5. The Internet and Its Uses Flashcards

1
Q

URL

A

text-based address for a web page, can contain the protocol, domain name and web page/file name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Purpose of web browser

A
  • displays web pages
  • …by rendering HTML
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Functions of web browser

A
  • storing bookmarks/favourites
  • recording user history
  • allowing use of multiple tabs
  • providing navigation tools
  • providing an address bar
  • managing protocols
  • send URL to DNS
  • send a request to the IP address/web server
  • runs active script/JavaScript/client-side script
  • allows files to be downloaded from website/internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Protocol

A
  • a set of rules
  • …that governs communication between devices on a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preventing accidental loss of data

A
  • create a back-up
  • …so that if the data is accidentally deleted it can be restored/there is another copy
  • add verification
  • …this will add a stage to check the user actually wants to delete the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Checking if a website uses SSL

A
  • check the web address starts with HTTPS
  • check for a locked padlock sign
  • check the digital certificate for the website
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cookies

A
  • small text files
  • …stored by the browser
  • …sent between the web server and browser when the user visits the website
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Functions of cookies

A
  • save personal details
  • store login information
  • track user preferences
  • save online shopping cart items
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Session vs persistent cookies

A
  • session cookies are stored in RAM
  • …whereas persistent cookies are stored on the hard drive
  • when the browser is closed a session cookie is lost
  • …whereas a persistent cookie is not lost
  • …until deleted by the user/they expire
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital currency

A

a currency that exists only in electronic form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blockchain in digital currency

A
  • acts as a ledger
  • …by tracking each transaction
  • keeps a series of time-stamped records
  • …that cannot be altered
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Brute force attack

A
  • trial and error to guess a password
  • combinations are repeatedly entered…
  • …until correct password is found
  • can be carried out manually or automatically by software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Aims of brute force attacks

A
  • steal/view/access data
  • delete data
  • change data
  • lock account/encrypt account
  • damage reputation of a business
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security solutions against a brute-force attack

A
  • two-factor authentication
  • biometrics
  • firewall/proxy server
  • strong/complex password
  • setting a limit for login attempts
  • drop-down boxes
  • request for partial entry of password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of malware

A
  • spyware
  • adware
  • ransomware
  • Trojan horse
  • virus
  • worm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DDoS attack

A
  • malware downloaded onto several computers
  • …turning it into a bot/zombie
  • …creating a network of bots/zombies
  • third party/hacker initiating the attack
  • bots send requests to a web server at the same time
  • the web server fails due to the requests
  • legitimate requests cannot reach the web server
17
Q

Aims of DDoS attacks

A
  • revenge
  • entertainment value
  • to harm the company’s reputation
  • to demand a ransom to stop it
  • to test a system’s resilience
18
Q

Security solutions against DDoS attacks

A
  • firewall
  • proxy server
  • users scanning their computers with anti-malware
19
Q

How a proxy server protects against a DDoS attack

A
  • acts as a firewall
  • monitors/filters/examines incoming and outgoing traffic
  • rules/criteria for traffic can be set//blacklist/whitelist set
  • blocks any traffic that does not meet criteria…
  • …and can send a warning message to the user
  • stops the website failing in a DoS attack
  • a DoS attack would hit the proxy server and not the web server
20
Q

Security solutions against pharming

A
  • checking the spelling and tone of the email/website
  • checking the URL attached to a link
  • scanning a download with anti-malware
  • only downloading data/software from trusted sources
  • never providing personal details online
  • install a firewall to check if the website is valid
21
Q

Access levels

A
  • providing users with different permission for the data
  • limiting access to reading/viewing the data
  • limiting access to editing/deleting/changing data
  • normally linked to a username
22
Q

Authentication

A
  • web browser sends request to web server
  • …to view the digital certificate
  • web server sends the digital certificate to the web browser
  • web browser checks the certificate for authenticity
  • if certificate is authentic a secure connection is created
  • any data sent is encrypted
  • if certificate is not authentic the connection is rejected
  • uses a protocol such as SSL/TLS
23
Q

SSL

A
  • security protocol
  • encrypts any data that is sent
  • uses/sends digital certificates
  • …which are sent to/requested by the browser
  • …that contains the gallery’s public key
  • …that can be used to authenticate the gallery
  • once the certificate is authenticated, the transaction will begin