9.3 The Internet Flashcards

1
Q

what is The internet?

A

A network of interconnected computer networks which uses an end-to-end communication protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is the internet connected?

A

It is mostly a wired network with cables that pass under oceans to connect the different continents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an internet service provider (ISP)

A

A company that provides its customers with access to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are national internet service companies and what do they do?

A

The largest internet service providers and provide internet access to smaller regional and local ISPs, from whom homes and businesses can buy access to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a packet in terms of the internet?

A

A container in which data is transmitted over networks. They’re labelled with addresses for the sender and the recipient and contain information intended for the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a packet switched network?

A

A network which data is sent in packets. One message is frequently split into multiple packets, each of which is sent to its recipient via the best possible route before being reassembled with packets by its recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does sending a packet through a network work?

A

The packet will usually have to pass through a number of routers before reaching its destination. A router uses the recipient address on a packet to determine where to send the packet. Every time that a packet passes through a router, a hop is said to occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain what a packets time to live (TTL is)?

A

Each packet can only pass through a finite number of hops. A packet’s time to live is a number that indicates how many hops the packet can partake in and is reduced by one with each hop. When a packet’s TTL expires the is said to be dropped meaning that the packet is deleted. The recipient will notice a missing packet and request that the sender transmits the missing packet again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the primary components of a packet?

A

Sender’s address, receiver’s address, packet contents, time to live (TTL), sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain the purpose of a packet’s sender’s address?

A

Identifies where the packet was sent from, and therefore where the response should be sent to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the purpose of a packet’s receiver’s address?

A

Identifies the packet’s intended recipient, allowing it to be routed to the correct device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the purpose of a packet’s contents?

A

Where the packet holds the data that is being transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain the purpose of a packet’s time to live (TTL)?

A

Holds the number of hops a packet can go through before being dropped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain the purpose of a packet’s sequence number?

A

Contains the number of packets in a message and identifies a packet’s position in relation to others. This allows packets to be reassembled in the correct order and allows missing packets to be identified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two types of network device?

A

Routers and gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do routers and gateways do together?

A

They connect different networks, allowing packets to reach their destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Explain what a router does?

A

Send packets to their recipient via the fastest possible route. This could be the route that involves the lowest amount of hops or the route that is least congested at the time. They hold tables with information relating to the fastest routes to certain devices which they frequently update to enable maximum performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain what a gateway does?

A

As two networks could use different protocols, packets must be modified so they conform to both protocols. Therefore gateways strip away most of the packet’s details, leaving just the packet’s contents. The gateway will then give packets new sender and receiver addresses which comply to the new protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a uniform resource locator (URL)?

A

An address assigned to files on the internet. Different protocols can be used in URL’s to access different types of files in different ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In the URL (https://ww.bbc.co.uk/news/technology/index.html) explain the purpose of “https://”?

A

It is the protocol being used to access the file. HTTPS stands for hypertext transfer protocol secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In the URL (https://ww.bbc.co.uk/news/technology/index.html) explain the purpose of “www”?

A

It is the subdomain for world wide web. It will usually point to the web server hosted at the following domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In the URL (https://ww.bbc.co.uk/news/technology/index.html) explain the purpose of “bbc.co.uk”?

A

It is the domain. BBC is the name of the organisation, .uk is a top level domain (TLD) and .co is a second level domain (2LD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In the URL (https://ww.bbc.co.uk/news/technology/index.html) explain the purpose of “/news”?

A

It is the directory of the file being requested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In the URL (https://ww.bbc.co.uk/news/technology/index.html) explain the purpose of “/technology”?

A

It is the subdirectory of the file being requested.

25
Q

In the URL (https://ww.bbc.co.uk/news/technology/index.html) explain the purpose of “/index”?

A

It is the name of the file being requested.

26
Q

In the URL (https://ww.bbc.co.uk/news/technology/index.html) explain the purpose of “.html”?

A

It is the file’s extension. Hypertext markup language (HTML) is frequently used for creating web pages.

27
Q

What is the purpose of a domain name?

A

Identifies an organisation or individual on the internet. They use alphanumeric characters which make them easy for humans to remember.

28
Q

what is a fully qualified domain name (FQDN)?

A

A domain that specifies an exact resource and can be interpreted in only one way. An FQDN will always include the servers host name. For example “www”.

29
Q

What uses an internet protocol (IP) address?

A

Every computer on the internet and every device that communicates on a network.

30
Q

Explain the purpose of domain names?

A

As IP addresses are not easy for humans to read, domain names are used. They map to IP addresses, meaning they are a human-friendly representation of an IP address.

31
Q

Explain the relationship between a domain name and an IP address?

A

They have a direct relationship with an IP address. When you enter a domain name into your browser’s address bar a domain name server is used to translate the domain name into its corresponding IP address.

32
Q

Explain the functionality a domain name server (DNS) does?

A

Stores a table of domain names and their corresponding IP address. If a domain name server does not have a record of the domain that you are trying to access, your request will be passed to another domain name server.

33
Q

Explain why smaller websites are harder to access than larger websites?

A

As small websites and rarely visited websites will require numerous changes of servers before a record can be found making them slower to access than larger, more frequently used websites.

34
Q

What is an internet registry?

A

An organisation responsible for the allocation of IP addresses. There are only 5 internet registries in operation, each serving different geographical area.

35
Q

What is the role of an internet registry?

A

To protect the world’s depleting pool of unallocated IP addresses. When a new IP address is requested an Internet registry will first look for a previously allocated IP address that has become unused rather than allocate a brand new IP address straight away.

36
Q

What does a firewall do?

A

Sits between a device and the internet and regulates the packets that pass through it. Firewalls can be software or hardware and work as a proxy server which can perform both packet filtering and stateful inspection.

37
Q

How does packet filtering work and what does it do?

A

Firewalls use packet filtering to accept and block packets based on their source IP address or the protocol that they are using (determined by port number). A network’s administrator can specify particular IP addresses or protocols to block or use automatic filtering software that can block suspicious packets.

38
Q

What is stateful inspection and how does it work?

A

Stateful inspection actually examine the content of a packet before deciding whether to allow it through the firewall. Some firewalls keep a record of current in a network, allowing them time to filter out packets that aren’t related to activity on the network.

39
Q

What is a proxy server and what do they do?

A

A server that sits between a public network and a private network. They manage every packet that passes between the two networks. Firewalls can be said to act as proxy servers when they control the movement of packets between public and private networks.

40
Q

How do firewalls provide anonymity?

A

When a device in a private network sends a packet through a firewall and into a public network, the packet’s “sender” address is that of the firewall, rather than the devices private IP address. Providing anonymity as the devices on the private network as their private address is never sent beyond the firewall.

41
Q

What is symmetric encryption?

A

Both the sender and receiver share the same private key. This is used to both encrypt and decrypt data sent between the 2 parties.

42
Q

How does symmetric encryption work?

A

Before sending any information the sender and receiver must participate in a key exchange to ensure that they both have a copy of their shared key.

43
Q

What is the disadvantage of symmetric encryption.

A

If the key exchanged over a network, it is vulnerable to interception.

44
Q

What is asymmetric encryption?

A

Four different keys are used. Each device has a pair of mathematically related keys, one of which is kept secret (the private key) and the other shared on the internet (the public key).

45
Q

How does asymmetric encryption work?

A

When a message is encrypted with a public key, only the corresponding private key can decrypt it and vice-versa. Before a message is sent, it is encrypted by the send using the recipients public key. This means that the message can only be decrypted by the corresponding private key, the recipient’s private key, which only the recipient has access to. This means that the recipient is the only person who can decrypt the message.

46
Q

what are digital signatures and when are they used?

A

When using asymmetric encryption, it can be used to verify the sender of a message and to verify that a message has not been tampered with during transmission.

47
Q

What are the 4 stages of digital signature encryption?

A

1) A digest of the message is created, by a hashing or checksum algorithm or else. The value of the digest depends on the content of the message and will not be the same if the message is changed.
2) This digest is encrypted with the sender’s private key (which anyone can decrypt using the sender’s public key)
3) The encrypted digest is appended to the message
4) The message and appended digest are encrypted with the recipient’s public key, meaning that the recipient can decrypt the information.

48
Q

How does digital signature decryption work?

A

When the recipient receives the message, they first decrypt it using their private key; leaving them with the decrypted message and the encrypted digest. As the digest was encrypted using the sender’s private key it can be decrypted using the sender’s public key. This verifies that the message was really sent by the sender as only they have access to their private key. The recipient then carries out the same hashing or checksum algorithm on the message and checks whether their result matches the now decrypted digest. If everything matches, the recipient can be certain that the message was sent by the sender and hasn’t been tampered with or corrupted during transmission.

49
Q

What is a digital certificate and how does it work?

A

It verifies ownership of a key pair used in asymmetric encryption and can be used to check that a fake key pair isn’t being used by an imposter.

50
Q

What do digital certificates contain?

A

They contain: a serial number, the owner’s name, an expiry date, the owner’s public key and the certificate authority’s digital signature.

51
Q

What links worms, trojans and viruses?

A

They are all types of malware that can infect computers.

52
Q

What are worms in computing?

A

Pieces of malicious software that can self-replicate between computers, either within a network or by users downloading and running a malicious file.

53
Q

What are Trojans in computing?

A

A type of malware that is disguised as a benign file that users can be tricked into opening. These are often spread as email attachments or downloaded from malicious websites.

54
Q

What are viruses in computing?

A

A type of malware that requires a host file to reside. These files are typically executable files, meaning that viruses can lie dormant in a computer until their host file is opened or run. Viruses can spread between computers over a private network, the internet or the use of physical media.

55
Q

What are some ways to prevent malware?

A

Good code quality, antivirus software, up-to-date software, employee training.

56
Q

Why can good code quality prevent malware?

A

Malware often exploit bugs in code that enable them to take hold of a computer system.

57
Q

How can installing antivirus software prevent malware?

A

They are specialist pieces of software that scan files on a computer and remove any suspicious files.

58
Q

How can training employees prevent malware?

A

They can be trained about the risks of opening suspicious email attachment or other methods in order to reduce the risks posed by malware.