the internet and its uses (paper 1) Flashcards

1
Q

define what the internet is

A

a global infrastrucure of interconnected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

define what the world wide web is

A

all the web pages that are accessible via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

outline the difference between the internet and the world wide web

A

the internet is the basis and wires and infrastructure of the world wide web, which is all the web pages availiable on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does URL stand for

A

uniform resource locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a URL

A

the unique text-based address each web page has

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what do you use to access a web page

A

a program called a web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is ‘https’

A

a protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a protocol

A

a set of rules for communication between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what do the rules of a protocol cover

A
  • standards of physical connections
  • standards of cabling
  • standards of mode of transmission
  • data format
  • error detection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does ‘http’ / ‘https’ stand for

A

HyperText Transfer Protocol (Secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the functions of a browser

A
  • storing bookmarks and favourites
  • recording user histroy
  • allowing use of multiple tabs
  • storing cookies
  • providing navigation tools
  • providing an address bar
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what code is used for a web pages

A

HTML = HyperText Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is an IP address

A

the unique address given to every public-facing, networked computer or computing device in the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the two different types of IP addresses

A

IPv6 and IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is the role of the domain name server

A

to convert a website address (URL) into an IP address so that a browser can makke a requestion to the correct web server with that web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what happens if the domain name server does not have an entry for that domain name

A

it passes the request to another more authoritive domain name server and if not match is found still, an error message will be sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are cookies

A

text files with small pieces of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what type of file is a cookie

A

a text file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what are cookies used for

A

to track user preferences, hold items in a shopping cart, store login details and other personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are the two types of cookies

A
  • session cookies
  • persistent cookies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what are session cookies

A

cookies that are created and replaced each time a user visits a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are persistent cookies

A

cookies that are created and saved on the first visit and retained until they expire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is meant by the term digital currrency

A

any money-like asset that only exists in digital form and exchanged digitally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is the most well known type of digital currency

A

bitcoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
when is bitcoin most oftenly used
- people can buy fractions of a bitcoin, like you can with gold - it can be used to trade for goods, serices and other currencies - some shops now accept bitcoin as a payment
26
why are digital companies gaining popularity
- can transfer funds from person to person without the intervention of private banking organisations - this reduces transfer fees and speeds up transaction time and improves security and anonymity
27
what is a blockcahin
a database technology used to form a digital ledger of a time-stamped sreies of transaction records, tracking the movement of digital currency
28
explain how blockchain works
- each new transaction is added onto a chain of transaction blocks - each transaction carries unique ID number and reference to blocks in the chain - this reference is a hash total which is calculated by a 'hashing' algorithm using the previous blocks data - a change to any data in any block would create a ripple as all hash values would have to be changed so there are multiple copies
29
why do block chains have multiple copies on different servers
so that of there is a change to a data block and it is not reflected in all copies, it will be rejected this maintains the integrity and trustworthiness of the data
30
what is meant by the term cyber security
it relates to the processes, policies and practices designed to protect against any threats or unauthorised access to networks, computers, programs or data
31
what are the different types of cyber attacks
- hacking - data interception and theft - phishing - shouldering - pharming - spyware - brute force attacks - suspicious links
32
give the two malware and the two social engineering cyber attacks
- malware = pharming, spyware - social engineering = phishing, shouldering
33
what is hacking and how can it be prevented
- automated or manual attempts to gain unauthroised access to programs or data - firewall to block access by unauthroised access
34
what is data interception and theft and how can it be prevented
- data may be intercepted during transmission, but physical theft can occur where storage devices or data files are left insecurely - encryption, physical locks, passwords
35
what is phishing and how can it be prevented
- phishing emails redirect a user to a fake website where they trick the reader into divulging confidential information like passwords to bank accounts - network policy, firewalls, user awareness of phishing 'clues'
36
what is shouldering and how can in be prevented
- looking over someone's shoulder when they enter a passwork or PIN - concealing your password or PIN entry
37
what are brute force attacks and how can they be prevented
- automated or manual attempt to gain unauthorised access to secure areas by truing all possible passwords or key combinations - strong passwords with limited attempts allowed
38
what is spyware and how can it be prevented
- software that hides on your conputer recording your activities to send back to a third party for analysis - anti-malware, ani-spyware software
39
what is pharming and how can it be prevented
- a form of cyberattack that sends you to a fake website that looks like the real things. the user types in a legitimate address and is redirected to a fake website - checking the URL, making sure the site says HTTPS not just HTTP, using a trusted internet service provider
40
define malware
malicious software written to cause inconvenience or damage to programs or data
41
what are the different types of malware
- viruses - worms - trojan horse - ransomware - adware - distributed denial of service attack
42
what are viruses
a program that is installed on a computer without the user's kowledges or permission with the purpose of doing harm - it has instructions to replicated automatically
43
what are worms
they are similar to viruses and can cause damage like corrupting files and stealing information - but it does not self replicated
44
what is a trojan horse
a program that disguises itself as having a legitimate purpose but actually has another - it is often spred via email
45
what is ransomware
it encypts all the victim's files and a ransom is then demanded from the attacker in return to have files decrypted
46
what is adware
malware that automatically displays onscreen advertisements, it is not always dangerous but may redirect the browser to an unsafe site
47
what is a distributed ddenial of service attack
- a malicious attempt to distrupt the normal trafic of a targeted server with a flood of internet requests - all these extra requests establish a botnet and evenutally the server fails or tuimmes out
48
how can you keep your data safe
- biometrics (face ID, fingreprint, voicerecognition) - two-step verification - passwords - automatic software updates - secure socket layer protocol - privacy settings - proxy servers
49
what is meant by the term biometrics
use of pre-recorded human characteristics to authenticated authorised users of a system or device
50
what is meant by the term two-step verification
security method which needs two authentication methods preformed one after the other to prove identity
51
what is a good way to ensure that passwords remain effective
that they are strong and changed regulary
52
how do automatic software updates keep your data safe
they keep applications and the operating system constantly up to date - this enables bugs and security flaws to be fixed
53
what does SSL protocol stand for
secure socket layer protocol
54
what is SSL protocol
provides a clear channel between two computers or devices operating over the Internet eg HTTPS
55
what is a proxy server
any machine that checks and forwards traffic between networks or protocols
56
how does a proxy server keep data safe
provides varying levels of functionality, security and privacy depending on needs or company policy
57
How can you tell if something has secure socket layer protocol (SSL)
- check if web address starts with HTTPS - check is there is a locked padlock - check the digital certificate for the website
58
What is the name of the updated version of SSL protocol
TLS
59
What does a proxy server do
- acts as an intermediary between browser and web server - to monitor and filter traffic to web server - to help stop malicious traffic to the web server - to act as a fire walk
60
What is the purpose of a proxy server
- acts as an intermediary between browser and web server - to monitor and filter traffic to web server - to help stop malicious traffic to the web server - to act as a fire wall
61
What is the purpose of a web browser
To display web pages by rendering html