5.1 and 5.3 Internet + Cyber security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Describe the internet (2)

A

huge public network of computer systems

It is the physical infastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the World Wide web (WWW)

A

The world wide web is the collection of websites
and web pages accessed using the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

https://www.britannica.com /science/ computer-science

Identify the protocol, domain name, file path, and the webpage/file name (4)

A

protocol - https

domain name - www.britannica.com

file path - science

webpage/file name - computer-science

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does HTTP work

A

uses request codes to send and receive data and perform other various tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Purpose of HTTPS

A

secure method of sending data via the world wide web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does HTTPS work?

A

operates by using encryption to obscure data, using a method called TLS

TLS uses a method called asymmetric public key infrastructure and uses public key and private key to encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define web browser

A

software that allows users to access documents and other resources on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Function of web browsers (6)

A

Storing bookmarks and favourites

Recording user history

Allowing use of multiple tabs

Storing cookies

Providing navigation tools

Providing an address bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does DNS stand for

A

Domain Name Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Purpose of DNS servern (2)

A

keeps a record of all of the domains in existence, and maps each of these domains to an IP address

acts as a lookup table for domain names, and replies to the request with an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define web server

A

A computer connected to the internet that stores and shares many files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How web server work? (3)

A

Once web browser obtains IP address, it sends request to web server to send the resources

The web server allows or disallows request depending on the nature of request

If allow, web server returns raw HTML to web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define cookies

A

A small piece of data stored by the web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two types of cookies (2)

A

persistent cookies

session cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is persistent cookie

A

A cookie that is stored long-term on the computer system.

Retained until it expires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is session cookie

A

A cookie that is deleted after closing the browser, exists in memory.

17
Q

In what situations might a cookie be used

A

saving personal details

tracking user preferences

holding items in an online shopping cart

storing login details

18
Q

8 examples of cyber threats

A

Brute force attacks

Data interception

Distributed denial service (DDoS) attacks

Hacking

Malware (virus, worm, trojan horse, spyware, adware, ransomware, pharming)

Phishing

Social engineering

19
Q

Explain brute force attacks (2)

A

Finding the password of a user by systemically trying all different combinations

Can be manual or automated

20
Q

Explain data interception (3)

A

form of stealing data by tapping into a wired or wireless connection

hacker may use technique known as “network sniffing” to pick out unecrypted messages

intercepted data is sent back to the hacker

21
Q

Explain hacking

A

general term for gaining access to a computer system without authorisation

can be automated or manual

22
Q

Distributed Denial of service attack (DDos) (2)

A

flooding a server or other target with useless traffic from multiple machines operating together, causing it to become overloaded and unavailable

often makes use of botnet (group of hi-jacked, internet connected devices) to carry out large scale attacks

23
Q

Explan social engineering (2)

A

Art of manipulating people so they give up confidential information

common types of social engineering include “phone calls”, “baiting”, “Scareware (eg: fake anti-virus that looks real)”

24
Q

Explain phishing (2)

A

online fraud technique designed to trick a user into giving away personal info

perpetrators disguise themselves by imitating an institution via email

25
Q

Explain pharming (3)

A

form of attack that redirects a user to a fake website designed to look identical to the real thing even when the user types in the genuine URL

malicious code is installed on user’s computer and so the web server redirects them to fake website

unlike phishing, user doesn’t need to take any actions for the redirect to be initiated

26
Q

Name + explain the 6 types of malware (6)

A

Viruses - programs that can replicate themselves, intending to delete or corrupt files

trojan horse - a program that appears harmless, but is in fact malicious, typically user is invited to clink on link and download a program that seems genuine, then attack gains access to user’s knowledge

worm - can spread and replicate itself without human interaction, can spread easily with lack of knowledge or awareness

ransomeware - encrypts victims files, attacker demands ransom from victim to restore access to the data, after ransom, users given decryption key

Spyware - obtains info about user’s computer by transmitting data from the victim’s hardrive (eg: passwords)

Adware - malware that automatically displays adverts to the user

27
Q

Define HTML

A

The language used to design, display, and format webpages

28
Q

What does an HTML consist of (2)

A

HTML presentation

HTML structure

29
Q

What is HTML structure

A

Part of the HTML document which is responsible for layout of the document

30
Q

What is HTML presentation

A

Part of the HTML document which is responsible for the content and style of the document

31
Q

What are the purposes of a web browser (2)

A

render hypertext markup language (HTML)

display webpages

32
Q

Define HTTP

A

protocol that is used to transfer across the internet

33
Q

Define Uniform Resource Locator (URL)

A

text - based address used in the web browser to request a resource from the WWW

34
Q

examples of HTML structure (4)

A

placement of text/image

margins

line break

padding

35
Q

examples of html presentation (5)tml

A

font colour

font size

font style

background colour

image size

36
Q

Reasons for seperating HTML presentation and structure (3)

A

Can easily change the style of webpage

Can add new content and add same style easily

can re-use presentation for other websites

37
Q
A