Web Pages Flashcards
Where was www invented? When? By who?
At CERN, near Geneva, Switzerland
1989
Tim Berners -Lee
What is the client server model?
The interaction of networked computers, clients request info and servers respond with info
What does HTTP stand for?
Hyper text transfer protocol
What is http?
Method of requesting and transmitting web pages, done by sending http requests and http responses
When was google chrome made? What about internet explorer? Safari? Edge?
2008
1995
2003
2016
Who created mosaic? What was it the first of?
Students at u. Illinois
GUI browser
What are web analytics?
Collection and analysis of data regarding website usage
What does HTML stand for?
Hyper text markup language
What are tags in html? What do they look like? What does an open vs closing tag look like?
Specify content characteristics
<tag>
</tag>
What is WYSIWYG software?
What you see is what you get is any kind of software when the content in the editor resembles its final form
Is html WYSIWYG?
No
What does <html> </html> tags define?
Outlines the html document
What does the tag <head> </head> define?
Contains info that is important to the document like author or keywords
What is the <p> </p> tag?
Text inside should be treated like a second paragraph
What is the <br></br> tag?
Line break
What is the tag for ordered vs unordered lists?
<ol> </ol>
VS <ul> </ul>
What tag is unused to anchor a hyper text link?
<a> </a>
What does css stand for?
Cascading style sheets
What is inline CSS for?
Apply a unique style to one html element
What are security risks on the client site?
Phishing (users are persuaded to give info), malware (viruses, worm, Trojan)
What are viruses?
Can corrupt, delete, or steal data, spread by attaching itself to other files shared between computers, remains dormant until infected file is run or opened
What is a worm?
Does not attach itself to file to spread, replicates itself autonomously, does not damage system but consumes resources
What is a Trojan?
Poses as a legitimate software but hides a nefarious purpose
What are examples of Trojans?
RAT: broadcasts images from webcams,
key logger: capture and transfer typed data
back door: provide remote access,
ransomware: encrypt data to extort money
What are security risks for servers?
Denial of service (DoS) attack, distributed denial of service (DDoS) attack,
What is a DoS attack?
Client repeatedly requests a connection but does not complete it, server cannot handle genuine requests
Can be mitigated by blocking requests from certain ip addresses
What is a DDoS attack?
A DoS attack from hundreds, thousands, or millions, of clients
Use Trojans to take control of network devices, called zombies
What is a coordinated network of zombies called?
A botnet
What are some security risks at the communication level?
Man in the middle
What is MITM? (Man in the middle)?
Intercept data between you and the destination server
Uses free wifi and sometimes used legitimately to inject ads