5. internet and its uses Flashcards

1
Q

what is the internet

A

a huge, public network of computer systems, and is the physical infrastructure that allows data to travel across the globe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what physical attributes make up the internet

A

Computers
Servers
Switches
Routers
Cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the world wide web

A

The resources located on the internet, such as web pages
The world wide web is accessed using the internet; you need an internet connection in order to access the world wide web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the different types of resources on the www

A

Web pages
Documents
Images
Videos
Music
Emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a URL

A

uniform resource locator
A text-based address for a web page containing the protocol, domain and web page/file name.
Some URLs also contain a file path between the domain name and the file name, separated by forward slash characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the parts of the url in the following example:
https://www.site24x7.com/science/find-ip-address-of-web-site.html

A

protocal- https
domain name- site24x7.com
file path- science
web page/ file name- find-ip-address-of-web-site.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the types of web protocals

A

http and https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

http

A

hypertext transfer protocal
a protocol used to transfer resources, such as web pages, via the world wide web.uses request codes to send and receive data and perform other various tasks such as: GET, PUT, DELETE, POST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

https

A

hypertext transfer protocal secure
a secure method of sending data via the world wide web, and was invented to combat the glaring security risk of sending sensitive data via the HTTP protocol

operates by using encryption to obfuscate data, using a method called Transport Layer Security (TLS). TLS uses a method called asymmetric public key infrastructure, with a public and private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain the purpose and functions of a web browser

A

The main purpose of a web browser is to render
hypertext markup language (HTML) and display
web pages
- Functions include:
– storing bookmarks and favourites
– recording user history
– allowing use of multiple tabs
– storing cookies
– providing navigation tools
– providing an address bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe how web pages are located, retrieved and displayed on a device when a user enters a URL

A

1-user enters the URL into the web browser’s address bar.
2-URL points to a web page or resource on the world wide web. However, computers connected to the internet communicate with each other using their IP addresses. All computer systems connected to the internet will have their own, unique IP address
3-DNS domain name system, keeps record of all domain names, maps each domain name to a IP address. If DNS doesnt have this domain name it goes to the other until domain found
4- once iP address found to the requested domain name, web browser visits IP address in question and requests web page or resource usually residing in web server
5- web server will either allow or disallow access to the resource, depending on the nature of the request.
6-if request granted, web server returns the resource to the web browser usually RAW html, web browser translates into readable format to user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are cookies

A

are small pieces of data that are stored on the users’ computer system, and are used by the web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

why are cookies stored?

A

Saving personal details
Tracking user preferences
Holding items in a shopping cart
Storing login details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are persistent cookies

A

A cookie that is stored long-term on the computer system.
often used to store login details for websites, meaning the user does not have to enter their credentials upon each visit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are session cookies

A

A cookie that is deleted after closing the browser, exists in memory, stored in RAM.
typically used while browsing sensitive information on the world wide web, such as online banking, e-commerce or similar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are digital currencies?

A

a currency that only exists electronically, and have no physical attributes but has a cryptographically assigned value, using complex algorithms and mathematics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are some characteristics of digital currencies

A

-decentralised (Transactions are processed by an open network that no single person owns.)
-irreversible and public (clear understanding of where the funds have travelled to and from, as well as the amount, person who owns the currency only one allowed to move said currency)
-anonymous (sending and receiving currency is anonymous, and simply requires a digital wallet and a wallet address)
-limit supply(a limited supply and circulation of digital currency)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

how are digital currencies used?

A

1- user must sign up to a digital currency exchange. This is essentially a place where users can purchase digital currency using traditional currency
2-Once a currency has been purchased, it resides in the user’s digital wallet. The user can send this currency to another digital wallet using a unique wallet address
3-The user will send the Bitcoin to the wallet address – which is recorded on the blockchain – and is received in the recipient’s wallet.

19
Q

what is a blockchain?

A

is a digital ledger, that is a time-stamped series of records that cannot be altered.
Each connecting block is chronologically linked to one another, providing a reliable record of events
If anyone attempts to change the contents of a data block, a brand new one is added.
it is completely tamper-proof and always independently verified

20
Q

what information does each block in a blockchain contain?

A

Sender wallet address
Receiver wallet address
Amount sent
Network fee (the cost of sending the digital currency using the blockchain)
Timestamp
Number of confirmations – mutual ‘agreements’ between multiple blockchain nodes adding details of the same transaction

21
Q

most common cyber security threats

A

-brute-force attack
– data interception
– distributed denial of service (DDoS) attack
– hacking
– malware (virus, worm, Trojan horse, spyware,
adware, ransomware)
– pharming
– phishing
– social engineering

22
Q

social engineering

A

art of manipulating or ‘conning’ individuals into giving away private information or login IDs and passwords eg phishing

23
Q

phishing

A

act of sending a malicious email to a target user, with the intent of stealing information from them

24
Q

brute force attacks

A

a hacker may go through a list of the most common passwords until access to an account is gained. This is usually automated using common hacking tools. Alternatively, the attacker may try every combination of characters until the correct password is found

25
Q

malware

A

software that can cause harm to a computer system. Malware is a broad term which can include viruses, trojan horses and spyware. As well as harming computer systems, they also cause significant financial damage, denial of service (DOS) and lack of functionality to key infrastructure.

26
Q

Ddos attack

A

when a number of computer systems – often thousands – suddenly send an incredible amount of internet traffic towards a single server or system. When this occurs, the bandwidth available for the target system, as well as system resources like CPU and RAM, become strained

27
Q

hacking

A

a general term for gaining access to a computer system without authorisation. A hacker is a person who will attempt to gain access to such systems, using various methods

28
Q

pharming

A

a form of fraud, and takes place online through malicious websites posing as legitimate businesses, such as banks. The goal of pharming is to trick the user into sharing personal information such as bank details, passwords and email addresses

29
Q

data interception

A

when a malicious attacker intercepts data in transit – when it leaves one system to be transmitted to another system – and uses that data for their own criminal activities, or to perform further attacks.

30
Q

virus

A

spreads between computers and causes damage to data and software. They aim to disrupt systems, cause major operational issues and result in data loss or leakage.​

31
Q

worm

A

type of malware with the function to replicate itself and infect other computers, it normally uses a computer network to spread itself relying on security failures.​

32
Q

trojan

A

a specific malware, which disguises itself and subsquently tricks users to downloading harmful malware, which has many consequences to device.​

33
Q

spyware

A

a type of malware that keeps track and records a users keystrokes as you type, to later gain access to passwords and other confidential information.

34
Q

adware

A

Various pop up advertisments that show up in your computer, with the potential to become harmful or malicous​

35
Q

ransomware

A

malicous softawre, which blocks access to a computer system by encrypting files on a device, until a sum of money is paid​

36
Q

what are the most common ways to protect digital data from security threats

A

access levels
– anti-malware including anti-virus and
anti-spyware
– authentication (username and password,
biometrics, two-step verification)
– automating software updates
– checking the spelling and tone of
communications
– checking the URL attached to a link
– firewalls
– privacy settings
– proxy-servers
– secure socket layer (SSL) security protocol

37
Q

access levels

A

A user can only access their personal documents, and not others
A user can only access the shared documents that are relevant to them
Other users cannot view, edit, copy or delete data and information that doesn’t concern them

38
Q

anti virus and anti spyware software

A

actively scan the computer system and, upon finding malicious files or software, either place it in ‘quarantine’ (a safe place on the system) or simply delete it from the system

39
Q

automatic software updates

A

Once a new strain of malware has been identified, software updates are usually very quick to roll out, so having ‘automatic updates’ enabled ensures these protections are automatically downloaded and installed on your system.

40
Q

authentication methods

A

-multi factor authentication
-strong passwords with some requirements
-biometrics

41
Q

firewalls

A

prevent unwanted network traffic to and from your computer by closing and opening ports on a computer system, which are used by different protocols.

42
Q

privacy settings

A

This is an effective way to control your visibility and protect you from malicious users looking for your personal information.

43
Q

proxy servers

A

A proxy server acts as a service to hide your IP address,Because your IP address is hidden, attackers cannot target your machine directly.
if an organisation uses a proxy server to connect their employees to the internet, they can control what content is allowed to be accessed.

44
Q

ssl

A

(Secure Socket Layer) is used to secure credit card transactions and data transfer
The padlock icon in your web browser’s address bar means SSL is in use. When you browse with SSL enabled, all traffic between your computer and the website is encrypted, so anyone who intercepts your data cannot make sense of i