·
Switch similar to a hub, but directs
data which comes in only to the port it the data is
intended for
·
Gateway an upper layer device that can
connect dissimilar networks together for the purpose
of passing application data (such as email) back and
forth
·
NOS a Network Operating System any
operating system that supports networking such as NetWare,
Windows NT, etc.
·
Firewall either a hardware or software
entity that protects a network by stopping network traffic
from passing through it. In most cases, a firewall is
placed on the network to allow all internal traffic
to leave the network (emails to the outside world, web
access, etc.), but stop all traffic from the outside
world from entering the internal network
4.9
Describe various types of Internet bandwidth technologies
(link types). Content could include the following:
·
T1/E1 a T1 is a dedicated line that
operates across 24 channels at 1.544Mbps. E1 is the
European counterpart: it uses 32 channels and can run
at 2.048Mbps
·
T3/E3 A T3 is a dedicated line of 672
channels (E3 is the European counterpart) able to run
at speeds of 43Mbps
·
Frame relay a packet switching protocol
supporting T1 and T3
·
X.25 a packet-switching standard widely
used in WANs
·
ATM Asynchronous Transfer Mode uses
53-byte cells for all transmissions
·
DSL see section 4.8
4.10
Describe the purpose of various servers what they
are, their functionality, and features. Content could
include the following:
·
Proxy used to provide Internet access
for clients, perform caching
·
Mail
·
Mirrored duplicates data so that it
is not lost in the event of a hardware failure
·
Cache - stores data
·
List sends messages received to all
members of a mailing list
·
Web (HTTP) -
·
News provides subscription content
·
Certificate issues security keys
·
Directory (LDAP) allows directory listing
·
E-commerce allows for commercial transactions
with security implied
·
Telnet
dumb terminal sessions
·
FTP uploading and downloading of files
INTERNET SECURITY
Access control |
access control lists (ACLs) reside with the resource
and verify what users can access said resource firewalls prevent intruders from entering the network from the outside world packet filters do as the name implies proxy servers act on the behalf of the clients |
Authentication |
Must/should encompass:
· Digital Certificates · Digital signatures · non-repudiation (the ability to prove who sent data) |
Encryption |
public and private keys use two values. The first
(public) is known by all, while the second (private)
is known only by the one user. This is known as
asymmetric encryption (with symmetric encryption,
the same key is used to encode and decode) secure socket layers (SSL)- allows for data to be transmitted across a secure connection S/MIME an enhancement to MIME that supports RSA's public-key encryption of email messages digital signatures an attachment to email used to uniquely identify a sender. X.509 is the most common standard for digital certificates Be aware of global versus country-specific encryption standards when exporting |
Auditing |
Consists of:
· intrusion detection utilities · log files · auditing logs |
SET (Secure Electronic Transactions) | a standard for using digital signatures to uniquely identify users and allow for credit card transactions over the Internet |
5.2 Describe VPN and what it does.
·
Virtual Private Networks are built using
PPTP or other tunneling protocols to provide encrypted
(secure) communications across the Internet. They
are used for connecting two different company sites
such as with an extranet, or for allowing a remote
user to securely access a site.
5.3
Describe various types of suspicious activities.
Possible symptoms are:
·
Multiple
login failures
·
Denial of service (DoS) attacks wherein
the system is kept so busy responding to non-legitimate
traffic/requests that it cannot service legitimate
users.
·
Mail flooding/spam (overwhelming a site
with junk email)
·
Ping floods - Flooding a site with ICMP
echoes (also known as smurfing)
·
Syn floods- when a client attempts to
establish a connection with a host on TCP/IP, the
first request sent is a SYN. In a Syn flood, you overwhelm
a host with SYN requests for connections.
5.4
Describe access security features for an Internet
server (e.g., mail server, Web server).
Internet security access features can include the
use of:
·
User names and passwords this is the
minimal level of access that should be acceptable.
·
File level assigning permissions to
files for access by anonymous and known users
·
The use of digital certificates
·
File-level access: read
is needed for viewing and downloading, write
is needed to modify/change/create/upload, no
access cancels all other rights
5.5
Describe the purpose of anti-virus software and when
to use it.
Anti-virus software, as the name implies, identifies
viruses when they enter the system and stops them
from damaging data on the system. Anti-virus software
can, and should, be located on both:
·
Browser/client
·
Server
5.6
Describe the differences between the following as
they relate to security requirements:
·
Intranet with an Intranet, you isolate
the site from the world (typically with a firewall),
and do everything you can to keep outsiders from knowing
the site exists or accessing it
·
Extranet with an Extranet, some of
the world must know that your site exists typically
your vendors and partners and you limit the access
to only them and your internal personnel. This is
best accomplished through the use of a Virtual Private
Network.
·
Internet the purpose of an Internet
site is for the world to know of its existence and
come to it to learn of your products, data, information,
and other offerings. By default, all users enter the
site as the anonymous user and permissions are assigned
to anonymous to affect all users
BUSINESS CONCEPTS
6.1
Explain the issues involved in copyrighting, trademarking,
and licensing. Content could include the following:
·
How to license copyright materials all
copyrights are done through the Library of Congress
and require only filling out a few forms and submitting
them with the requisite fee
·
Scope of your copyright copyrights apply
to written works (versus patents for inventions and
trademarks for symbols and trade names). A copyright
owner has exclusive rights to the work
for the life of the author plus fifty years. A fair
use clause prohibits copyrighting material that
cannot be construed as being unique.
·
How to copyright your material anywhere
a notice of copyright (©, or Copyright) should
clearly appear within the work and two copies should
be submitted within three months of first being published
with the copyright office.
·
Consequences of not being aware of copyright
issues, not following copyright restrictions since
the copyright is good for such a lengthy duration of
time, there is no justifiable reason for violating such,
and repercussions can occur at any time (no statute
of limitations). Penalties are determined by the legal
process and can range from restitution to more severe.
6.2 Identify the issues related to working in a global environment.
When
working in a global environment, consider:
·
Different currencies, understanding of
terms, legality of agreements, etc.
·
International issues such as shipping,
supply chain
·
Multi-lingual or multi-character issues
(Unicode). Unicode allows for thousands of languages
to be derived from within a single character set
·
Legal and regulatory issues
6.3
Define the following Web-related mechanisms for audience
development (i.e., attracting and retaining an audience):
·
In push technology, the browser gets information
pushed to it without it requesting it. In pull technology
- on which most of the web is based - a user requests
data before it is sent down
6.4
Describe the differences between the following from
a business standpoint:
·
Intranet, Extranet, and Internet see
section 5.6
6.5
Define e-commerce terms and concepts. Content could
include the following:
·
EDI Electronic Data Interchange a
means of transferring data between dissimilar companies
·
Business to Business
·
Business to Consumer
·
Internet commerce
·
Merchant systems
·
Online Cataloging
·
Relationship management
·
Customer self-service
·
Internet marketing
If
you have any questions, please click below:
i-Net+ Questions