Unit 5: The internet and its uses Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is the difference between the internet and the world wide web

A

Internet:
* Users can send and recieve emails
* Allows online chatting (via text, audio and video)
* Makes use of transmission protocols (TPC) and internet protocols (ITP)
* It is a worldwide collection of interconnected networks and devices
World Wide Web:
* It is a collection of multimedia web pages and other information on websites
* http(s) protocols are written using HTML
* Uniform resource locations (URLs) are used to specify the location of web pages
* Web resources are accessed by web browsers
* Uses the internet to access information from web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are web browsers

A

Softwares that allow users to access and display web pages on their device screens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which is the protocol, domain host, domain name, domain type and country code of this website: https://www.hoddereducation.co.uk/ict

A

Protocol: https
Domain host: www
Domain name: Hoddlereducation
Domain type: .co
Country code: .uk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is HTTP

A

Hypertext transfer protocol (http) is a set of rules that must be obeyed when transferring files across the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When is the s added to https

A

When some form of security (e.g SSL or TLS) is used, http changes to https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Blockchaining

A
  • A decentralised database. All the transactions of networked members are stored on this database.
  • The blockchain consists of a number of interconnected computers but they are not connected to a central server
  • All transactional data is stored on all computers in the blockchain network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some properties of web browsers

A
  • They have a home page
  • They can store a users favourite website/web pages
  • They keep a history of websites visited by the user
  • They have the ability to allow the user to navigate forwards and backwards through websites/web pages already opened
  • Many web pages can be opened at the same time by using multiple tabs
  • They make use of cookies
  • They make use of hyperlinks that allow navigation between websites and web pages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are cookies

A

Cookies are small files or codes stored on a users computer. They are sent by a web server to a browser on a users computer. Each cookie is effectively a small look-up table containing pairs of (key,data) values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are session cookies

A

They are used for example when making online purchases. They keep a users items in a virtual shopping basked. This type of cookie is stored in temporary memory on the computer and doesn’t actually collect any information from the users computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are persistent cookies

A

Persistent cookies remember a users log in details. They are stored on the hard drive of a users computer until the expiry date is reached or the user deletes it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is digital currency

A

Digital currency exists purely in a digital format. It has no physical form unlinke conventional flat currency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is cryptocurrency

A
  • Cryptocurrency uses cryptography to track transactions
  • Cryptocurrency has no state control and all the rules are set by the cryptocurrency community itself
  • Cryptocurrency transactions are publicly available and therefore all transactions can be tracked and the amount of money in the system is monitored
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is data interception

A

A form of stealing data by tapping into a wired or wireless communication link. The intent is to compromise privacy or to obtain confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Distributed Denial of Service (DDoS) attack

A

An attempt at preventing users from accessing part of a network, notably an internet server. This is usually temporary but may be a very damaging act or a large breach of security. It doesn’t just affect networks; an individual can also be a target for a target for such an attack. The attacker may be able to prevent a user from:
* Accessing their emails
* Accessing websites/web pages
* Accessing online services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are brute force attacks

A

If a hacker wants to crack your password, they can systematically try all the different combinations of letters, numbers and other symbols until eventually they find your password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is malware

A

Malware is one of the biggest risks to the integrity and security of data on a computer system

17
Q

What are viruses

A
  • Viruses are programs or program code that replicate with the intention of deleting or corrupting files, or causing a computer to malfunction.
  • Viruses need an active host program on the target computer or an operating system that has already been infected, before they can actually run and cause harm
  • Viruses are often sent as email attachments, reside on infected websites or on infected software downloaded to the users computer
18
Q

What are worms

A
  • Worms are a type of stand-alone malware that can self-replicate. Their intention is to spread to other computers and corrupt whole networks; unlike viruses, they don’t need an active host program to be opened in order to do any damage.
  • They remain inside applications which allows them to move throughout networks
  • They arrive as message attachments and only one user opening a worm-infested email could end up infecting the whole network
19
Q

What is a Trojan Horse

A
  • A program which is often disguised as legitimate software but with malicious instructions embedded within it
  • They replace all or part of the legitimate software with the intent of carrying out some harm to the users computer system
  • Once installed on the users computer, the Trojan horse will give cyber criminals access to personal information on someone computer, such as IP addresses, passwords and other personal data
20
Q

What is Spyware

A
  • Spyware is software that gathers information by monitoring a users activities carried out on their computer
  • The gathered information is sent back to the cybercriminal who originally sent the spyware
21
Q

What is adware

A
  • A type of malware. At its least dangerous it will attempt to flood an end-user with unwanted advertising
  • Although not necessarily harmful, adware can:
    » highlight weaknesses in a user’s security defences
    » be hard to remove – it defeats most anti-malware software since it can be
    difficult to determine whether or not it is harmful
    » hijack a browser and create its own default search requests.
22
Q

What is Ransomeware

A
  • Programs that encrypt data on a users computer and ‘hold the data hostage’
  • The cybercriminal waits until the ransome money is paid, and sometimes, the descryption key is then sent to the user.
23
Q

What is phishing

A
  • Occurs when a cybercriminal sends out legitimate-looking emails to users. The emails may contain links or attachments that, when initiated, take the user to a fake website
24
Q

What is pharming

A
  • Malicious code installed on a users computer or on an infected website.
  • The code redirects the users browser to a fake website without the users knowledge.
25
Q

What is social engineering

A

Occurs when a cybercriminal creates a social situation that can lead to a potential victim dropping their guard. It involves the manipulation of people into breaking their normal security procedures and not following best practice.

26
Q

What are the two main anti-malware

A
  • Anti Virus
  • Anti spyware: detects and removes spyware programs installed illegally on a users computer system
27
Q

What are biometrics

A

Biometrics can be used in a number of applications as a security device

28
Q

How do fingerprint scans work

A
  • Images of fngerprints are compared. against previously scanned. fingerprint images stored in a database
  • If they match, then a user has been correctly recognised
  • The system compares patterns of ridges and valleys that are unique
  • The accuracy of the scan is about around 1 in 5000
29
Q

What are the advantages and drawbacks of fingerprint security

A

Advantages:
» fingerprints are unique, therefore this technique can improve security since it would be difficult to replicate a person’s fingerprints
» other security devices (such as magnetic cards to gain entry to a building) can be lost or even stolen which makes them less effective
» it would be impossible to ‘sign in’ for somebody else since the fingerprints would match with only one person on the database
» fingerprints can’t be misplaced; a person always has them!
Drawbacks:
» it is relatively expensive to install and set up
» if a person’s fingers are damaged through an injury, this can have an effect on
the scanning accuracy
» some people may regard any biometric device as an infringement of civil
liberties.

30
Q

How do retina scanners work

A

They use infrared light to scan the unique pattern of blood vessels in the retina

31
Q

What are the benefits and drawbacks of retina scans

A

Advantages:
* very high accuracy
* there is no known way to replicate a person’s retina
Drawbacks:
* it is very intrusive
* it can be relatively slow to verify retina scan with stored scans
* very expensive to install and set up