5 The internet and its uses Flashcards

Simple right now

You may prefer our related Brainscape-certified flashcards:
1
Q

How many cyber attacks happen each day on average?

2021 published

A

Approximately 2,500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What percentage of malware is delivered using email?

A

Over 90%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What was WannaCry?

A

A large-scale cyber security attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When did WannaCry happen?

A

2017

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What were some nations affected by WannaCry?

A

Britain, Spain, Russia, Ukraine and Taiwan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What was the type of malware used in the WannaCry attack?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In what form was payment demanded in the WannaCry attack?

A

Bitcoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What was the name of the malware code WannaCry was based on?

A

EternalBlue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the internet?

A

A large global network which allows users to access the world wide web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an infrastructure?

A

A physical structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of network is the internet?

A

A wide area network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a network?

A

Computers and devices which are joined together using cables or wireless technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the world wide web?

A

The collective term for all the web pages and websites which have been made available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a website?

A

A collection of web pages, normally about a related topic or with a purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a web page?

A

A single page within a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a uniform resource locator (URL)?

A

The text-based address for a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a web browser?

A

Software which retrieves and displays web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a protocol?

A

A set of rules for transmitting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a domain name?

A

A specific part of a URL which contains the unique name for the web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a domain name server (DNS)?

DNS normally stands for Domain Name System

A

A special server which contains a database of domain names and their corresponding IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a web server?

A

A network component where the web pages for a website are stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the hypertext transfer protocol (HTTP)?

A

A protocol used for the transmission of web pages and related data across the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is hypertext markup language (HTML)?

A

A scripting (web authoring) language that is used to create web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is cascading style sheets (CSS)?

A

A scripting language which is used to create a presentation template for a web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does CSS include? (example)

A

The kind of font and colour text will appear on the webpage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is active script?

A

Script that is used to produce any of the interactive elements of a web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is hypertext transfer protocol secure (HTTPS)?

A

A secure version of the HTTP which encrypts data for transmission and involves digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is encryption?

A

A method of securing data for storage or transmission which scrambles it and makes it meaningless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a digital certificate?

A

A certificate awarded to a website if they can prove that they are a real organisation and take measures to securely transmit their data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a certificate authority?

A

The awarding organisation that checks if another organisation is real and secure before awarding them a digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the secure sockets layer (SSL) protocol?

A

A type of protocol that encrypts data for transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What protocol is the HTTP combined with to create HTTPS?

A

The secure sockets layer (SSL) protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the transport layer security (TLS) protocol?

A

An updated version of the SSL protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What does render mean in the context of computer science?

A

The method of processing all the web page data to display the web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a search engine?

A

Software which lets you find information on the world wide web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is an address bar?

A

The section of a web browser where you type the web page address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is user history?

A

A record made on a web browser of all the web pages that the user has visited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is a bookmark?

A

A link which can be created to allow a user to quickly find a web page again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is a tab?

A

A website function which allows a user to open multiple web pages in the same window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a window?

A

A viewing area that is created in which a software application or file can be opened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What does it mean to navigate between web pages?

A

Move around web pages, or move back or forward to previous web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is a cookie?

A

A small text file that is used to store personal data by a web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a session cookie?

A

A type of cookie that is deleted when the web browser is closed

44
Q

What is a persistent cookie?

A

A type of cookie that is stored by the web browser until it is deleted by the user or because it has expired

45
Q

What is a digital currency?

A

A currency that exists electronically rather than physically

46
Q

What is blockchain?

A

A method that is used to track all the transactions made with a cryptocurrency

47
Q

What is cryptocurrency?

A

A type of digital currency that uses encryption procedures

48
Q

What is a digital ledger?

A

A database that is a list of all the transactions recorded by the use of blockchain

49
Q

Who is a perpetrator?

A

A person who carries out an illegal or immoral action

50
Q

What is a brute-force attack?

A

A type of cyber threat that involves repeatedly inputting a password until the correct one is found to try and break into an account or device

51
Q

What is a biometric password?

A

A type of password that uses a person’s biological data

52
Q

What data might a biometric password use (example)?

A

A person’s fingerprint

53
Q

What is a biometric device?

A

A device that allows a user to record and input a biometric password

54
Q

What is two-step verification?

A

A process that involves inputting two different kinds of data to enter an account or device

55
Q

What is data interception?

A

A process where data packets are intercepted and examined to steal personal data, a perpetrator being responsible

56
Q

What is the purpose of data interception?

A

To steal personal data for criminal activity like identity theft or fraud

57
Q

What security solutions can be used against data interception?

A

Encryption like the SSL protocol used in HTTPS and checking the URL of a website to see if it uses the HTTPS protocol

58
Q

What is a distributed denial of service (DDoS) attack?

A

An attack where malware is sent to many computers to turn them into bots and form a botnet which overwhelms a web server with requests, crashing it

59
Q

What is the purpose of a DDoS attack?

A

To cause the web server to crash

60
Q

What is the motive of a DDoS attack?

A

So the perpetrator can demand money for it to stop or as an act of revenge or activism

61
Q

What security solutions can be used against a DDoS attack?

A

The company can use a proxy server to filter requests requests to the web server and computer users can scan their computers with anti-malware

62
Q

What is a botnet?

A

A network of bots that are created to carry out a DDoS attack

63
Q

What is malware?

A

A type of malicious software that is downloaded onto a user’s computer or device

64
Q

What is a bot?

A

A computer that has had malware downloaded onto it which will cause it to be used in a DDoS attack

65
Q

What is a zombie?

A

A computer that has had malware downloaded onto it to allow it to be used in a DDoS attack, but currently isn’t being used in this way

66
Q

What is a proxy server?

A

A method of cyber security that examines requests sent by devices to access the web pages stored on a web server

67
Q

What is anti-malware?

A

A type of software that scans a computer or device to find and remove any malware

68
Q

What is hacking?

A

The act of gaining unauthorised access to data

69
Q

What are the ways hacking can occur?

A

A hacker may use methods like brute-force attacks or exploit vulnerabilities in a computer or a network

70
Q

What is the motive behind hacking?

A

To steal, corrupt or leak your data for criminal activity, possibly as an act of revenge or activism

71
Q

What are some security solutions which can be used against hacking?

A

A firewall, automatic software updates, strong or biometric passwords and two-step verification

72
Q

Who is a hacker?

A

A perpetrator that carries out an act of hacking

73
Q

What is a firewall?

A

A cyber security method that is used to examine incoming and outgoing traffic from a computer or network

74
Q

What is a port?

A

An entry point into a computer or network

75
Q

What are certain types of malware?

A

Viruses, worms, trojan horses, spyware, adware and ransomware

76
Q

What is a virus?

A

Malware which is downloaded onto your hard drive and replicates itself to corrupt data or fill up available memory, causing the computer to crash

77
Q

What is a worm?

A

A computer program which replicates itself across a network using vulnerabilities it finds to clog up the bandwidth

78
Q

What is spyware?

A

A computer program downloaded onto your hard drive which spies on a user’s actions while they use their computer

79
Q

What is a trojan horse?

A

A computer program used to disguise other malware by looking like harmless software and smuggle the malware into a computer or network

80
Q

What is adware?

A

A computer program that automatically creates popup advertisements and banner adverts when the user is online

81
Q

What is ransomware?

A

A computer program which encrypts a user’s data to prevent them gaining access until a ransom is paid to the creators to decrypt the data

82
Q

What do ransomware creators often threaten to get users to pay the ransom?

A

They threaten to release all the stored data if the ransom isn’t paid

83
Q

What is an anti-virus?

A

A type of software which scans a computer for viruses with the purpose of removing them

84
Q

How does an anti-virus work?

A

It scans all files in a computer and compares them against a known list of viruses, placing any files which match into a quarantine area and asking the user if they want to delete the file

85
Q

Why is it important to update an anti-virus?

A

New viruses are always being developed and anti-virus updates ensure the database the anti-virus checks files against is up-to-date

86
Q

What will an anti-virus do if it finds what it thinks is a virus (by checking against a known virus list)?

A

It will put the file in a quarantine area

87
Q

What is the name of the anti-malware that looks specifically for spyware?

A

anti-spyware

88
Q

What does a firewall do?

A

A firewall examines data coming into and out of a computer against a set of criteria, rejecting the data from being downloaded or leaving the computer if it looks malicious

89
Q

Why is it important a firewall examines outgoing data as well as incoming data?

A

Examining outgoing data can be especially useful in the prevention of spyware. The firewall could prevent data collected about a user leaving the computer, preventing it from being analysed by a perpetrator

90
Q

What is something important a user should do to prevent malware getting on to their computer?

A

A user should be very cautious when clicking links and downloading online software and only do these things from trustworthy sources

91
Q

What is a data backup?

A

A copy of data that is stored separate from the computer

92
Q

How can a data backup help in the case of malware getting on your computer?

A

If your data is damaged by malware (like a virus) or encrypted using ransomware, a user still has access to a copy of their data

93
Q

What will a data backup not do?

A

It will not stop a perpetrator from gaining access to or leaking your data

94
Q

What could you or other organisations do relating to inputting your password to prevent it being sent to a perpatrator?

A

You could use an onscreen virtual keyboard, companies could let you use drop down boxes, ask from random password characters but not the entirety

95
Q

What is pharming?

A

A type of cyber threat where malicious software is downloaded onto a user’s hard drive which redirects a request aimed at a genuine website to a fake one, where the user inputs their personal data, letting it be stolen

96
Q

What are ways the perpetrator gets you to download the malware?

A

Enticing you into clicking a link or icon which begins downloading the malware. They do this through sending emails, creating pop up adverts or having the link available on a web page

97
Q

What should you do if you realise a website is fake after typing your login details in and why?

A

Change your password for that website immediately to help stop the perpetrator being able to long into your account

98
Q

How could you remove the malware installed on your hard drive in pharming?

A

Use anti-malware software to remove it

99
Q

How could you check to see if a website is fake?

A

Check if the URL is the correct one, if the site uses HTTPS, if the website looks like it normally does (colours, images, text, etc.)

100
Q

What is the aim of pharming?

A

To steal a user’s personal data to commit criminal activity like stealing money, identity theft or fraud

101
Q

What security solutions can be used against pharming?

A

Anti-malware software, visually checking the web page and only downloading data from trusted sources

102
Q

What is phishing?

A

A type of cyber threat where a perpetrator sends a user a fake email which has a link to a fake website, where the user is encouraged to give their personal data, allowing it to be stolen

103
Q

What is the purpose of phishing?

A

The perpetrator may use your account to buy products online with your money or use it to get more persona details for identity theft or fraud

104
Q

How does the perpetrator get a user to click the link in the email in phishing?

A

They create an email which looks like it is from a genuine company, like a bank

105
Q

What might a perpetrator say in an email in phishing to get a user to click the link?

A

They may tell the user to click the link to check unusual activity, claim a prize, confirm a purchase or claim a tax refund

106
Q

How could a user prevent themselves from being fooled by a phishing scam?

A

Check the spelling and tone of the email, if it has been personalised, the URL attached to the link, the URL of the website after clicking, if the site uses HTTPS and if the website looks like it normally does