Unit 5: The internet and its uses Flashcards
What is the difference between the internet and the world wide web
Internet:
* Users can send and recieve emails
* Allows online chatting (via text, audio and video)
* Makes use of transmission protocols (TPC) and internet protocols (ITP)
* It is a worldwide collection of interconnected networks and devices
World Wide Web:
* It is a collection of multimedia web pages and other information on websites
* http(s) protocols are written using HTML
* Uniform resource locations (URLs) are used to specify the location of web pages
* Web resources are accessed by web browsers
* Uses the internet to access information from web servers
What are web browsers
Softwares that allow users to access and display web pages on their device screens
Which is the protocol, domain host, domain name, domain type and country code of this website: https://www.hoddereducation.co.uk/ict
Protocol: https
Domain host: www
Domain name: Hoddlereducation
Domain type: .co
Country code: .uk
What is HTTP
Hypertext transfer protocol (http) is a set of rules that must be obeyed when transferring files across the internet.
When is the s added to https
When some form of security (e.g SSL or TLS) is used, http changes to https
What is Blockchaining
- A decentralised database. All the transactions of networked members are stored on this database.
- The blockchain consists of a number of interconnected computers but they are not connected to a central server
- All transactional data is stored on all computers in the blockchain network
What are some properties of web browsers
- They have a home page
- They can store a users favourite website/web pages
- They keep a history of websites visited by the user
- They have the ability to allow the user to navigate forwards and backwards through websites/web pages already opened
- Many web pages can be opened at the same time by using multiple tabs
- They make use of cookies
- They make use of hyperlinks that allow navigation between websites and web pages
What are cookies
Cookies are small files or codes stored on a users computer. They are sent by a web server to a browser on a users computer. Each cookie is effectively a small look-up table containing pairs of (key,data) values.
What are session cookies
They are used for example when making online purchases. They keep a users items in a virtual shopping basked. This type of cookie is stored in temporary memory on the computer and doesn’t actually collect any information from the users computer
What are persistent cookies
Persistent cookies remember a users log in details. They are stored on the hard drive of a users computer until the expiry date is reached or the user deletes it.
What is digital currency
Digital currency exists purely in a digital format. It has no physical form unlinke conventional flat currency
What is cryptocurrency
- Cryptocurrency uses cryptography to track transactions
- Cryptocurrency has no state control and all the rules are set by the cryptocurrency community itself
- Cryptocurrency transactions are publicly available and therefore all transactions can be tracked and the amount of money in the system is monitored
What is data interception
A form of stealing data by tapping into a wired or wireless communication link. The intent is to compromise privacy or to obtain confidential information
What is a Distributed Denial of Service (DDoS) attack
An attempt at preventing users from accessing part of a network, notably an internet server. This is usually temporary but may be a very damaging act or a large breach of security. It doesn’t just affect networks; an individual can also be a target for a target for such an attack. The attacker may be able to prevent a user from:
* Accessing their emails
* Accessing websites/web pages
* Accessing online services
What are brute force attacks
If a hacker wants to crack your password, they can systematically try all the different combinations of letters, numbers and other symbols until eventually they find your password
What is malware
Malware is one of the biggest risks to the integrity and security of data on a computer system
What are viruses
- Viruses are programs or program code that replicate with the intention of deleting or corrupting files, or causing a computer to malfunction.
- Viruses need an active host program on the target computer or an operating system that has already been infected, before they can actually run and cause harm
- Viruses are often sent as email attachments, reside on infected websites or on infected software downloaded to the users computer
What are worms
- Worms are a type of stand-alone malware that can self-replicate. Their intention is to spread to other computers and corrupt whole networks; unlike viruses, they don’t need an active host program to be opened in order to do any damage.
- They remain inside applications which allows them to move throughout networks
- They arrive as message attachments and only one user opening a worm-infested email could end up infecting the whole network
What is a Trojan Horse
- A program which is often disguised as legitimate software but with malicious instructions embedded within it
- They replace all or part of the legitimate software with the intent of carrying out some harm to the users computer system
- Once installed on the users computer, the Trojan horse will give cyber criminals access to personal information on someone computer, such as IP addresses, passwords and other personal data
What is Spyware
- Spyware is software that gathers information by monitoring a users activities carried out on their computer
- The gathered information is sent back to the cybercriminal who originally sent the spyware
What is adware
- A type of malware. At its least dangerous it will attempt to flood an end-user with unwanted advertising
- Although not necessarily harmful, adware can:
» highlight weaknesses in a user’s security defences
» be hard to remove – it defeats most anti-malware software since it can be
difficult to determine whether or not it is harmful
» hijack a browser and create its own default search requests.
What is Ransomeware
- Programs that encrypt data on a users computer and ‘hold the data hostage’
- The cybercriminal waits until the ransome money is paid, and sometimes, the descryption key is then sent to the user.
What is phishing
- Occurs when a cybercriminal sends out legitimate-looking emails to users. The emails may contain links or attachments that, when initiated, take the user to a fake website
What is pharming
- Malicious code installed on a users computer or on an infected website.
- The code redirects the users browser to a fake website without the users knowledge.