Internet Flashcards
Computer Worm
A computer worm is a malicious, self-replicating software program (malware) which affects the functions of software and hardware programs
Ransomware
Ransomware is a type of malware program that infects and takes control of a system. It infects a computer with the intention of extorting money from its owner
Botnet
Botnet is a set of networks connected computers/devices that are used for malicious purposes. Each computer in a botnet is called Bot. It is also known as Zombie
Trojan horse
It is a type of malware that presents itself as legitimate software. It may perform actions on a computer that is genuine but will install malware actions
keylogger
A keylogger is a type of malware that stores all keystrokes of a computer. It can record all sorts of personal information, such as usernames, passwords, credit card numbers, and personal documents such as emails and reports
Rootkit
A rootkit is a secret computer program designed to provide continued access to a computer while actively hiding its presence. Rootkits are associated with malware such as Trojans, worms, viruses.
Spyware
Spyware is a software that is installed on a computing device without the end user’s knowledge. It steals internet usage data and sensitive information such as usernames and passwords, activating the microphone or camera on a computer to record physical activity.
Adware
Adware is unwanted software designed to display advertisements on the computer screen to generate income. This type of ads cannot be removed easily
Phishing
Phishing is a cyber-attack that used to steal user data, including login credentials and credit card numbers. They use email as a weapon and trick the email recipient into believing that the message is received from real companies such as banks, Amazon etc to harvest the recipient’s details. Email Phishing, Spear Phishing (targets special person/organization) are techniques of Phishing.
ARPANET
world’s first fully operational packet switching computer network,
developed by the Advanced Research Projects Agency of the U.S. Department of Defense in 1969. It connected with only four computers
ARPANET adopted TCP/IP in 1983 and the “network of networks” became the modern Internet
World Wide Web
WWW is one of the services interconnected over the internet. It is a collection of all information, resources, pictures, sounds, multimedia on the internet which is formatted in HTML and accessed through HTTP.
Web Server
A web server stores, processes and delivers web pages to the users. The intercommunication between users and servers is done using Hypertext Transfer Protocol (HTTP).
Web Page
It is a document written in HTML that can be accessed through the internet by using the web browser. It is identified by Uniform Resource Locator.
(HTML)
Hypertext Mark-up Language
HTML is used to create web pages that are displayed on the Internet.
Hypertext Transfer Protocol (HTTP)
This protocol is used to transfer data over the web. It runs on top of the TCP/IP set of protocols. It uses a server-client model.
TCP/IP
developed by
Transmission Control Protocol/Internet Protocol
t is a set of communication protocols which is used to access the internet. TCP/IP was developed by Bob Kahn and Vint Cerf in 1978.
URL
Uniform Resource Locator
URL is used to locate the address of a resource and protocol.
Domain Name
It serves as an address which is used to access the website. It can be universally understood by Web servers and online organizations
DNS
Domain Name System
DNS translates domain names into IP addresses. It has a large database of domain names and its IP addresses
two types of Transmission Media
Guided Media and
Unguided Media
Guided Media/Bounded Media
The signals are transmitted through the narrow path which made by physical link
Coaxial Cable
Unguided/Unbounded Media
The signals are transmitted without using any cables. This type of transmission is known as wireless communication. Radio waves, Infrared
Switch
witch is a small hardware device that works at the layer of LAN (Local Area Network). It receives incoming data packets, filters the packet and sends only to the interface of the intended receiver
Gateway
a network node that connects two dissimilar networks using different protocols together
Firewal
A firewall is a network security system that monitors and controls overall incoming and outgoing network traffic based on advanced and a defined set of security rules
difference in http and https
HTTP is unsecured while HTTPS is secured. HTTP sends data over port 80 while HTTPS uses port 443. HTTP operates at application layer, while HTTPS operates at transport layer. No SSL certificates are required for HTTP, with HTTPS it is required that you have an SSL certificate and it is signed by a CA