5. the internet and its uses Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

what is the internet?

A

is the infacture, a public network of computer systems across the globe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the physical of the internet

A

Computers
Servers
Switches
Routers
Cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the world wide web

A

the collection of resources that exist in the network ( inside the internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are types of resources in the WWW

A

Web pages
Documents
Images
Videos
Music
Emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a unifom resource locator

A

(URL): is a text-based address for a web page; it
can contain the protocol, the domain name and
the web page/file name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the 2 types of protocols

A

HTTP and HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how does the HTTP work

A

uses request codes to send and recieve data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the request codes of HTTP

A

GET:GET request asks the web server to transmit a specific resource, such as a web page, to the user’s web browser.
POST: adds new content
DELETE: removes resources
PUT: modifies source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how does HTTPS work

A

Hypertext transfer protocol secure (HTTPS) is a secure method of sending data via the world wide web, and was invented to combat the glaring security risk of sending sensitive data via the HTTP protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how does HTTPS operate

A

using a TLS
a private key and pulic key are used for security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the function of bookmarks and favourites

A

save important pages which user uses a lot- saves time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

importance of history

A

User history keeps a chronological ledger of each site visited. This is helpful if you cannot remember which website you viewed many weeks or months ago, or if you accidentally close a web browser window and would like to reopen the exact same page again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

importance of multiple tabs

A

allows use of many pages at the same time. his eases browsing between websites, and usually means less computer system resources are used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

importance of storing cookies

A
  • Cookies are small files which store small amounts of data on our computer system, usually used to save our login details for certain websites, or provide advertising agencies with our data.
  • provides companies with some non-personal information about users, including some of their browsing history, in order to provide more personalised adverts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

importance of navigation tools

A

reloading, adding tab, closing tab, going back, going forward etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

importance of providing a adress bar

A

alows browing of web page without a link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

how web pages are located, retrieved and displayed on a device when a user enters a
URL

A

1) user enters URL into the web browser adress bar
2) the URL points to a web page or resouce on WWW.
3) computer connectes to the internet communicate with each other using their IP adresses
4) the DNS server keeps a record of all the domains in existance and maps each of these into a IP adress- looks up domain names and replies request with IP adres
5) the web server will eaither allow or not acess to the source depending on the nature of the request
6) web server returning the resource to the web browser. This is usually raw HTML, which the web browser then translates into a readable format for the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what are cookies

A

HTTP cookies are small pieces of data that are stored on the users’ computer system, and are used by the web browser to retain information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what types of information that cookies retain

A
  • Saving personal details
  • Tracking user preferences
  • Holding items in a shopping cart
  • Storing login details
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are persitent cookies

A
  • provide long term storage for preferences. store login details etc.
  • stored in HDD
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what are session
cookies

A

session cookie is stored temporarily in your computer, stored in ram. used for sensetive info.
a request will be sent after every logging in and wont be saved

22
Q

what is digital currency

A

A digital currency is one that only exists
electronically. has no physical attributes
eg: bitcoin, ethereum, doge coin

23
Q

pros of digital currency

A
  • anonymous
  • anyone can access
  • no taking cut of transaction
    cannot be manipulates by large organizations
  • decentralizes
24
Q

cons of digital currency

A
  • uses lots of resouces to compute hashes
  • some currencies are not accepted widley
  • value tends to fluctuate over short and long term
25
Q

what is block chain

A
  • Blockchain, in its basic form, is a digital ledger,
    that is a time-stamped series of records that
    cannot be altered
26
Q

what type of info do blockchain contain

A
  • Sender wallet address
  • Receiver wallet address
  • Amount sent
  • Network fee (the cost of sending the digital currency using the blockchain)
  • Timestamp
  • Number of confirmations – mutual ‘agreements’ between multiple blockchain nodes adding details of the same transaction
27
Q

most common cyber security threats7

A

brute-force attack
– data interception
– distributed denial of service (DDoS) attack
– hacking
– malware (virus, worm, Trojan horse, spyware,
adware, ransomware)
– pharming
– phishing
– social engineering

28
Q

social engineering

A

art of manipulating or ‘conning’ individuals into giving away private information or login IDs and passwords eg phishing

29
Q

phishsing

A

act of sending a malicious email to a target user, with the intent of stealing information from them

30
Q

brute force attacks

A

a hacker may go through a list of the most common passwords until access to an account is gained. This is usually automated using common hacking tools. Alternatively, the attacker may try every combination of characters until the correct password is found

31
Q

malware

A

software that can cause harm to a computer system. Malware is a broad term which can include viruses, trojan horses and spyware. As well as harming computer systems, they also cause significant financial damage, denial of service (DOS) and lack of functionality to key infrastructure.

32
Q

Ddos attack

A

when a number of computer systems – often thousands – suddenly send an incredible amount of internet traffic towards a single server or system. When this occurs, the bandwidth available for the target system, as well as system resources like CPU and RAM, become strained

33
Q

hacking

A

a general term for gaining access to a computer system without authorisation. A hacker is a person who will attempt to gain access to such systems, using various methods

34
Q

pharming

A

a form of fraud, and takes place online through malicious websites posing as legitimate businesses, such as banks. The goal of pharming is to trick the user into sharing personal information such as bank details, passwords and email addresses

35
Q

data interception

A

when a malicious attacker intercepts data in transit – when it leaves one system to be transmitted to another system – and uses that data for their own criminal activities, or to perform further attacks.

36
Q

virus

A

spreads between computers and causes damage to data and software. They aim to disrupt systems, cause major operational issues and result in data loss or leakage.​

37
Q

worm

A

type of malware with the function to replicate itself and infect other computers, it normally uses a computer network to spread itself relying on security failures.​

38
Q

trojan

A

a specific malware, which disguises itself and subsquently tricks users to downloading harmful malware, which has many consequences to device.​

39
Q

spyware

A

a type of malware that keeps track and records a users keystrokes as you type, to later gain access to passwords and other confidential information.

40
Q

adware

A

Various pop up advertisments that show up in your computer, with the potential to become harmful or malicous​

41
Q

ransom ware

A

malicous softawre, which blocks access to a computer system by encrypting files on a device, until a sum of money is paid​

42
Q

what are the most common ways to protect digital data from security threats

A

ccess levels
– anti-malware including anti-virus and
anti-spyware
– authentication (username and password,
biometrics, two-step verification)
– automating software updates
– checking the spelling and tone of
communications
– checking the URL attached to a link
– firewalls
– privacy settings
– proxy-servers
– secure socket layer (SSL) security protocol

43
Q

access levels

A

A user can only access their personal documents, and not others
A user can only access the shared documents that are relevant to them
Other users cannot view, edit, copy or delete data and information that doesn’t concern them

44
Q

anti virus and anti spyware software

A

actively scan the computer system and, upon finding malicious files or software, either place it in ‘quarantine’ (a safe place on the system) or simply delete it from the system

45
Q

automatic software updates

A

Once a new strain of malware has been identified, software updates are usually very quick to roll out, so having ‘automatic updates’ enabled ensures these protections are automatically downloaded and installed on your system.

46
Q

authentication methods

A

-multi factor authentication
-strong passwords with some requirements
-biometrics

47
Q

firewalls

A

prevent unwanted network traffic to and from your computer by closing and opening ports on a computer system, which are used by different protocols.

48
Q

privacy settings

A

A
This is an effective way to control your visibility and protect you from malicious users looking for your personal information.

49
Q

proxy servers

A

A proxy server acts as a service to hide your IP address,Because your IP address is hidden, attackers cannot target your machine directly.
if an organisation uses a proxy server to connect their employees to the internet, they can control what content is allowed to be accessed.

50
Q

ssl

A

(Secure Socket Layer) is used to secure credit card transactions and data transfer
The padlock icon in your web browser’s address bar means SSL is in use. When you browse with SSL enabled, all traffic between your computer and the website is encrypted, so anyone who intercepts your data cannot make sense of it