Chapter 5 - The Internet And Its Uses Flashcards
Internet
World-wide interconnection of networks. Makes use of transmission control protocols and internet protocols. Stems from INTERconnected NETwork and is more of a concept that relies on physical infrastructure that allows individual devices and networks to connect to others.
WWW
World Wide Web
Massive collection of webpages based on hypertext transfer protocols (HTTP/HTTPS). A part of the internet that can be accessed by users through web browser software and used to access information using the internet.
Differences between the internet (4) and WWW (5)
INTERNET:
allows for emails to be sent and recieved
Online messaging (text/audio/video)
Makes use of TCP and IP
World wide collection of interconnected networks and devices
WWW:
Web sources accessed by web browsers
Collection of multimedia and other information on websites
https is written using HTML (hypertext markup language)
URLs are used to specify the location of web pages
Uses the internet to access information from websources
Web browser
Software that connects to the Domain Name Server to locate IP addresses. Interperets HTML pages sent to a users computer so that they can read documents and access multi-media. Allows user to access and display web servers on their screen. Show the translations of HTML
URL
Uniform Resource Locators
Text based addresses for websites/used to access websites
Format of URL
Protocol://website address/path/file name
(Https://websitename.za/ict)
What is the parts of a website address in a URL (4)
Domain host (www)
Domain name(website name)
Domain type(.org.net etc)
Country code(.uk.za)
Http
Hyper text transfer protocol
Written with HTML
Set of rules that must be obeyed when transferring files across the internet
Https
Hypertext Tranfer protocol secure
Some form of security (SSL/TSL) is being used. Extra security applied meaning a more secure way of sending and receiving data over a network
Features of web browsers (10)
Make use of java script
Allow the user to navigate forwards and backwards through previously opened pages
Hyperlinks
Home page
Address bar
Multiple tabs can be open at once
Data stored as cache
Bookmarks (store favourites)
User history
Cookies
Hyperlink
Highlighted text or image activated by clicking that links to further text, photos or other webpages/websites
Very brief description of websites (2)
Written in HTML
Hosted on a web server with its own IP address
What do the DNS and URLs eliminate
The need for users to memorise IP addresses
DNS
Domain Name server
Finds IP addresses for domain names given in URL from its large data base in which the URLs have matching IP addresses
How is DNS used to locate and retrieve a webpage (5)
- The user opens their browser and types in a URL code, and the browser requests the DNS find the IP address of the website.
- DNS server 1 checks its data base and its cache, if it can’t find the URL it sends a request to DNS server 2
- DNS server 2 finds the file and can map it. So the IP address is sent back to DNS server 1 which puts the IP address and associated URL into its data base and cache
- IP address is sent to users computer
- The computer sets up communication with the website server and the required pages are downloaded. HTML files are sent from the website and are interpreted by the browser which displays the content on the users screen
Cookies
Small files of text/code sent by a web server to a browser and stored on the users computer. Small lookup tablets containing (key,data) pairs that are used to track data such as IP addresses and browsing activity to maintain user preferences based on their previous activity. Can also be used to customise the webpage for the user
Cookie without an expiry date associated with it
Session cookie
Types of cookies
Session cookies
Persistent/permanent cookie
User preferences
Setting/options stored in cookies that can remember customised webpages/indicate browsing history to target adverts
Session cookie
Cookie that is temporarily stored on users computer and is deleted when the browser is closed or the session ends. Used for online shopping to store things in the users virtual shopping basket. Stored in temporary memory and dont collect any information from users computer nor personally identifies users.
Virtual shopping basket
Area of memory on a website that temporarily stores item a user wishes to purchase until a payment is made or the session expires.
Advantage of persistent/permanent cookies
Remove the need for users to type in login details every time a certain website is visited
Why do persistant cookies remember a users login details
So that they can authenticate a users browser
Persistant/permanent cookies
Cookies stored an users hard drive that are only deleted when the expiry date is reached or the user deletes it (or deactivated after 6 months due to countries laws). Effective way of carring data between website sessions and eliminating the need for large amounts of data to be stored on the server itself as well as the typing in of login details each time the website is visited. May only store personal information and user preferences if given consent by the user and legitamate websites will encrypt the personal information stored in a cookie.
Uses of persistant cookies (10)
Target users with adverts based on their previous activities
Save items in virtual shopping basket
Save things such as passwords and emails so that the user doesnt have to re enter them whenever they use a certain website
Serve as a memory allowing websites to recognise users
Track internet habits and histories for favourites/bookmarks
Stores user preferences
Online financial transactions
Stores Progress in games/quizzes
Automatically allows different languages on the webpages when the user logs on
Social networking sites can recognise certain preferences + browsing historiy
What happens the first time a user logs onto a website
Users browser requests webpage from website
Web server replies and sends cookies to the users browser
Persistent cookies are stored on the users hard drive, session cookies stored in temporary memory
When the web browser/session is closed, persistent cookies remains stored and session cookies are deleted from memory
What happens when a user logs into a website again
User logs in
Web server checks and identifies cookies stored on the users computer
User preferences, history and other details are recognised.
Types of currency
Digital
Conventional Fiat-latin word meaning let it be done. Backed by government and banks instead of gold+silver reserves
Digital currency
Currency that exists only in electronic form, no physical form, It essentially data on a data base.
Has made it possible for online banking. Relies on a central banking system.
Problem and solution to centralisation
Problems maintaining confidentiality and security
Cryptocurrency (introduces decentrilisation)
Features of crypto currency (4)
Uses cryptography to track transactions
Not regulated by government or banks, all rules are set by the cryptocurrency community
Transactions are publically availible thus allowing them to be tracked and for the money in the system to be monitored
Works by being within a blockchain network meaning it is much more secure
Blockchains/blockchaining
Blockchaimn is a decentralised database where all transactions of networked members are stored. It consists of a number of interconnected computers that are not connected to a central server. All the transaction data is stored on all the computers meaning it cannot be altered without the consent from all the network members and each networked computer gets a copy of the transaction. It results in reduced security issues such as hacking
Uses of blockchaining (5)
Politics
eductation
Cryptocurrency transactions
Smart contracts
Pharmaceutical research
What does a blockchain block consist of
Data
Hash value (includes a time stamp)
Previous hash value
What is the first block in a blockchain called
Genesis block
Time stamp
Digital record of the time and date a block was created in a blockchain, proving that the event actually took place
Why it is so hard to hack/tamper blockchain
It would be neccessary to attack every single block at once. When a new block is created it is sent to every computer in the network to check for correctness.
Proof-of-work makes sure it takes 10 minutes for the proof of work to be checked on each block befotre it can be added to the chain. This process is monitored by miners who get a commision for each new block created.
How blockchain works
When a transaction takes place a new block with a hash value is created
When a chain of blocks is created and one is altered, the hash value of the block is changed and invalidates the rest of the chain (breaks it)
Cyber security threats (8)
Brute force attacks
Phishing
Pharming
DDoS attacks
Malware
Social engineering
Data interception
Hacking
Brute force attack
Hacker systematically trying all the combinations of letters, symbols and numbers until your password is found