5.1 and 5.3 Internet + Cyber security Flashcards
Describe the internet (2)
huge public network of computer systems
It is the physical infastructure
Describe the World Wide web (WWW)
The world wide web is the collection of websites
and web pages accessed using the internet
https://www.britannica.com /science/ computer-science
Identify the protocol, domain name, file path, and the webpage/file name (4)
protocol - https
domain name - www.britannica.com
file path - science
webpage/file name - computer-science
How does HTTP work
uses request codes to send and receive data and perform other various tasks.
Purpose of HTTPS
secure method of sending data via the world wide web
How does HTTPS work?
operates by using encryption to obscure data, using a method called TLS
TLS uses a method called asymmetric public key infrastructure and uses public key and private key to encrypt data
Define web browser
software that allows users to access documents and other resources on the internet
Function of web browsers (6)
Storing bookmarks and favourites
Recording user history
Allowing use of multiple tabs
Storing cookies
Providing navigation tools
Providing an address bar
What does DNS stand for
Domain Name Server
Purpose of DNS servern (2)
keeps a record of all of the domains in existence, and maps each of these domains to an IP address
acts as a lookup table for domain names, and replies to the request with an IP address.
Define web server
A computer connected to the internet that stores and shares many files.
How web server work? (3)
Once web browser obtains IP address, it sends request to web server to send the resources
The web server allows or disallows request depending on the nature of request
If allow, web server returns raw HTML to web browser.
Define cookies
A small piece of data stored by the web browser.
What are the two types of cookies (2)
persistent cookies
session cookies
What is persistent cookie
A cookie that is stored long-term on the computer system.
Retained until it expires
What is session cookie
A cookie that is deleted after closing the browser, exists in memory.
In what situations might a cookie be used
saving personal details
tracking user preferences
holding items in an online shopping cart
storing login details
8 examples of cyber threats
Brute force attacks
Data interception
Distributed denial service (DDoS) attacks
Hacking
Malware (virus, worm, trojan horse, spyware, adware, ransomware, pharming)
Phishing
Social engineering
Explain brute force attacks (2)
Finding the password of a user by systemically trying all different combinations
Can be manual or automated
Explain data interception (3)
form of stealing data by tapping into a wired or wireless connection
hacker may use technique known as “network sniffing” to pick out unecrypted messages
intercepted data is sent back to the hacker
Explain hacking
general term for gaining access to a computer system without authorisation
can be automated or manual
Distributed Denial of service attack (DDos) (2)
flooding a server or other target with useless traffic from multiple machines operating together, causing it to become overloaded and unavailable
often makes use of botnet (group of hi-jacked, internet connected devices) to carry out large scale attacks
Explan social engineering (2)
Art of manipulating people so they give up confidential information
common types of social engineering include “phone calls”, “baiting”, “Scareware (eg: fake anti-virus that looks real)”
Explain phishing (2)
online fraud technique designed to trick a user into giving away personal info
perpetrators disguise themselves by imitating an institution via email
Explain pharming (3)
form of attack that redirects a user to a fake website designed to look identical to the real thing even when the user types in the genuine URL
malicious code is installed on user’s computer and so the web server redirects them to fake website
unlike phishing, user doesn’t need to take any actions for the redirect to be initiated
Name + explain the 6 types of malware (6)
Viruses - programs that can replicate themselves, intending to delete or corrupt files
trojan horse - a program that appears harmless, but is in fact malicious, typically user is invited to clink on link and download a program that seems genuine, then attack gains access to user’s knowledge
worm - can spread and replicate itself without human interaction, can spread easily with lack of knowledge or awareness
ransomeware - encrypts victims files, attacker demands ransom from victim to restore access to the data, after ransom, users given decryption key
Spyware - obtains info about user’s computer by transmitting data from the victim’s hardrive (eg: passwords)
Adware - malware that automatically displays adverts to the user
Define HTML
The language used to design, display, and format webpages
What does an HTML consist of (2)
HTML presentation
HTML structure
What is HTML structure
Part of the HTML document which is responsible for layout of the document
What is HTML presentation
Part of the HTML document which is responsible for the content and style of the document
What are the purposes of a web browser (2)
render hypertext markup language (HTML)
display webpages
Define HTTP
protocol that is used to transfer across the internet
Define Uniform Resource Locator (URL)
text - based address used in the web browser to request a resource from the WWW
examples of HTML structure (4)
placement of text/image
margins
line break
padding
examples of html presentation (5)tml
font colour
font size
font style
background colour
image size
Reasons for seperating HTML presentation and structure (3)
Can easily change the style of webpage
Can add new content and add same style easily
can re-use presentation for other websites