Unit 5 - The internet and its uses Flashcards
what is ‘url’
Uniform resource locator. it is a text based address for a web page; it can contain the protocol, the demain name, and the web page/file name
what is the purpose of a web brower?
to render hypertext mark up language (HTML) and display web pages
what are 5 functions of a web browser?
-storing bookmarks and favourites
-recording user history
-allowing use of multiple tabs
-storing cookies
-providing navigation tools
-providing and using an address bar
-have home page
-use hyperlinks
-data is stored as a cache
-make use of JavaScript
what are 4 functions of cookies?
-saving personal details
-tracking user preferences
-holding items in an online shopping cart
-storing login details
what are session cookies?
It is stored in temporary memory on the computer but it doesn’t collect any information from the user’s computer and doesn’t personally identify a user. sessions cookies disappear once a user’s computer’s browser is closed or the website session is terminated. (example: used to keep a user’s items in a virtual shopping basket during online purchases)
what are persistent cookies?
These are stored in the hard drive of a user’s computer until the expiry date is reached or the user deletes it. They remain on the computer even after session cookies disappear. Legitimate websites will always encrypt any personal information stored in the cookies. (examples: remembering a user’s log in details, sometimes storing more personal information or user preferences)
(advantages: removes the need to type in log in details every time a certain website is visited, effeiciently carries data from 1 website session to another, removes need to store massive amounts of data of the web server, easier to retrieve a user’s data without requiring the user to log in every time they visit the website)
what is a blockchain?
digital ledger that is a time-stamped series of records that cannot be altered
what is brute-force attack?
method where all combinations of characters are tried to generate passwords
what is data interception?
stealing of data by tapping into a network.
what is DDoS attack?
distributed denial of service attacks. attempt to prevent anyone accessing part of a network (web servers). the system uses a network of computers to carry out an attack. DDoS can send spam mail to fill up a user’s inbox so that the user can’t access their emails.
what is hacking?
gaining illegal access to a computer system without the user’s permission. (It can lead to identity theft, gaining personal information, loss of key data)
what is virus?
programs that can copy themselves with the intention of deleting files or causing the computer to malfunction. They need an active host program on the target computer. (Usually on link in email)
what is worm?
stand alone viruses. they can replicate themselves with the intention of spreading to other computers. Worms can spread through a network without any action by an end user, making them more dangerous than viruses. (often use networks to search computers with weak security)
what is trojan horse?
malicious programs disguised as a legitimate software. They replace parts (or all) of the legitimate software with the intent of carrying out harm to the user’s computer system. (Trojan horse needs to be executed by an end user, so usually as an email or message that can be downloaded)
what is spyware?
software that gathers information by monitoring. The gathered information is sent back to the person who sent the software.
what is adware?
software that floods a user’s computer with unwanted advertising (usually pop-ups). (appear in browser address window redirecting to a fake website containing the promotional adverts) It can highlight weaknesses in a network’s security and it’s difficult to remove because it’s not considered harmful.
what is ransomware?
programs that encrypt the data on a user’s computer (needs decryption key), key is sent to the user only once they pay some money. (Ransomware is often sent via a Trojan horse or by social engineering)
what is pharming?
malicious code installed on a user’s computer or web server without the user knowing. Doesn’t need an action to able it. (often uses DNS cache poisoning which is using fake IP addresses to take the browser to the fake website)
what is phishing?
sending out legitimate looking emails to users. It requires the user to take action to initiate the phishing attack (like clicking on a link). Then the user’s browser is taken to a fake website where personal information can be stolen
what is social engineering?
when a cybercriminal creates a social situation that can lead to a victim dropping their guard. it manipulates people into breaking their normal security procedures. No hacking is required because the user willingly gives the cybercriminal access and information to carry out an attack. Its an effective way to introduce malware to a device.