more chp 5 Flashcards

1
Q

HTTP or HTTPS

A

a set of rules that must be obeyed while transferring anything over the internet. The S stands for secure (using TLS or SSL eg)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

web browsers

A

software that let people access and display web pages on their device screens. Translate the HTML and show the result

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what features do web browsers have

A

1) home page
2) bookmarks (store fav websites)
3) user history
4) user can navigate forwards and backward
5) many pages can be opened at the same time
6) make use of cookies
7) hyperlinks - points to another location
8) data is stored as a cache (temporary store)
9) Javascript
10) address bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

retrieval and location of web pages

A

1) to retrieve pages from a website –> you need IP address
2) DNS (domain name server, actually more than one server) is a system for finding IP addresses from a domain name in a URL (user doesn’t need to memorise)
3) converts domain name into IP address so comp can understand (202380 20384 blah blah blah)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

cookies basic

A

small files or code stored on a users computer, sent by a web server to a browser. Small look-up table containing (key, data) pairs. Every time a user visits a website, checks if it already has cookies. Allow user tracking and maintain user preferences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Session cookies

A

no expiry date, stored on the computer’s temporary memory. It doesn’t collect personal data, so they cease to exist once the browser is closed or the website session is terminated. (eg virtual shopping basket)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Persistent cookies

A

They remember a user’s personal data, stored on the hard drive until it expires or is deleted. user has to agree to terms - removes the need to log in every time. some countries have laws to deactivate after 6 months. very efficient, don’t need to store a lot of data on the web browser. (targets users specific preferences)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is digital currency?

A

purely digital, it has no physical form. it can be transferred between accounts. Eg paypal or apple pay, exists digitally but can be made into a physical format when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

central banking system

A

digital currency relies on a central banking system
eg nick –> bank x –> central bank –> bank y –> alex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

problem with centralisation

A

confidentiality and security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cryptocurrency

A

uses cryptography to track transactions (decentralization)
most digital currencies are regulated by central banks and governments, but crypto has no state control, and all the rules are set by the community itself)
everything is publicly available, so all transactions can be tracked and the amount of money in the system is monitored
within a blockchain network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

explain blockchaining to me love

A

decentralised database –> interconnected network of computers, but they arent all connected to a central server. All the transaction data is stored on ALL the computers. whenever a new transaction takes place, a copy is sent to all computers, so a change can’t be made without EVERYOEN saying yes maam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

where is blockchain used? name 5

A

crypto, smart contracts, research, politics, education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how does it work babe?

A

whenever a new transaction takes place, a new block and a new hash value is created. the hash value is unique and contains a timestamp. genesis block = (block 1).
Now, all the blocks are connected as they store their hash, and the hash of the next block. This way, if they change their hash, the next block will become invalid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

why is this whole block chaining thing good

A

it prevents tampering, also uses proof-of work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

whats proof of work

A

takes 10 min to determine necessary proof before adding a new block

17
Q

miners

A

special network users who get a commission for every block created

18
Q

8 cyber security threats

A

pharming, phishing, brute force, data interception, ddos, hacking, malware, social engineering

19
Q

brute force attacks

A

if a hacker wants to crack ur password, they can try every possible combination. one way to reduce steps –> go through it logically. most common first, then use a word list

20
Q

data interception

A

stealing data by ‘tapping’ into a communication link
packet sniffer –> examines data being sent over a network.

wireless - access point mapping or wardriving, data is intercepted using a laptop/smartphone, antenna and GPS device, outside somones home

wired equivalency privacy WEP encryption with a firewall

21
Q

DDoS

A

disributed denial of service - prevent users from accessing a part of a network.

usually temporary but can be a very big breach of security
one method is flooding with spam emails etc, cant properly service a legitimate request.

22
Q

hacking

A

gaining illegal access to a computer system, identity theft, gain of personal information
data can be deleted, corrupted, passed on
can be controlled by firewalls, usernames, strong passwords that are often changed
ethical hacking –> companies pay hackers to check hwo strong their security is

23
Q

phishing

A

criminal sends out legitimate-looking emails to users, can bring to a different link or enter personal information.

24
Q

spear fishing

A

targets specific individuals for financial information or industrial espionage

25
Q

DNS cache poisoning

A

changes legit IP address to fake ones

26
Q

social engineering (explain 5 types)

A

creates a social situation where victim drops their guard
instant messaging - malicious links embedded into instant messages (eg software update!!!!)
scareware - claims user is infected w virus
email/phishing scams - tricks users into thinking it is a genuine email
baiting - leaves infected stick somewhere
phonecall - claims user is infected, follow these steps to download anTi-MalWaRe

uses fear, curiosity, empathy and trust

27
Q

access levels

A

different people have different levels of access - whos allowed to read, write, delete
even social media (close friends, public etc)

28
Q

anti-spyware

A

detects and removes spyware, prevents user from downloading, encrypt information, encrypt key strokes, scans for signs that information has been stolen, blocks access to camera and mic
uses RULES –> looks for typical features
FILE STRUCTURES –> there are certain file structures associated with spyware

29
Q

Authentication

A

three factors - something you know, something you have, something that is unique to u

30
Q

Passwords and usernames

A

something you know
should be strong and changed frequently
how to protect –> run anti-spyware software so the passwords arent being relayed back
usually only allowed to be typed in a finite number of times
username needs to math up –> more security

31
Q

biometrics

A

rely on certain unique characteristics of a human
fingerprint, voice, retina, face

32
Q

fingerprint scans

A

compared to previously stored prints on a database
compares patterns of ridges and valleys
cant be stolen or lost, unique
but expensive, injuries

33
Q

retina scans

A

scans pattern of blood vessels in the retina
uncomfortable

34
Q

two step verification

A

two methods of verification needed, usually used for online purchases
PIN (one -time passcode) sent to user in another device/email

35
Q

Automatic software updates

A

make sure software is kept up to date
vital –> they contain patches (protect against malware) or updates (fix bugs and other issues)
they can disrupt your device

36
Q

checking spelling and tone of communication and URL links

A

check spelling, tone, email address, wrongly spelled domain names (typo squatting), whatever floats your boat

37
Q

firewall

A

software or hardware sits between the user and the external network
filters info in and out of the computer (checks whether it meets the criteria), logs data
user can decide whether to allow communication, and can warn users
primary defence

but, cant stop a user using hardware to overcome, or employee carelessness or misconduct

38
Q

proxy server

A

intermediate between user and web server
filters information, keeps IP secret, can block requests from certain IPs, attack hits proxy server instead, has a cache, which improves speed (proxy cache can store web page or something), can also be a firewall

39
Q

privacy settings

A

controls available on web browsers, limit who can access a users personal profile
eg. do not track settingg, need to reenter info while tracking a purchase, privacy options, sharing location switched off