5. The internet and its uses Flashcards
What’s the difference between the internet and the worldwide web?
- The Internet is a global infrastructure of interconnected networks.
- The World Wide Web is all the web pages that are accessible via the Internet.
What’s the difference between HTTP/HTTPS?
HTTP:
- the standard protocol used to communicate across the web.
- Any data you enter into the site whether it be your name, address, bank details, etc. It is sent in plaintext and is susceptible to hacking
HTTPS:
- Secured protocol
- Any data that is transmitted between the website and your browser is encrypted.
- Data is not understandable to anyone intercepting it.
- The server that you are connecting to is authenticated to ensure the site is genuine.
What are the functions of the browser?
- Storing cookies
- Recording user history
- Storing bookmarks and favorites
- Allowing the use of multiple tabs
- Providing an address bar
- Providing navigation tools
What is the function of HTML(Hypertext Markup language)?
- To render the Hypertext Markup Language (HTML) used to code a web page
- To display the resulting web page as the user should see it.
What is the role of DNS(Domain name server)?
- To convert a website address (URL) into an IP address so that a browser on a client machine can make a request to the correct web server hosting that web page.
- If the DNS server does not have an entry for the domain name, it passes the request to another more authoritative DNS server.
- An error is sent back if no match is found.
What are cookies?
- Cookies are small files or code stored on a user’s computer
- they can track data about a user, such as IP addresses and browsing activity.
What’s the difference between session and persistent cookies?
Session cookies:
- Stored temporarily on a user’s computer
- Once the browser’s closed, the website session ends and the cookie is deleted.
Persistent cookies:
- Remember’s user’s log-in details
- Cookies are stored on user’s hard drive until expiry date’s reached or user deletes them
- Remains in operation even after browser is closed
What are the advantages of accepting cookies?
- Remembers login details
- Websites will remember personal customizations
What is digital currency?
- A digital currency is any money-like asset that only exists in digital form and is exchanged digitally, with no physical banknotes or coins in circulation.
Explain why digital currencies are growing in popularity? (3)
- Reduces any related transfer fees
- speeds up the time a transaction can take to complete
- This improves security and anonymity.
What are forms of attack and defense?
- HACKING - gaining unauthorized access to data (use firewalls to block access by unauthorized devices)
- MALWARE: PHARMING - The user types in a legitimate address and is redirected to a fake website (Check URL - HTTPS, not HTTP. Using a trusted Internet Service Provider (ISP)
- MALWARE: SPYWARE - Software secretly recording your activities to send back to a third party for analysis(Use Anti-malware software/Anti-spyware software)
What is a virus?
- A program that is installed on a user’s computer without their knowledge/permission to harm.
- It also includes instructions to replicate automatically on a computer and to other computers.
What is a worm?
- It is a program that corrupts files and steals info but doesn’t self-replicate
What is a Trojan horse?
- A program that masquerades as having one legitimate purpose but has another.
- Normally, spread by email.
- The user is invited to click on the link for some everyday or interesting purpose, which then executes a program that may give the controller unauthorized access to your computer.
What is ransomware?
- A form of malware that encrypts a victim’s files.
- A ransom is then demanded from the attacker in return for instructions on how to decrypt the files.
What is Adware?
- Malware that automatically displays onscreen advertisement which may lead to the user clicking and redirecting the browser to a dangerous/unsafe site that may contain spyware.
What is Spyware?
- A malware that enables the remote user to gather activities, passwords, and payment info from another user’s computer.
What is the purpose of a distributed denial of service(DDOS) attack?
- The process of a DDOS attack involves using a network of infected computers, known as a botnet, to flood the target server or network with traffic.
- A DDOS attack aims to disrupt the availability of a service, such as a website, making it inaccessible to legitimate users.
How do biometrics keep data safe and what are the methods included?
- Biometrics use pre-recorded human characteristics to authenticate authorized users of a system or device.
- Methods include: Face recognition, Iris and Retina scanners, Fingerprint or palm recognition, and voice recognition
Explain the process of ‘two-step verification’.
- Two-step verification involves two authentication methods performed one after the other (to prove someone’s identity)
- For example, a 4-digit code may be sent in an email or text message to your phone, which you have to type in to complete a login process
What is the purpose of passwords?
- Passwords are effective at preventing access to systems.
- Passwords should be secure and changed regularly
What is the purpose of Automatic software updates?
- Will keep applications and the operating system constantly up-to-date.
- Enables bugs and security flaws in the software to be fixed, as soon as they are known about it, with a patch.
What is the purpose of privacy settings?
- Privacy settings allow a person to control what information about them is shared on a social media platform.
- A user can control who has access to what they post, and who can see their full profile.
What’s a proxy server?
A proxy server is any machine that checks and forwards traffic between networks or protocols.
What is meant by social engineering?
Social engineering is the dishonest manipulation of people to cause them to divulge data or info against their better judgment
Explain what is meant by blockchain technology
Blockchain technology is used to record transactions in a digital ledger, where each transaction is time-stamped.
Give two advantages of blockchain technology
- Improved transparency
- Increased security
Give three ways in which a phishing attack may be recognized
- Poorly written or punctuated email.
- Links reveals a fake address when hovered over than expected
- Email not addressed to you personally
Describe one consequence of a phishing attack.
- Installation of malware when the link is clicked
Why is standard protocol necessary?
- The Worldwide Web (WWW) would fail to operate
- No way to ensure that every browser can access every web server using the same rules.
Three uses of persistent cookies.
- Saves user’s items in a virtual shopping cart
- Remembers emails and passwords about a user
- Shows user preferences, e.g. language used
Describe the main differences and any similarities between digital currency and cryptocurrency
- Both types of currency are in a digital format and have no physical form unlike traditional money, such as £, $, €
and ¥.
● Digital currency relies on a central banking system to make a transaction, whereas cryptocurrency has no state control and there is no need for a central banking system.
● Cryptocurrency uses a method known as blockchaining
Three uses of block chaining other than monetary transactions.
- In contracts
- In politics
- In research, e.g. for the development of drugs
Give three functions of a cookie.
- Saving personal details
- Storing login details
- Tracking user preferences
State two aims of carrying out a DDoS attack
- Revenge
- Entertainment value
Give two security solutions that can be used to help prevent a DDoS attack from being successful.
- Proxy server
- Firewall