5 Flashcards

(39 cards)

1
Q

Item of hardware

A

Network interface card (NIC)
- Inside each computer or device to connect (allow it to have access) it to the network

Router, which contains:
- Router
- Wireless access point
- Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IP address

A

Unique address for each device used to route packets of data

  • Each address has a 32-bit number
  • It is usually written in denary with a dot separating each byte
  • The address allows data to be sent to the correct computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

router

A
  • The routing of packets, sends data to specific destination on a network
  • It assigns IP addresses if it contains a DHCP server;
  • It connects the private/local network to the Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How are IP address assigned?

A
  • A DHCP server (Dynamic Host Configuration Protocol) is built to home routers
  • When a new device connects to the network it is assigned an IP address by the DHCP server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless access point

A

The wireless access point may be inbuilt to the router – it allows devices to connect wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Modem

A

A modem will be part of a home router – it converts data from digital to analogue (radio or optical)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the need for IP address assignment.

A

Each computer on the network needs a unique IP address
To join the network, each computer is assigned the IP address that they will use by the router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MAC addresses

A

Each network interface card needs its own Media Access Control Address (MAC address)
The MAC address is given to the NIC when it is manufactured
MAC addresses are used to send data between two terms of hardware on a
network – such as a computer and router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State two components to the MAC address

A

-manufacture code
-serial code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

first 3 bytes of MAC Address

A

manufacturer code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

last 3 bytes of MAC adress

A

serial code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MAC address

A

Unique identifier for each hardware device permanently put on the device by the manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPv4 and IPv6

A

Standards for IP addresses,
- IPv4 uses 32-bit addresses
- IPv6 uses 128-bit addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dynamic and static IP addresses

A

IP addresses are allocated by the network/ISP and will be the same (static) each time the connection is made, or change (dynamic) each time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

State one issue with IPv4 that IPv6 fixes.

A
  • IPv4 has a limited set of IP addresses which are improved by IPv6 / far larger address
    range for IPv6
  • Improved security with IPv6
  • Autoconfiguration with IPv6 / no need for a DHCP server (1).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brute-force attack

A

– obtaining data, without permission, passing through

17
Q

URL structure

A

URL- https://www.mywebsite.org/index.html
Protocol - https
Domain name- mywebsite.org
Web page or file- index.html

18
Q

HTTP and HTTPS

A

Hypertext Transfer Protocol (HTTP) is the protocol used to send webpages
- It is unencrypted so not safe for sending personal information
- HTTPS (Hypertext Transfer Protocol Secure) is used to send and receive web pages and form data in an encrypted format

19
Q

HTML

A

– Hypertext markup language – used to create
web pages

20
Q

Create a list of at least five browser features

A

Storing bookmarks and favourites; Recording user history
Allowing use of multiple tabs
Storing cookies
Providing navigation tools
Providing an address bar
Rendering (displaying) web pages

22
Q

Explain the difference between session cookies and persistent cookies

A

Session cookies are deleted after the browser window closes
Persistent cookies remain on the computer until their
expiry date

23
Q

Harmful software includes:

A

Malware
(viruses, worms, Trojan horses, spyware, adware
and ransomware)

24
Q

Prevention methods include:

A

Anti-malware, anti-virus, encryption, acceptable use policies, backup and recovery procedures

25
viruses
They replicate their code in other programs They infect other computers They harm the computer by deleting, corrupting or modifying files
26
worms
They might cause no damage to the attacked computers They slow down networks and computers replicates itself to spread to other computers
27
Trojan horse
They have a program, game or cracked file which is something the user wants They have negative program code which causes damage, takes control, or provides access to the computer
28
Ransomware
-First encrypts the hard drive of a computer -The user is unable to read any files on the computer or run any programs -The user would need to pay ransom usually by a cryptocurrency such as bitcoin - If they pay the ransom, their files should be restored. Otherwise, all files will be deleted -The motivation for this attack is to receive the ransom (money)
29
Spyware
-Spyware is a type of malware that finds information about users, their computers or company information -The information is then sent to a hacker who is able to misuse it -The spyware may be hidden inside an app, software, file attachment or malicious website
30
Adware
-Adware is a type of malware that displays large numbers of adverts, often through multiple windows -In the worst cases, new adverts appear faster than the user is able to close them -The hacker aims to make money from users clicking on the adverts
31
Malware
– software that aims to harm computers and/or data
32
Hacking
– Activities that misuse computer systems/networks
33
Phishing
- emails that pretend to be form legitimate companies but actually try to gain personal information
34
Pharming
– Changing DNS records to point to the wrong IP address - So when browser searches up the web page, it will go to the wrong IP address which is controlled by a hacker - The hacker will have a web server that serves a fake web page, such as a form for a user to log in to a bank
35
Distributed denial of service (DDoS) attack or DoS
– flooding a server or network with pointless requests to make it fail or slow down
36
Man-in-the-middle attack (MITM)
- allows the attacker to intercept data communications between the user and server. -Meaning hacker can then eavesdrop to find passwords and personal information
37
found
Criminals sometimes leave a USB stick containing malware in a public place such as a company car park Someone may pick it up and insert it into their computers so malware can now install onto the computer so that and hacker can gain access to you files and information
38
Brute-force attack
– trying all possible passwords until the correct one is found
39
Reducing threats on mobile devices
- Use the password feature and choose a strong password - Make sure the data is encrypted - Do not follow links in suspicious emails - Think carefully before posting your mobile phone number on public websites - Don’t install apps without researching them first – if they require unnecessary extra permissions, don’t install them - Delete all information stored on your mobile before discarding