Chapter 5 - The Internet And Its Uses Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Internet

A

World-wide interconnection of networks. Makes use of transmission control protocols and internet protocols. Stems from INTERconnected NETwork and is more of a concept that relies on physical infrastructure that allows individual devices and networks to connect to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WWW

A

World Wide Web
Massive collection of webpages based on hypertext transfer protocols (HTTP/HTTPS). A part of the internet that can be accessed by users through web browser software and used to access information using the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Differences between the internet (4) and WWW (5)

A

INTERNET:
allows for emails to be sent and recieved
Online messaging (text/audio/video)
Makes use of TCP and IP
World wide collection of interconnected networks and devices
WWW:
Web sources accessed by web browsers
Collection of multimedia and other information on websites
https is written using HTML (hypertext markup language)
URLs are used to specify the location of web pages
Uses the internet to access information from websources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Web browser

A

Software that connects to the Domain Name Server to locate IP addresses. Interperets HTML pages sent to a users computer so that they can read documents and access multi-media. Allows user to access and display web servers on their screen. Show the translations of HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

URL

A

Uniform Resource Locators
Text based addresses for websites/used to access websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Format of URL

A

Protocol://website address/path/file name
(Https://websitename.za/ict)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the parts of a website address in a URL (4)

A

Domain host (www)
Domain name(website name)
Domain type(.org.net etc)
Country code(.uk.za)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Http

A

Hyper text transfer protocol
Written with HTML
Set of rules that must be obeyed when transferring files across the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Https

A

Hypertext Tranfer protocol secure
Some form of security (SSL/TSL) is being used. Extra security applied meaning a more secure way of sending and receiving data over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Features of web browsers (10)

A

Make use of java script
Allow the user to navigate forwards and backwards through previously opened pages
Hyperlinks
Home page
Address bar
Multiple tabs can be open at once
Data stored as cache
Bookmarks (store favourites)
User history
Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hyperlink

A

Highlighted text or image activated by clicking that links to further text, photos or other webpages/websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Very brief description of websites (2)

A

Written in HTML
Hosted on a web server with its own IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do the DNS and URLs eliminate

A

The need for users to memorise IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DNS

A

Domain Name server
Finds IP addresses for domain names given in URL from its large data base in which the URLs have matching IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is DNS used to locate and retrieve a webpage (5)

A
  1. The user opens their browser and types in a URL code, and the browser requests the DNS find the IP address of the website.
  2. DNS server 1 checks its data base and its cache, if it can’t find the URL it sends a request to DNS server 2
  3. DNS server 2 finds the file and can map it. So the IP address is sent back to DNS server 1 which puts the IP address and associated URL into its data base and cache
  4. IP address is sent to users computer
  5. The computer sets up communication with the website server and the required pages are downloaded. HTML files are sent from the website and are interpreted by the browser which displays the content on the users screen
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cookies

A

Small files of text/code sent by a web server to a browser and stored on the users computer. Small lookup tablets containing (key,data) pairs that are used to track data such as IP addresses and browsing activity to maintain user preferences based on their previous activity. Can also be used to customise the webpage for the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cookie without an expiry date associated with it

A

Session cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Types of cookies

A

Session cookies
Persistent/permanent cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

User preferences

A

Setting/options stored in cookies that can remember customised webpages/indicate browsing history to target adverts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Session cookie

A

Cookie that is temporarily stored on users computer and is deleted when the browser is closed or the session ends. Used for online shopping to store things in the users virtual shopping basket. Stored in temporary memory and dont collect any information from users computer nor personally identifies users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Virtual shopping basket

A

Area of memory on a website that temporarily stores item a user wishes to purchase until a payment is made or the session expires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Advantage of persistent/permanent cookies

A

Remove the need for users to type in login details every time a certain website is visited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why do persistant cookies remember a users login details

A

So that they can authenticate a users browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Persistant/permanent cookies

A

Cookies stored an users hard drive that are only deleted when the expiry date is reached or the user deletes it (or deactivated after 6 months due to countries laws). Effective way of carring data between website sessions and eliminating the need for large amounts of data to be stored on the server itself as well as the typing in of login details each time the website is visited. May only store personal information and user preferences if given consent by the user and legitamate websites will encrypt the personal information stored in a cookie.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Uses of persistant cookies (10)

A

Target users with adverts based on their previous activities
Save items in virtual shopping basket
Save things such as passwords and emails so that the user doesnt have to re enter them whenever they use a certain website
Serve as a memory allowing websites to recognise users
Track internet habits and histories for favourites/bookmarks
Stores user preferences
Online financial transactions
Stores Progress in games/quizzes
Automatically allows different languages on the webpages when the user logs on
Social networking sites can recognise certain preferences + browsing historiy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What happens the first time a user logs onto a website

A

Users browser requests webpage from website
Web server replies and sends cookies to the users browser
Persistent cookies are stored on the users hard drive, session cookies stored in temporary memory
When the web browser/session is closed, persistent cookies remains stored and session cookies are deleted from memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What happens when a user logs into a website again

A

User logs in
Web server checks and identifies cookies stored on the users computer
User preferences, history and other details are recognised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Types of currency

A

Digital
Conventional Fiat-latin word meaning let it be done. Backed by government and banks instead of gold+silver reserves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Digital currency

A

Currency that exists only in electronic form, no physical form, It essentially data on a data base.
Has made it possible for online banking. Relies on a central banking system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Problem and solution to centralisation

A

Problems maintaining confidentiality and security
Cryptocurrency (introduces decentrilisation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Features of crypto currency (4)

A

Uses cryptography to track transactions
Not regulated by government or banks, all rules are set by the cryptocurrency community
Transactions are publically availible thus allowing them to be tracked and for the money in the system to be monitored
Works by being within a blockchain network meaning it is much more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Blockchains/blockchaining

A

Blockchaimn is a decentralised database where all transactions of networked members are stored. It consists of a number of interconnected computers that are not connected to a central server. All the transaction data is stored on all the computers meaning it cannot be altered without the consent from all the network members and each networked computer gets a copy of the transaction. It results in reduced security issues such as hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Uses of blockchaining (5)

A

Politics
eductation
Cryptocurrency transactions
Smart contracts
Pharmaceutical research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What does a blockchain block consist of

A

Data
Hash value (includes a time stamp)
Previous hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the first block in a blockchain called

A

Genesis block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Time stamp

A

Digital record of the time and date a block was created in a blockchain, proving that the event actually took place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Why it is so hard to hack/tamper blockchain

A

It would be neccessary to attack every single block at once. When a new block is created it is sent to every computer in the network to check for correctness.
Proof-of-work makes sure it takes 10 minutes for the proof of work to be checked on each block befotre it can be added to the chain. This process is monitored by miners who get a commision for each new block created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

How blockchain works

A

When a transaction takes place a new block with a hash value is created
When a chain of blocks is created and one is altered, the hash value of the block is changed and invalidates the rest of the chain (breaks it)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Cyber security threats (8)

A

Brute force attacks
Phishing
Pharming
DDoS attacks
Malware
Social engineering
Data interception
Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Brute force attack

A

Hacker systematically trying all the combinations of letters, symbols and numbers until your password is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Word list

A

List of millions of words that could be used in a brute force attack

42
Q

Data interception

A

Form of stealing data by tapping into a wired/wireless connection communication link to comprimise privacy and obtain confidential data

43
Q

Packet sniffer

A

Form of data interception that examines data over a wired network and sends it back to the hacker

44
Q

Wardiving (def+alternative name)

A

Access point mapping
Form of data interception using a laptop or smart phone, GPS, antenna and other software outside a building or someones house to intercept wifi signals to illegally obtain data. The intercepted wifi signal reveals personal information to the hacker without the user knowing its happening

45
Q

Ways to prevent data interception (3)

A

Dont use wireless connectivity in public - there is no encryption
Protect the use if wireless connectivity with complex passwords
WEP- Wired Equivalency Privacy encryption protocol and a firewall to protect and encrypt your data

46
Q

DDoS

A

Distributed denial of services
Prevents users from accessing their emails, certain websites and online services by flooding the network with spam traffic from multiple computers to make it hard to block. This over floods the server so that it cannot service the users legitimate request thus denying them service.

47
Q

How to protect against DDos (3)

A

Use up-to-date malware checker
Set up a firewall to restrict traffict to and from web servers/computer
Apply email filters

48
Q

How to identify that you were a victim of a DDoS attack (3)

A

Slow network processing
Cant access certain websites
Large amount of spam emails

49
Q

Hacking

A

Malicious hacking is the act of gaining illegal access to a computer system without the owners permission
Leads to identity theft etc. And can be prevented through complex passwords, firewalls, anit hacking and intrusion detecting software.
Ethical hacking also exhists where companies authorise paid hackers to check their websites security

50
Q

Phishing

A

The sending out of legitimate looking emails that try to trick users into giving up personal data

51
Q

How to prevent against phishing attacks (7)

A

Check for green padlock
Dont click on strange links
Be aware of phishing scams
Run anti-phishing toolbars on browsers
Be aware of popups, click the “x”, not “cancel”
Run an up to date browser with a combination of desktop firewall (software) and network firewall(hardware)
Regularly check your online accounts and maintain your passwords

52
Q

Spear phishing

A

Targeted phishing of specific individuals or organisations

53
Q

Difference between phishing and pharming

A

Phishing requires the user to take an action for it to be initiated.

54
Q

Pharming

A

Malicious code installed on a users computer or an infected website. Redirects user to a fake website without their knowledge where they give away personal data

55
Q

Threats of pharming to data security

A

DNS cache poisoning - the changing of a websites real IP address to the fake one, meaning the users URL will redirect them to the fake website. This makes it much harder to mitigate risks.

56
Q

How to prevent phishing (4)

A

Check for https or green padlock in address bar
Use a modern browser-they alert
Anti-virus software
Check spelling of web addresses

57
Q

Viruses

A

Type of malware
Programs installed on a users computer that replicate and spread with the intent of deleting or corrupting files by causing the computer system to malfunction

58
Q

Malware

A

Programs installed on a users computer with the aim to delete, corrupt or manipulate data illegally.

59
Q

Examples of malware (6)

A

Viruses
Worms
Trojan horse
Spyware
Adware
Ransom ware

60
Q

Where viruses are found and how to prevent them

A

On email attachments, infected software or websites.
Dont download unoriginal software, click on unknown links and run up-to-date virus checkers.

61
Q

Difference between worms and viruses

A

Viruses require active hosts and for each end user to initiate the virus, worms dont

62
Q

Worms

A

Type of stand-alone viruses that self replicate and dont require an active host. Remain inside applications allowing them to travel through networks. Rely on security failures within networks to spread and if one person open the infected message the whole network is infected.

63
Q

How to prevent worms (1)

A

Run up-to-date anti-virus programs.

64
Q

Trojan horse

A

Malicious code disguised as legitimate software that requires requires user interaction to activate and cause harm to the computer system. Come from emails attachments or downloaded from infected websites.

65
Q

How to prevent trojan horse

A

Very hard as it involves user tricking, so even firewalls and anti virus software can be useless

66
Q

Spyware

A

Malware that gathers information by monitoring users activities carried out on their computer and sends it back to the cybercriminal that sent it. Can be prevented with anti-spyware software

67
Q

Adware

A

Type of malware that attempts to flood the user with unwanted adverts. It can highlight the users security defense weaknesses, hijack the browser and create its own default search requests and is very hard to remove.

68
Q

Ransomware

A

Programs installed via trojan horse or social engineering that encrypt the users data until a ransom is paid.

69
Q

Social engineering

A

The manipulating of people into breaking normal security procedures in order to gain illegal acces to computers/place malicious software on the computers. Its based on the expoitation of fear, curiosity, trust and empathy

70
Q

Common types of social engineering (5)

A

Instant messaging
Baiting - leaving a malware infected stick somewhere that a poor curious soul plugs into their computer
Phising/emails
Phonecalls
Scareware - done using a pop up message claiming a computer is infected

71
Q

Stages in social engineering scam (4)

A
  1. Identifying and research of victiom done, method of attack decided
  2. Victim is targeted
  3. Attack is excecuted and cybercrimminal obtains the information or causes the interuption
  4. Cybercrimminal removes all traces of malware to cover their tracks
72
Q

Access levels in social media

A
  1. Public access
  2. Friends
  3. Custom
  4. Data owner

Privacy settings are used to determine these

73
Q

Types of anti-malware (2)

A

Anti-virus -
Anti-malware - detects + removes spyware programs installed on a system, based on rules or known file structures

74
Q

Methods of anti malware (2)

A

Rules: software looks for typical features associated with spyware
File structures: certain file structures are associated with spyware which allows the software to identify them

75
Q

General features of anti-spyware (7)

A

Detect and remove already istalled spyware
Block access to users camera and microphone
Scans for signs of stolen personal information and warns the user
Prevent user from downloading spyware
Encrypt files to secure data even if spied on
Encrypt keystrokes to prevent key logging

76
Q

OSK

A

On Screen Keyboard

77
Q

Authentication

A

Process of proving users identity by using something they know, have or is unique to them

78
Q

How can authentication be done (3)

A

Passwords and user names
Biometrics - retina,fingerprints,face recognition,voice recognition
Two step verification

79
Q

When are passwords used (3)

A

When accessing email accounts
Social networking sites
Banking/shopping

80
Q

How to protect passwords (3)

A

Use strong passwords that arent easy to crack
Regularly change passwords
Run anti spyware to ensure your passwords arent being relayed back to someone spying on your computer

81
Q

Advantages of fingerprints (5)

A

Most developed
Cant be misplaced or stolen
Unique
Easy to use
Relatively small storage requirements for biometric data created

82
Q

Disadvantages of fingerprints(2)

A

Intrusive - used for criminal identification
Doesnt work is skin is dirtu or damaged

83
Q

Advantages of retina scans (2)

A

Very high accuracy, 1 in 10 million
No known way of replicating the little blood vessels at the back of your eye

84
Q

Disadvantages of retina scans (3)

A

Very intrusive - sit still for 15 seconds with an infra-red light in your eye
Expensive to install and set up
Slow to verify with stored data

85
Q

Advantages and disadvantages of face recognition (2,1)

A

Non intrusive
Relatively inexpensive technology

Can be affected by changes in hair, age, clothes, lighting and wearing glasses

86
Q

Advantages and disadvantages of voice recognition (6)

A

Non intrusive
Verification takes less than 5 seconds
Relatively inexpensive technology

Voice can easily be recorded
Low accuracy
Illness can change your voice

87
Q

Most common security systems used on mobile phones

A

Capacitance fingerprint reader

88
Q

Two step verification

A

Process of authentication requiring 2 steps of verification to prove the users identity
1. Username and password
2. One Time Pin

89
Q

Automatic software updates

A

Way of keeping data safe from security threats as it means software will stay up to date. Vital since it contains patches which improve security and software performance. Only downside is they may disrupt your device following intsallation meaning you’ll have to wait for new patches or reverse the clock time on your device.

90
Q

How to keep your data safe from security threats (8)

A

Check URL and communication tones and spelling
Anti malware
Anti spyware
Authentication
Automatic software updates
Firewalls
Proxy servers
Privacy settings
Secure Socket Layers (SSL/TSL)

91
Q

What to check URL or communication for (security threats)

A

Tone and spelling
Spelling, .com. Https
Suspicious links
@gmail.com
Typo squatting - close but different to fool you

92
Q

Firewall

A

Type of hardware or software that stands between the user and external networks. It filters and monitors incoming and outgoing traffic.

93
Q

Main uses of firewalls (7)

A

Examine traffic between user and public network
Alert user if their software is trying to access external data source and give them an option to allow it (updates)
Checks whether incoming and outgoing data meet set criteria
Alert the user and block it if it doesnt
Allow criteria to be changed to stop access to certain websites/deny IP addresses
Help prevent hackers/viruses infecting the computer/internal network
Logs traffic for later interrogation

94
Q

What can’t firewalls do (3)

A

Stop users on standalone networks from disabling their firewall
Stop employee misconduct or carelessness
Stop people on internalk network from using their own software to try and disable the firewall

95
Q

Privacy settings

A

Availible controls on webbrowsers, social networking etc. that limit who can access and see a users personal profile.

96
Q

What privacy settings refer to (6)

A

Dont track
Ad opt outs
Saved payment methods
App settings (location)
Safer browsing - alert for potentially dangerous website
Web browser privacy options (cookies, browsing history)

97
Q

Proxy servers

A

Server that acts as an intermediary server between the user and the web server through which internet requests are processed and makes use of cache memory to speed up web page access

98
Q

SSL

A

Secure Socket Layer
We use TLS now
Security protocol used to securely send data over a network

99
Q

What happens when a user wants to access a secure website and recieve and send data to it (5)

A
  1. Users browser sends a message to connect with the website which is secured by SSL
  2. The browser then requests that the web server identifies itself
  3. The web server responds by sending a copy of its SSL certificate
  4. If the browser can authenticate this certificate it sends a message to allow 2 way communication to begin
  5. The web server acknowledges the browser and the SSL secured 2 - way data transfer begins
100
Q

SSL certificate

A

Form of digital certificate which is used to authenticate a website

101
Q

Where would SSL be used

A

Online Banking
Online shopping
Sending + receiving emails
Using cloud storage facilities
VoIP voice over internet protocols
Etc pg 210