The internet and it's uses (Paper 1) Flashcards

1
Q

What are the names for the different sections in a URL?

A

-Protocol
-Host
-Domain name
-Webpage/filename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does URL stand for?

A

Uniform Resource locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the protocol?

A

https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the host?

A

www

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an example of the domain name?

A

cambridgeinternation.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an example of a webpage/filename?

A

index.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a protocol?

A

A set of rules for communication between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is HyperText transfer protocol (HTTP)?

A

Is the standard protocol used to communicate across the web. It is sent in plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is HyperText Transfer Protocol secure (HTTPS)?

A

It is a secure protocol meaning any data transmitted is encrypted and cannot be understood by anyone intercepting it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the functions of a web browser?

A

-Storing bookmarks and favorites
-Storing cookies
-Recording user history
-Allowing use of multiple tabs
-Providing an address bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is HTML?

A

The standard markup language for creating web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of a domain name server?

A

To convert a website address into an IP address so that a browser on a client machine can make a request to the correct web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of cookies?

A

Text files with small pieces of data used to track user preferences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 2 types of cookies

A

Session cookies
Persistent cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are session cookies?

A

Session cookies are created and replaced each time a user visits a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are persistent cookies?

A

Persistent cookies are created and saved on the first visit and retained until they expire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe the process of SSL and how it provides a secure connection

A

-SSL is a security protocol
-It encrypts data that is sent
-Using digital certificates
-Which are sent to the user’s browser
-That contain the public key
-That can be used to authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the difference between the internet and the world wide web?

A

The internet is the physical equipment such as the servers and the cables whereas the world wide web is the data that is sent via the internet for example webpages (HTML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How are webpages located?

A

When a user enters a URL, the domain name is sent to a DNS server. The DNS server looks up the domain name and sends the associated IP address to the web browser. The web browser now requests the web page to the IP address for the Web server. The web server then sends the web page, written in HTML, to the browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the forms of cyber attack?

A

-Hacking
-Brute force attacks
-Data interception and theft
-Spyware
-Phishing
-Pharming
-Shouldering
-Suspicious links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is hacking and how do you defend against it?

A

-Hacking is an automated or manual attempt to gain unauthorised access to programs or data

Solved by: Getting a firewall to block access by unauthorised devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a brute-force attack and how do you defend against it?

A

-Automated or manual attempt to gain unauthorised access to secure areas by trying all password or key combinations

Solved by: Strong password + limited attempts allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is data interception and theft and how do you defend against it?

A

Data may be intercepted during transmission but also storage devices or files can be left insecurley

Solved by: Encryption, passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is spyware and how do you defend against it?

A

Software that hides on your computer and records activities to send it back to third parties

Solved by: Anti-malware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is phishing and how do you defend against it?

A

Phishing emails redirect a user to a fake website where they trick the reader into divulging confidential information

Solved by: Firewall

26
Q

What is pharming and how do you defend against it?

A

A form of cyberattack that sends you to a fake website that looks like the real thing

Solved by: Using a trusted ISP and checking the URL

27
Q

What is shouldering and how do you defend against it?

A

Looking over someone’s shoulder when they enter a pin

Solved by: Concealing password when entering it

28
Q

What is a suspicious link and how do you defend against it?

A

Links in emails that may not be genuine

Solved by: Hovering over the link should reveal the destination before clicking it

29
Q

Define malware

A

Malicious software written to cause inconvenience or damage to programs or data

30
Q

What is social engineering?

A

Obtaining confidential information by asking for it - usually making use of confidence tricks

31
Q

Define a virus

A

Small program installed onto a person’s computer without knowledge or permission with the purpose of doing harm

It can self replicate automatically and can corrupt stored data or it uses all available memory and causes the computer to crash

32
Q

Define a worm

A

-A small program which also replicates itself. However it finds vulnerability through holes in a network to replicate itself

-This clogs the bandwidth of a network and slows it down

33
Q

Define anti-virus software

A

It runs on the computer constantly checking for viruses - therefore it has to be kept up to date

34
Q

Define a trojan horse

A

A program which masquerades as having a legitimate purpose but actually has a different one - normally spread by email

35
Q

Define ransomware

A

A form of malware which encrypts victims files. A ransom is then demanded form the attacker in return for the instructions on how to decrypt the file

36
Q

Define adware

A

Malware which automatically displays onscreen advertisements - it may contain spyware or redirect the browser to an unsafe sight

37
Q

What does DDOS stand for?

A

Distributed denial of service

38
Q

What is a DDOS attack?

A

-A malicious attempt to disrupt the normal traffic of a targeted server with a flood of internet requests - Targets include internet shopping sites or a bank/credit card company

-The attack uses multiple interconnected devices in different locations to establish a botnet

-The attacker is able to direct the attack by sending remote instructions to each bot to send requests to the target’s IP address

-This results in it becoming overwhelmed so that genuine requests cannot be handled - the server then fails/times out

39
Q

Why is a DDoS attack difficult to solve?

A

As each request is from a legitimate device so it is difficult to separate the fraudulent requests from genuine ones

40
Q

What can be used to protect from DDOS attacks?

41
Q

What are the methods of keeping data safe?

A

-Biometrics
-Two step verification
-Passwords
-Automatic software updates
-SSL
-Privacy settings
-Proxy servers

42
Q

What are biometrics?

A

-They use pre-recorded human characteristics to authenticate authorised users of a system or device

43
Q

What are methods of biometrics?

A

-Facial recognition
-Iris and retina scanners
-Fingerprint/palm recognition
-Voice recognition

44
Q

How do biometrics work?

A

-The user is required to look at a camera, press their fingerprint into a sensor or speak into a microphone

-The image or recording is taken and analysed for key features

-This is compared with pre-recorded examples for that individual and if a match is found then access is granted

45
Q

What is 2 step verification?

A

Involves two authentication methods performed one after the other to prove an identity. For example, a 4 digit code may be sent in email or text to your phone where a login process must be completed

46
Q

How do automatic software updates ensure data is safe?

A

-These updates will keep applications and the OS up to date

-This enables bugs and security flaws in the software to be fixed as soon as they are located, with a patch

47
Q

What does SSL stand for?

A

Secure socket layer

48
Q

What is SSL protocol?

A

-SSL provides a secure channel between 2 computers or devices operating over the internet or an internal network

-SSL can be used to secure communication between a web browser and a web server

-This will then use an HTTPS address for the website - S meaning secure

49
Q

How do privacy setting keep data safe?

A

-They allow a person to control what information about them is shared on a social media platform

-A user can control who has access to what they post, and who can see their full profile

50
Q

How do proxy servers keep data safe?

A

-A proxy server is a machine that checks and forwards traffic between networks or protocols

-It’s an intermediary server separating end-user clients from the destination sites that they browse

-It can provide security and privacy if needed

51
Q

How does anti-virus software work?

A

-Anti-virus software scans the computer for viruses

-It compares all the files in the computer with a known list of viruses to see if there are any matches

-If there is a match, it will put the file in a quarantine area and will then inform the user about the suspected virus and ask you to delete the file

52
Q

How does a firewall work?

A

-A firewall helps prevent malware being downloaded onto a computer

-The data coming in and out of the computer is examined against the criteria of the firewall

-If the data looks malicious, the firewall will reject it and stop it from being downloaded onto the computer

53
Q

What is a data backup?

A

A copy of data stored separate from the computer

54
Q

Why are digital currencies gaining popularity?

A

-They can transfer money from one person to another directly without intervention of a banking organisation

-There is a reduced transfer fee and a decreased time a transaction takes to complete

-A higher demand raises their value

55
Q

What is a digital currency?

A

A currency that exists electronically rather than physically

56
Q

How does a digital currency ensure maximum safety?

A

A blockchain

57
Q

How does a blockchain work? (7 key points)

A

-Blockchain software is used to form a ledger that is a time-stamped series of transaction records

-Each new transaction is added onto a chain of transaction blocks

-Each transaction carries the user’s unique ID number and a reference to the previous block

-The reference is a hash total calculated with a hashing program using data from the previous blocks

-A change to data in any block in the blockchain would create a ripple effect of incorrect hash totals throughout the blockchain

-The blockchain is therefore copied and stored on multiple different servers so if there is a change to a data block it isn’t reflected in all copies

-This maintains integrity and trustworthiness of data

58
Q

What is a cryptocurrency?

A

A type of digital currency that uses encryption procedures

59
Q

What is a digital ledger?

A

A database that is a list of all the transactions recorded by use of blockchain

60
Q

How are digital currencies sent?

A

-User sends payment using cryptocurrency
-Before it is sent it is encrypted

-The details of payment are added to a digital ledger including a digital signature, date and time stamp
-The ledger is encrypted and cannot be changed

-The payment arrives with the intended user