5. The internet and its uses Flashcards

1
Q

What’s the difference between the internet and the worldwide web?

A
  • The Internet is a global infrastructure of interconnected networks.
  • The World Wide Web is all the web pages that are accessible via the Internet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the difference between HTTP/HTTPS?

A

HTTP:

  • the standard protocol used to communicate across the web.
  • Any data you enter into the site whether it be your name, address, bank details, etc. It is sent in plaintext and is susceptible to hacking

HTTPS:

  • Secured protocol
  • Any data that is transmitted between the website and your browser is encrypted.
  • Data is not understandable to anyone intercepting it.
  • The server that you are connecting to is authenticated to ensure the site is genuine.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the functions of the browser?

A
  • Storing cookies
  • Recording user history
  • Storing bookmarks and favorites
  • Allowing the use of multiple tabs
  • Providing an address bar
  • Providing navigation tools
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the function of HTML(Hypertext Markup language)?

A
  • To render the Hypertext Markup Language (HTML) used to code a web page
  • To display the resulting web page as the user should see it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the role of DNS(Domain name server)?

A
  • To convert a website address (URL) into an IP address so that a browser on a client machine can make a request to the correct web server hosting that web page.
  • If the DNS server does not have an entry for the domain name, it passes the request to another more authoritative DNS server.
  • An error is sent back if no match is found.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are cookies?

A
  • Cookies are small files or code stored on a user’s computer
  • they can track data about a user, such as IP addresses and browsing activity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the difference between session and persistent cookies?

A

Session cookies:

  • Stored temporarily on a user’s computer
  • Once the browser’s closed, the website session ends and the cookie is deleted.

Persistent cookies:

  • Remember’s user’s log-in details
  • Cookies are stored on user’s hard drive until expiry date’s reached or user deletes them
  • Remains in operation even after browser is closed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the advantages of accepting cookies?

A
  • Remembers login details
  • Websites will remember personal customizations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is digital currency?

A
  • A digital currency is any money-like asset that only exists in digital form and is exchanged digitally, with no physical banknotes or coins in circulation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain why digital currencies are growing in popularity? (3)

A
  • Reduces any related transfer fees
  • speeds up the time a transaction can take to complete
  • This improves security and anonymity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are forms of attack and defense?

A
  • HACKING - gaining unauthorized access to data (use firewalls to block access by unauthorized devices)
  • MALWARE: PHARMING - The user types in a legitimate address and is redirected to a fake website (Check URL - HTTPS, not HTTP. Using a trusted Internet Service Provider (ISP)
  • MALWARE: SPYWARE - Software secretly recording your activities to send back to a third party for analysis(Use Anti-malware software/Anti-spyware software)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a virus?

A
  • A program that is installed on a user’s computer without their knowledge/permission to harm.
  • It also includes instructions to replicate automatically on a computer and to other computers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a worm?

A
  • It is a program that corrupts files and steals info but doesn’t self-replicate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Trojan horse?

A
  • A program that masquerades as having one legitimate purpose but has another.
  • Normally, spread by email.
  • The user is invited to click on the link for some everyday or interesting purpose, which then executes a program that may give the controller unauthorized access to your computer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ransomware?

A
  • A form of malware that encrypts a victim’s files.
  • A ransom is then demanded from the attacker in return for instructions on how to decrypt the files.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Adware?

A
  • Malware that automatically displays onscreen advertisement which may lead to the user clicking and redirecting the browser to a dangerous/unsafe site that may contain spyware.
17
Q

What is Spyware?

A
  • A malware that enables the remote user to gather activities, passwords, and payment info from another user’s computer.
18
Q

What is the purpose of a distributed denial of service(DDOS) attack?

A
  • The process of a DDOS attack involves using a network of infected computers, known as a botnet, to flood the target server or network with traffic.
  • A DDOS attack aims to disrupt the availability of a service, such as a website, making it inaccessible to legitimate users.
19
Q

How do biometrics keep data safe and what are the methods included?

A
  • Biometrics use pre-recorded human characteristics to authenticate authorized users of a system or device.
  • Methods include: Face recognition, Iris and Retina scanners, Fingerprint or palm recognition, and voice recognition
20
Q

Explain the process of ‘two-step verification’.

A
  • Two-step verification involves two authentication methods performed one after the other (to prove someone’s identity)
  • For example, a 4-digit code may be sent in an email or text message to your phone, which you have to type in to complete a login process
21
Q

What is the purpose of passwords?

A
  • Passwords are effective at preventing access to systems.
  • Passwords should be secure and changed regularly
22
Q

What is the purpose of Automatic software updates?

A
  • Will keep applications and the operating system constantly up-to-date.
  • Enables bugs and security flaws in the software to be fixed, as soon as they are known about it, with a patch.
23
Q

What is the purpose of privacy settings?

A
  • Privacy settings allow a person to control what information about them is shared on a social media platform.
  • A user can control who has access to what they post, and who can see their full profile.
24
Q

What’s a proxy server?

A

A proxy server is any machine that checks and forwards traffic between networks or protocols.

25
Q

What is meant by social engineering?

A

Social engineering is the dishonest manipulation of people to cause them to divulge data or info against their better judgment

26
Q

Explain what is meant by blockchain technology

A

Blockchain technology is used to record transactions in a digital ledger, where each transaction is time-stamped.

27
Q

Give two advantages of blockchain technology

A
  • Improved transparency
  • Increased security
28
Q

Give three ways in which a phishing attack may be recognized

A
  • Poorly written or punctuated email.
  • Links reveals a fake address when hovered over than expected
  • Email not addressed to you personally
29
Q

Describe one consequence of a phishing attack.

A
  • Installation of malware when the link is clicked
30
Q

Why is standard protocol necessary?

A
  • The Worldwide Web (WWW) would fail to operate
  • No way to ensure that every browser can access every web server using the same rules.
31
Q

Three uses of persistent cookies.

A
  • Saves user’s items in a virtual shopping cart
  • Remembers emails and passwords about a user
  • Shows user preferences, e.g. language used
32
Q

Describe the main differences and any similarities between digital currency and cryptocurrency

A
  • Both types of currency are in a digital format and have no physical form unlike traditional money, such as £, $, €
    and ¥.

● Digital currency relies on a central banking system to make a transaction, whereas cryptocurrency has no state control and there is no need for a central banking system.

● Cryptocurrency uses a method known as blockchaining

33
Q

Three uses of block chaining other than monetary transactions.

A
  • In contracts
  • In politics
  • In research, e.g. for the development of drugs
34
Q

Give three functions of a cookie.

A
  • Saving personal details
  • Storing login details
  • Tracking user preferences
35
Q

State two aims of carrying out a DDoS attack

A
  • Revenge
  • Entertainment value
36
Q

Give two security solutions that can be used to help prevent a DDoS attack from being successful.

A
  • Proxy server
  • Firewall