5. The Internet and Its Uses Flashcards
1
Q
URL
A
text-based address for a web page, can contain the protocol, domain name and web page/file name
2
Q
Purpose of web browser
A
- displays web pages
- …by rendering HTML
3
Q
Functions of web browser
A
- storing bookmarks/favourites
- recording user history
- allowing use of multiple tabs
- providing navigation tools
- providing an address bar
- managing protocols
- send URL to DNS
- send a request to the IP address/web server
- runs active script/JavaScript/client-side script
- allows files to be downloaded from website/internet
4
Q
Protocol
A
- a set of rules
- …that governs communication between devices on a network
5
Q
Preventing accidental loss of data
A
- create a back-up
- …so that if the data is accidentally deleted it can be restored/there is another copy
- add verification
- …this will add a stage to check the user actually wants to delete the data
6
Q
Checking if a website uses SSL
A
- check the web address starts with HTTPS
- check for a locked padlock sign
- check the digital certificate for the website
7
Q
Cookies
A
- small text files
- …stored by the browser
- …sent between the web server and browser when the user visits the website
8
Q
Functions of cookies
A
- save personal details
- store login information
- track user preferences
- save online shopping cart items
9
Q
Session vs persistent cookies
A
- session cookies are stored in RAM
- …whereas persistent cookies are stored on the hard drive
- when the browser is closed a session cookie is lost
- …whereas a persistent cookie is not lost
- …until deleted by the user/they expire
10
Q
Digital currency
A
a currency that exists only in electronic form
11
Q
Blockchain in digital currency
A
- acts as a ledger
- …by tracking each transaction
- keeps a series of time-stamped records
- …that cannot be altered
12
Q
Brute force attack
A
- trial and error to guess a password
- combinations are repeatedly entered…
- …until correct password is found
- can be carried out manually or automatically by software
13
Q
Aims of brute force attacks
A
- steal/view/access data
- delete data
- change data
- lock account/encrypt account
- damage reputation of a business
14
Q
Security solutions against a brute-force attack
A
- two-factor authentication
- biometrics
- firewall/proxy server
- strong/complex password
- setting a limit for login attempts
- drop-down boxes
- request for partial entry of password
15
Q
Types of malware
A
- spyware
- adware
- ransomware
- Trojan horse
- virus
- worm
16
Q
DDoS attack
A
- malware downloaded onto several computers
- …turning it into a bot/zombie
- …creating a network of bots/zombies
- third party/hacker initiating the attack
- bots send requests to a web server at the same time
- the web server fails due to the requests
- legitimate requests cannot reach the web server
17
Q
Aims of DDoS attacks
A
- revenge
- entertainment value
- to harm the company’s reputation
- to demand a ransom to stop it
- to test a system’s resilience
18
Q
Security solutions against DDoS attacks
A
- firewall
- proxy server
- users scanning their computers with anti-malware
19
Q
How a proxy server protects against a DDoS attack
A
- acts as a firewall
- monitors/filters/examines incoming and outgoing traffic
- rules/criteria for traffic can be set//blacklist/whitelist set
- blocks any traffic that does not meet criteria…
- …and can send a warning message to the user
- stops the website failing in a DoS attack
- a DoS attack would hit the proxy server and not the web server
20
Q
Security solutions against pharming
A
- checking the spelling and tone of the email/website
- checking the URL attached to a link
- scanning a download with anti-malware
- only downloading data/software from trusted sources
- never providing personal details online
- install a firewall to check if the website is valid
21
Q
Access levels
A
- providing users with different permission for the data
- limiting access to reading/viewing the data
- limiting access to editing/deleting/changing data
- normally linked to a username
22
Q
Authentication
A
- web browser sends request to web server
- …to view the digital certificate
- web server sends the digital certificate to the web browser
- web browser checks the certificate for authenticity
- if certificate is authentic a secure connection is created
- any data sent is encrypted
- if certificate is not authentic the connection is rejected
- uses a protocol such as SSL/TLS
23
Q
SSL
A
- security protocol
- encrypts any data that is sent
- uses/sends digital certificates
- …which are sent to/requested by the browser
- …that contains the gallery’s public key
- …that can be used to authenticate the gallery
- once the certificate is authenticated, the transaction will begin