Chapter 5 - The internet and its uses Flashcards

1
Q

What is the:

Internet

A

a global infrastructure of interconnected networks. The world wide web is all the web pages that are accessible via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is the:

Web page located

A

Through the URL (uniform rersource locator)
Has a text based address
can be access through a web browser such as google
URL address contains a protocol, a host, a domain name, and a web/file name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where are:

Web pages held

A

on computers connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a:

protocol

A

A set of rules for communication between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is:

HTTP

A

A protocol (hyper text transfer protocol) used to communicate across the web. Any data sent such as your name address or bank details can be seen and hacked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is:

HTTPS

A

The same as HTTP, but it is secure as the data transmitted is encrypted and cannot be understood by other people, and is authenticated to make sure the website is secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are:

Other browser functions

A
  1. Storing bookmarks and favourites
  2. Storing cookies
  3. recording user history
  4. allowing use of multiple tabs
  5. providing navigation tools
  6. providing an address bar
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is a:

Web page located

A
  1. The domain name server converts a website address into an IP address so that a browser on a client machine can make a request to the correct web server hosting that web page. If no domain name is found, an error message is sent back(other dns servers will be checked first)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are

Cookies

A

Text files with small pieces of data used to hold user preferences, with persistent cookies which are saved since they are made and session cookies which are replaced every time the user visist the webiste

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the:

URL

A

A text based address to find a web page which are accessed on web browsers
Uniform resource locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of a:

Domain name server

A

To convert a website address (an URL) into an IP address so that a browser on a client machine can make a request to the correct web server. An error is sent if none is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is:

HTML

A

standard markup language for creating web pages using elements in tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are:

Digital currencies

A

Money-like assets that only exist in digital form and is exchanged digitally with no physical banknotes in circulation. For example, bitcoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a:

Blockchain

A

Database technology used to form digital ledgers which is a time-stamped series of transaction recorded in a chain tracking the digital currencies movement
Each new transaction is added onto the transaction blocks
A transaction carries the user’s ID number and a reference to the previous block, which is a has total calculated with a hashing algortihm.
Change to data in the block creates ripple effects of incorrect hashes leading to incorrect hash totals, making the infor rejected, which maintains integrity and trustworthiness of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Different types of:

IP address

not 4,6

A

Public - unique public address for the router for information given by the router
private - an ip address used just for the local network and cannot be found on the internet, and are not unique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a:

MAC address

A

media access control
Hardwareindentification number that uniquely identifies each device on a network; it is nmanufactured into every network card and cannot be altered.

17
Q

What is a:

Firewall

A
  • software program that prevents unauthorised access to or from a private network
  • All data packets pass through the firewall, which only allows authroized traffic
  • System located between 2 networks where an access control policy is implemented between those networks
18
Q

What are the:

Advantages of firewall

A
  • Blocks unauthorized access and malicious traffic based on predefined security ruels
  • Allows for detailed and customizable rules about which traffic can enter or leave the network
  • Provides logging and monitoring of traffic patterns and potential threats
  • Can segment different parts of a network to limit the spread of potential attacks or breaches
  • Helps enforce security policies and compliance requirements by controlling traffic and access
19
Q

What are:

Disadvantages of firewalls

A
  • Can be complex to configure and manage
  • Depending on the configuration, firewalls can introduce latency or reduce network performance due to traffic inspection
  • A firewall alone cannot protect against all types of threats
  • Advanced firewalls with extensive features and capabilities can be costly
20
Q

What is a:

Proxy server

A
  • A server that acts as a gateway or intermediary between any device and the rest of the internet
  • A proxy accepts and forwards connection requests, then returns data for those requests.
  • Uses anonymous network id instead of actual IP address of client, to hid IP address of client
  • Is part of a firewall
21
Q

What are the uses of a:

Proxy server

A
  • Private browsing: the proxy substitues its IP address for that of the client, making it more difficult to identify the person behind a browsing session
  • Connection Logging: All traffic through a proxy can be logged, which may be useful to an organisation for compliance or security
  • Web filtering: Proxies can be configured to block users from visiting certain sites, including those that are potentially dangerous or inappropriate for work
  • Content chaching: Proxies have the ability to cache content from commonly-visited static pages. This can reduce latnecy for their clients
22
Q

What are the:

Advantages of proxy servers

A
  • Reduces latency and improves performance by caching frequently requested content
  • Distributes traffic across multiple servers, improving response times and availability
  • Enhances security and productivity, by blocking access to specific websites or content based on policies
  • Conceals client IP address, providing anonymity and protecting user privacy
23
Q

What are:

Disadvantages of proxy server

A
  • Proxer servers may log user activity, which could be a concern for privacy depending on the loggin policies
  • If the proxy server fails, it can disrupt access to resources for all users relying on it
  • Can be complex to set up and manage, especially with advanced features like load balancing and caching
  • They do not offer comprehensive protection against all types of network attacks
24
Q

What is an example of:

Firewalls

A
  • Windows Firewall (part of Windows OS)
25
# What is an example of: A proxy server
* Apache * HAP proxy
26
# What is the purpose of: Firewalls
* To provide protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic. * Also prevents malicious software from accessing a computer of network via the internet
27
# What is the difference between: A firewall and a proxy server
* Firewall comes before a proxy in a network configuration * Firewalls defines the perimeter of the network and identify potentially suspicious and malicious traffic. * Proxy helps protect privacy and can enforce plicies regarding internet browsing
28
# What is the purpose of an: ISP
* Company that allows access to the internet through routers * Gives an IP address for devices * Allows data to be saved * Supports domain names * Provides email addresses * Can host a website
29
# What are the: Components of the URL
Protocol - https Host - www domain name - cie web page/file name - index.html