9.3 The Internet Flashcards

1
Q

what is The internet?

A

A network of interconnected computer networks which uses an end-to-end communication protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is the internet connected?

A

It is mostly a wired network with cables that pass under oceans to connect the different continents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an internet service provider (ISP)

A

A company that provides its customers with access to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a packet in terms of the internet?

A

A container in which data is transmitted over networks. They’re labelled with addresses for the sender and the recipient and contain information intended for the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the role of packet switching and routers?

A

One message is frequently split into multiple packets, each of which is sent to its
recipient via the best possible route. Packets are reassembled with other packets that form part of the same message by their recipient. Packets usually have to pass through number of routers before reaching their destination. Packets’ recipient addresses are used by routers to determine where to send them. Every time that a packet passes through a router, a hop is said to occur. A packet’s time to live (or TTL) is a number that indicates how many hops the
packet can partake in and is reduced by one with each hop. When a packet’s TTL expires, the packet is dropped. The recipient will notice a missing packet and request that the sender transmits the missing packet again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain what a packets time to live (TTL is)?

A

Holds the number of hops a packet can go through before
being dropped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the primary components of a packet?

A

Sender’s address, receiver’s address, packet contents, time to live (TTL), sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain the purpose of a packet’s sender’s address?

A

Identifies where the packet was sent from, and therefore where the response should be sent to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the purpose of a packet’s receiver’s address?

A

Identifies the packet’s intended recipient, allowing it to be routed to the correct device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain the purpose of a packet’s contents?

A

Where the packet holds the data that is being transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the purpose of a packet’s sequence number?

A

Contains the number of packets in a message and identifies a packet’s position in relation to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do routers and gateways do together?

A

They connect different networks, allowing packets to reach their destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain what a router does?

A

Send packets to their recipient via the fastest possible route. They hold tables with information relating to the fastest routes to certain devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain what a gateway does?

A

As two networks could use different protocols, packets must be modified so they conform to both protocols. Gateways strip away most of the packet’s details, leaving just the packet’s contents. The gateway will then give packets new sender and receiver addresses which comply to the new protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a uniform resource locator (URL)?

A

An address assigned to files on the internet. Different protocols can be used in URL’s to access different types of files in different ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In the URL (https://ww.bbc.co.uk/news/technology/index.html) explain the purpose of “https://”?

A

It is the protocol being used to access the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In the URL (https://ww.bbc.co.uk/news/technology/index.html) explain the purpose of “www”?

A

It is the subdomain for world wide web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In the URL (https://ww.bbc.co.uk/news/technology/index.html) explain the purpose of “bbc.co.uk”?

A

It is the domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In the URL (https://ww.bbc.co.uk/news/technology/index.html) explain the purpose of “/news”?

A

It is the directory of the file being requested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In the URL (https://ww.bbc.co.uk/news/technology/index.html) explain the purpose of “/technology”?

A

It is the subdirectory of the file being requested.

21
Q

In the URL (https://ww.bbc.co.uk/news/technology/index.html) explain the purpose of “/index”?

A

It is the name of the file being requested.

22
Q

In the URL (https://ww.bbc.co.uk/news/technology/index.html) explain the purpose of “.html”?

A

It is the file’s extension.

23
Q

What is the purpose of a domain name?

A

Identifies an organisation or individual on the internet. They use alphanumeric characters which make them easy for humans to remember.

24
Q

what is a fully qualified domain name (FQDN)?

A

A domain that specifies an exact resource and can be interpreted in only one way. An FQDN will always include the servers host name. For example “www”.

25
Q

What uses an internet protocol (IP) address?

A

Every computer on the internet and every device that communicates on a network.

26
Q

Explain the purpose of domain names?

A

As IP addresses are not easy for humans to remember, domain names are used. They map to IP addresses, meaning they are a human-friendly representation of an IP address.

27
Q

Explain the functionality of a domain name server (DNS)?

A

A domain name server is used to translate domain names into their corresponding IP address. It stores a table of domain names and their corresponding IP address

28
Q

What is the role of an internet registry?

A

To protect the world’s depleting pool of unallocated IP addresses. When a new IP address is requested an Internet registry will first look for a previously allocated IP address that has become unused rather than allocate a brand new IP address straight away.

29
Q

What does a firewall do?

A

Sits between a device and the internet and regulates the packets that pass through it. Firewalls can be software or hardware and work as a proxy server which can perform both packet filtering and stateful inspection.

30
Q

How does packet filtering work and what does it do?

A

Firewalls use packet filtering to accept and block packets based on their source IP address or the protocol that they are using. A network’s administrator can specify particular IP addresses or protocols to block or use automatic filtering software that can block suspicious packets.

31
Q

What is stateful inspection and how does it work?

A

Stateful inspection actually examine the content of a packet before deciding whether to allow it through the firewall. Some firewalls keep a record of current in a network, allowing them time to filter out packets that aren’t related to activity on the network.

32
Q

What is a proxy server and what do they do?

A

A server that sits between a public network and a private network. They manage every packet that passes between the two networks. Firewalls can be said to act as proxy servers when they control the movement of packets between public and private networks.

33
Q

How do firewalls provide anonymity?

A

When a device in a private network sends a packet through a firewall and into a public network, the packet’s “sender” address is that of the firewall, rather than the devices private IP address. Provides anonymity to devices on privates networks as their private address is never sent beyond the private network.

34
Q

How does symmetric encryption work?

A

Both the sender and receiver share the same private key. The key is used to both encrypt and decrypt data sent between the two parties.
Before sending any information the sender and receiver must participate in a key exchange to ensure that they both have a copy of their shared key.

35
Q

What is the disadvantage of symmetric encryption.

A

If the key exchanged over a network, it is vulnerable to interception.

36
Q

How does asymmetric encryption work?

A

Each device has a pair of mathematically related keys. One key is kept private (private key) and the other is shared on the internet (public key). When a message is encrypted with a public key, only the corresponding private key can decrypt it and vice-versa. Before a message is sent it is encrypted by the sender using the recipient’s public key. The message can only be decrypted by the corresponding private key, the recipient’s private key. Only the recipient has access to this key so the recipient is the only person who can decrypt the message.

37
Q

when are digital signatures used?

A

When using asymmetric encryption, it can be used to verify the sender of a message and to verify that a message has not been tampered with during transmission.

38
Q

What are the 4 stages of digital signature encryption?

A

1) digest of the message is created
2) the digest is encrypted with the sender’s key
3) The encrypted with the sender’s private key
4) The message and appended digest are encrypted with the recipient’s public key

39
Q

How does digital signature decryption work?

A

When the recipient receives the message, they:
○ decrypt the message using their private key
○ decrypt the digest using the sender’s public key
○ carry out the same digest algorithm on the message
○ check whether their result matches the now decrypted digest

40
Q

What is a digital certificate and how does it work?

A

It verifies ownership of a key pair used in asymmetric encryption and can be used to check that a fake key pair isn’t being used by an imposter.

41
Q

What do digital certificates contain?

A

They contain: a serial number, the owner’s name, an expiry date, the owner’s public key and the certificate authority’s digital signature.

42
Q

Name the 3 types of malware

A

worms, trojans and viruses

43
Q

What are worms in computing?

A

Pieces of malicious software that can self-replicate between computers, either within a network or by users downloading and running a malicious file.

44
Q

What are Trojans in computing?

A

A type of malware that is disguised as a benign file that users can be tricked into opening. Often spread as email attachments or downloaded from malicious websites.

45
Q

What are features of viruses in computing?

A

Require a host file in which to reside
These files are typically executable files
Can lie dormant in a computer until their host file is opened or run
Can spread between computers over a private network , the Internet or even through the use of physical media

46
Q

What are some ways to prevent malware?

A

Good code quality, antivirus software, up-to-date software, employee training.

47
Q

Why can good code quality prevent malware?

A

Malware often exploit bugs in code that enable them to take hold of a computer system.

48
Q

How can installing antivirus software prevent malware?

A

They are specialist pieces of software that scan files on a computer and remove any suspicious files.

49
Q

How can training employees prevent malware?

A

They can be trained about the risks of opening suspicious email attachment or other methods in order to reduce the risks posed by malware.