Using the Internet Securely Flashcards
What is a URL and what does it stand for?
Uniform Resource Locator (URL)
URL Example: http://www.mycompany.com/folder/index.htm
URL is the standardized address of a resource, such as a website.
What is a Protocol?
A protocol is an accepted standardized set of rules for communication.
What is HTTP?
HyperText Transfer Protocol. It is one of the most common communication languages used in delivering web pages.
What is a Host name?
A host name is a unique identifier given to a device connected to a network, allowing it to be located and accessed by other devices on the network.
Name of computer holding the content (www)
What does ‘WWW’ stand for?
World Wide Web - a system of interconnected hypertext documents accessed via the internet.
What is TLD?
TLD stands for top-level domain.
The first-order Internet directories, which include the original six —.com, .gov, .net, .org, .mil, and .edu— as well as the original two-letter country-specific codes, such as .us, .fr, and .es, and a plethora of more recent creations, including .info, .blog, .chat, .movie, .company, and .play.
What is a Path to resource?
A path to a resource refers to the complete path or location of a specific resource within a URL. It is used to identify the specific page or file that a user wants to access within a website or web application. The path is typically listed after the domain name in a URL and includes any subdirectories, files, or parameters that are required to access the desired resource.
URL Structure Example:
“http://www.mycompany.com/folder/index.htm”
Protocol: (HTTP)
Host name: (www)
Registered domain name: (mycompany.com)
TLD: (.com)
Path to resource: (/folder/index.htm)
What does TLD stand for?
Top Level Domain
HTTP VS HTTPS
While HTTP is the most common protocol of the World Wide Web, it’s also not secure. All communications are visible and unencrypted.
If the URL instead starts with HTTPS, it’s using encryption and is more secure. Web browsers also display a padlock icon to indicate that a page is using the HTTPS protocol.
What does HTTP stand for?
HyperText Transfer Protocol
What does HTTPs stand for?
HyperText Transfer Protocol Secure
Shortened URLs
Shortened URLs are used frequently for legitimate purposes as well. Many of them allow you to hover your mouse over them without selecting and see a preview of the page the link is sending you to. You should still be cautious about selecting shortened URLs and check with the person who sent it to you to make sure they actually sent it and they know where it links to.
Guidelines for Browsing the Web Safely:
Usage:
- Use a current / updated web browser.
- Avoid installing unnecessary add-ins, plug-ins, or toolbars in your web browser.
- Hover your mouse over a link before you select it to see the real address to where it leads, particularly if it is a shortened (Bitly-type) address.
- If you’re using a mobile device:
* Use the link preview feature (if it exists) to see the
actual URL before you tap.
* Be mindful that it likely does not have malware
protection by default. - If you’re not sure if a link leads to where it claims, type the address in the address bar of a separate browser instance, rather than simply selecting the link.
- Bookmark websites that you commonly visit, so that you always have the correct address for those sites.
Guidelines for Browsing the Web Safely:
Awareness:
- Learn to recognize suspicious URLs.
- Be vigilant that the websites you use to enter or view sensitive data use HTTPS as the protocol.
- Be mindful of the significance of the first two elements to the left of the single slash in a URL.
- Avoid selecting/tapping ads and pop-ups.
Guidelines for Browsing the Web Safely:
Policies and Procedures:
- If your browser becomes infected or hijacked, seek help from your IT department.
- Always follow organizational policy when browsing the web.
- If your organization has an Internet usage policy, make sure you are familiar with it and follow it whenever you browse the web.
Email Security
Many of the same rules that apply to safe web browsing also apply to safe email usage. Know the people who are sending you email messages and to whom you’re sending email messages, and decide whether or not it’s appropriate to trust them. Instead of entering sensitive information directly into the body of an insecure email message, consider sending an encrypted or password-protected attachment instead.
Common Email Risks
Social engineering and malicious attachments are the two main risks.
Most common types of email - social engineering attacks:
* Fake security alerts: Your bank needs you to change your password.
* Threats of legal or official action: The government or a law firm is coming after you.
* Appeals for help: Someone you know is “stranded” in a foreign country.
* Malware removal/IT support offers: Malicious software has been “discovered” on your computer and someone wants to fix it for you.
* Free offers: Download an MP3 or win a tablet.
* Monetary/inheritance scams: Someone overseas needs your help getting their money.