the internet and its uses (paper 1) Flashcards

1
Q

define what the internet is

A

a global infrastrucure of interconnected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

define what the world wide web is

A

all the web pages that are accessible via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

outline the difference between the internet and the world wide web

A

the internet is the basis and wires and infrastructure of the world wide web, which is all the web pages availiable on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does URL stand for

A

uniform resource locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a URL

A

the unique text-based address each web page has

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what do you use to access a web page

A

a program called a web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is ‘https’

A

a protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a protocol

A

a set of rules for communication between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what do the rules of a protocol cover

A
  • standards of physical connections
  • standards of cabling
  • standards of mode of transmission
  • data format
  • error detection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does ‘http’ / ‘https’ stand for

A

HyperText Transfer Protocol (Secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the functions of a browser

A
  • storing bookmarks and favourites
  • recording user histroy
  • allowing use of multiple tabs
  • storing cookies
  • providing navigation tools
  • providing an address bar
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what code is used for a web pages

A

HTML = HyperText Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is an IP address

A

the unique address given to every public-facing, networked computer or computing device in the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the two different types of IP addresses

A

IPv6 and IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is the role of the domain name server

A

to convert a website address (URL) into an IP address so that a browser can makke a requestion to the correct web server with that web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what happens if the domain name server does not have an entry for that domain name

A

it passes the request to another more authoritive domain name server and if not match is found still, an error message will be sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are cookies

A

text files with small pieces of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what type of file is a cookie

A

a text file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what are cookies used for

A

to track user preferences, hold items in a shopping cart, store login details and other personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are the two types of cookies

A
  • session cookies
  • persistent cookies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what are session cookies

A

cookies that are created and replaced each time a user visits a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are persistent cookies

A

cookies that are created and saved on the first visit and retained until they expire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is meant by the term digital currrency

A

any money-like asset that only exists in digital form and exchanged digitally

24
Q

what is the most well known type of digital currency

25
Q

when is bitcoin most oftenly used

A
  • people can buy fractions of a bitcoin, like you can with gold
  • it can be used to trade for goods, serices and other currencies
  • some shops now accept bitcoin as a payment
26
Q

why are digital companies gaining popularity

A
  • can transfer funds from person to person without the intervention of private banking organisations
  • this reduces transfer fees and speeds up transaction time and improves security and anonymity
27
Q

what is a blockcahin

A

a database technology used to form a digital ledger of a time-stamped sreies of transaction records, tracking the movement of digital currency

28
Q

explain how blockchain works

A
  • each new transaction is added onto a chain of transaction blocks
  • each transaction carries unique ID number and reference to blocks in the chain
  • this reference is a hash total which is calculated by a ‘hashing’ algorithm using the previous blocks data
  • a change to any data in any block would create a ripple as all hash values would have to be changed so there are multiple copies
29
Q

why do block chains have multiple copies on different servers

A

so that of there is a change to a data block and it is not reflected in all copies, it will be rejected
this maintains the integrity and trustworthiness of the data

30
Q

what is meant by the term cyber security

A

it relates to the processes, policies and practices designed to protect against any threats or unauthorised access to networks, computers, programs or data

31
Q

what are the different types of cyber attacks

A
  • hacking
  • data interception and theft
  • phishing
  • shouldering
  • pharming
  • spyware
  • brute force attacks
  • suspicious links
32
Q

give the two malware and the two social engineering cyber attacks

A
  • malware = pharming, spyware
  • social engineering = phishing, shouldering
33
Q

what is hacking and how can it be prevented

A
  • automated or manual attempts to gain unauthroised access to programs or data
  • firewall to block access by unauthroised access
34
Q

what is data interception and theft and how can it be prevented

A
  • data may be intercepted during transmission, but physical theft can occur where storage devices or data files are left insecurely
  • encryption, physical locks, passwords
35
Q

what is phishing and how can it be prevented

A
  • phishing emails redirect a user to a fake website where they trick the reader into divulging confidential information like passwords to bank accounts
  • network policy, firewalls, user awareness of phishing ‘clues’
36
Q

what is shouldering and how can in be prevented

A
  • looking over someone’s shoulder when they enter a passwork or PIN
  • concealing your password or PIN entry
37
Q

what are brute force attacks and how can they be prevented

A
  • automated or manual attempt to gain unauthorised access to secure areas by truing all possible passwords or key combinations
  • strong passwords with limited attempts allowed
38
Q

what is spyware and how can it be prevented

A
  • software that hides on your conputer recording your activities to send back to a third party for analysis
  • anti-malware, ani-spyware software
39
Q

what is pharming and how can it be prevented

A
  • a form of cyberattack that sends you to a fake website that looks like the real things. the user types in a legitimate address and is redirected to a fake website
  • checking the URL, making sure the site says HTTPS not just HTTP, using a trusted internet service provider
40
Q

define malware

A

malicious software written to cause inconvenience or damage to programs or data

41
Q

what are the different types of malware

A
  • viruses
  • worms
  • trojan horse
  • ransomware
  • adware
  • distributed denial of service attack
42
Q

what are viruses

A

a program that is installed on a computer without the user’s kowledges or permission with the purpose of doing harm - it has instructions to replicated automatically

43
Q

what are worms

A

they are similar to viruses and can cause damage like corrupting files and stealing information - but it does not self replicated

44
Q

what is a trojan horse

A

a program that disguises itself as having a legitimate purpose but actually has another - it is often spred via email

45
Q

what is ransomware

A

it encypts all the victim’s files and a ransom is then demanded from the attacker in return to have files decrypted

46
Q

what is adware

A

malware that automatically displays onscreen advertisements, it is not always dangerous but may redirect the browser to an unsafe site

47
Q

what is a distributed ddenial of service attack

A
  • a malicious attempt to distrupt the normal trafic of a targeted server with a flood of internet requests
  • all these extra requests establish a botnet and evenutally the server fails or tuimmes out
48
Q

how can you keep your data safe

A
  • biometrics (face ID, fingreprint, voicerecognition)
  • two-step verification
  • passwords
  • automatic software updates
  • secure socket layer protocol
  • privacy settings
  • proxy servers
49
Q

what is meant by the term biometrics

A

use of pre-recorded human characteristics to authenticated authorised users of a system or device

50
Q

what is meant by the term two-step verification

A

security method which needs two authentication methods preformed one after the other to prove identity

51
Q

what is a good way to ensure that passwords remain effective

A

that they are strong and changed regulary

52
Q

how do automatic software updates keep your data safe

A

they keep applications and the operating system constantly up to date - this enables bugs and security flaws to be fixed

53
Q

what does SSL protocol stand for

A

secure socket layer protocol

54
Q

what is SSL protocol

A

provides a clear channel between two computers or devices operating over the Internet eg HTTPS

55
Q

what is a proxy server

A

any machine that checks and forwards traffic between networks or protocols

56
Q

how does a proxy server keep data safe

A

provides varying levels of functionality, security and privacy depending on needs or company policy