Section 10 - The Internet Flashcards
1
Q
What is a URL
A
- Unifrom Resource Locator
- specifies the location of a resource on the internet, inlcuding name and file type
- hhtp = method
- www = host
- /webpage = location
2
Q
what is an ip address
A
- stands for internet protocol
- unique address assigned to a network device
- indicates where a packet of data is to be sent to or sent from
3
Q
what is packet switching
A
a method of communicating packets of data across a network
4
Q
what is a data packet
A
- data that is to be transmitted across a network is broken down into more managabke chunks called packets
- each packet contains a header, trailer and payload (the data)
5
Q
what is in a packet header
A
- senders IP address
- recipients IP address
- protocol
- packet number
6
Q
what is in a packet trailer
A
- end of packet flag
- checksum
7
Q
what is a router
A
- routers connect two networks together
- determines which router to send to next
- uses most efficient/shortest route
- updates routing table to reflect network changes
8
Q
what is a gateway
A
- if a packet is being moved between networks with different protocols, then a gateway is required to translate
- All of the header data is stripped from the packet and a new header is added in the format of the new network
9
Q
what is a firewall
A
- a firewall is either softwareor hardwae that controls access to and from a network
- numbered doors called ports are opened so that only certain traffic is allowed to pass through
10
Q
what is packet filtering
A
- packets of data are inspected by the friewall to check which port they are attempting to access
- if the IP address matched those recorded on the administrators permitted list, they are accepted and the port is opened
11
Q
what is stateful inspection
A
- the firewall maintains information about current connections
- it can inspect the payload of packets
- only allows relevant packets through
12
Q
what is a proxy server
A
- a proxy server makes a web request on behalf of your own computer, hiding the true request IP address from the recipient
- proxy servers can be used for anonymous surfing and provides a cashe of previously visited sites to speed access
13
Q
what is symmetric (private key) encryption
A
- uses the same key to encrypt and decrypt data
- this means the key must also be transferred to the same destination as the ciphertext
- this causes security problems as the key can be intercepted as easily as the ciphertext to decrypt the data
14
Q
what is asymmetric (public key) encryption
A
- uses two separate, but related keys
- the public key is made public and others wishing to send you data can use it for encryption, but not decryption
- another private key is known only by you and is used for decryption
15
Q
what is a digital signature
A
- in order to verify the integrity of a message, the sender can add a digital signature to a message
- the sender creates the signature by reducing the unencrypted message to produce a hash and encrypting the hash using their private key
- the sender bundles the digital signature with the message and encrypts it using the recipients public key
- recipient decrypts the bundle, uses the senders public key to decrypt the signature and compares the hash with their own calcuated hash
16
Q
what is malicious software (malware)
A
designed to cause inconvenience, loss or damage to programs, data or computer systems