5. The internet and its uses Flashcards

1
Q

How do DOS attacks work?

A

Large number of requests sent to server at once
Useless traffic floods the server
Server will come to a stop trying to deal with the traffic
Prevents users gaining access to the web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do cookies do?

A

Saves log-in information
Provides customized page for user
Enables target advertisements
One-click purchasing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 functions of browsers

A

− Allows user to view web pages
− Renders HTML
− Allows user to bookmark/favourite web pages
− Provides navigation features
− Allows (multiple) tabs
− Stores cookies
− Records history of pages visited
− Has a homepage
− Runs active script
− Allows files to be downloaded from website/internet
− Sends a request to the IP address/web server (to obtain the contents of a web page)
− Sends URL to DNS
− Manages HTTP/HTTPS protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical security

A

Data needs to be kept physically safe from intruders, in large companies by…
Issuing staff with ID
Having all visitors sign in on arrival and having escorts around the office
Keeping sensitive areas locked
Security cameras
Security guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Physical Security and Biometrics

A

Locks on doors
Security Guards
Biometrics:
- Fingerprint recognition
- Retina scanner
- Iris recognition
- Voice recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Audit trails and logs

A

Audit trail maintains a record of all activity on a computer system
The time and date a user accesses the system will be logged as well as their activity
Assists in detecting security violations
Help system admin ensure the system has not been harmed by hackers, insiders or technical problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Acceptable use policies (AUP)

A

Many businesses and educational facilities require employees or students to sign an AUP before being given a network ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secure passwords

A

Minimum of 8 characters
Mixture of numbers, lowercase and uppercase characters
Include symbols
Do not include name, DOB or personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing

A

A phishing email is one that tricks you into handing over your personal or sensitive information
You receive an email leading you to a bogus site to enter your details from where they are captured by phishers

What to look out for:
Generalised impersonal greeting
Sender’s address, variation from original
Forged link, roll mouse over link to check
Request personal information, legit sites do not do this
Sense of urgency
Poor spelling and grammar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pharming attacks

A

Similar to phishing but instead of using a fake link in email, pharming redirects victims to bogus sites despite entering the legit website

Detecting pharming attacks:
ISPs filter out bogus redirects as soon as an attack is detected
Check the URL once loaded has not changed
Before entering sensitive information check that http has changed to https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trojan Horse Email

A

Offers something tempting to look at like an attachment or link eg. funny video

When you open the attachment or click the link it installs a virus on your computer which may:
- record your keystrokes and send them to the attacker
- Provide someone else with access to your files
- Use your computer to send spam to everyone in your
address book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virus generated emails

A

Appear to be sent from a friend
Usually means your friend’s email has been infected and sent to their entire address book
Typically includes product or shop recommendation and asks for emergency cash
Encourages you to click a link to a sales website or transfer cash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption

A

Encryption is the encoding of data so that it can no longer be easily understood to safeguard the data if intercepted.

Terminology:
Plaintext: original message
Ciphertext: encrypted message
Encryption: the process of converting plaintext into ciphertext
Key: a sequence of numbers used to encrypt or decrypt, often data using a mathematical formula.
Encryption algorithm: the formula for encrypting the plaintext

Encryption techniques:
Private key (symmetric encryption)
A single key used to encrypt and decrypt a message and must be given to the recipient of your message to decrypt the data

Public key (asymmetric encryption)
Two keys are used, one to encrypt and one to decrypt
This is more secure as you never have to send or reveal your decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Caesar shift cipher

A

Earliest known substitution cipher invented by Julius Caesar

Each letter is replaced by n positions further in the alphabet

n is the key used to encrypt and decrypt the message - symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cryptanalysis

A

The objective of cryptanalysis is to decode the ciphertext - typically by finding the secret key

Methods include:
Brute-force attack
every possible key is tried
Non-brute-force attack (cryptanalysis)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key strength

A

5 bits would enable 2^5 key combinations so it could be said that you are using 5 bit encryption

Increasing the number of bits used for a key increases encryption strength.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Algorithmic security

A

Ciphers are based on computational security

keys determined using computer algorithm
given enough computer power and time any key can be cracked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Strong and weak encryption

A

Encryption can be considered “strong” when the useful lifetime of the encrypted data is less than the time needed to crack it

Weak encryption means that the encryption can be cracked while the encrypted data is still in its lifetime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Other methods of data protection

A

Passwords
SSL (security protocol)
TSL (security protocol)
Firewalls

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Proxy server

A

A proxy server is a computer that acts as an intermediary between a web browser and the internet.
It helps to improve web performance by storing a copy of frequently accessed web pages.

A proxy server may act as a firewall
can help to improve security by filtering out some web content like malware
responds to input packets by blocking and allowing some
gateway from one network to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HTTPS

A

s in https stands for secure

this means a security protocol is used to ensure a trusted encrypted data connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Secure Sockets Layer and Transport layer security

A

SSL is a protocol for transferring private documents via the internet

it uses asymmetric encryption to encrypt data before transmission

many websites use SSL to receive confidential information like credit card details

TSL is a more recent upgrade to SSL. Like SSL it uses public key to encrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Process of getting web page from webserver

A

Web browser sends request to IP address or web server to identify itself by providing certificate
Web page sent from web server to browser
Browser renders HTML to display web pages
HTTPS used to secure data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Benefits of USB connection

A

Universal connection
High transmission speeds
No incorrect connections
Can be inserted both ways
Backwards compatible
Fast data transfer speed
Inexpensive to purchase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Protocols to transfer data safely

A

HTTPS
SSL
TSL - layers are handshake and record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the internet

A

A collection of interconnected networks, not the world wide web as that is a part of the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

ISP

what do they supply

what they allow you to do

storage in an ISP

A

ISPs are companies supplying connectivity to the internet, email services, web hosting and VOIPs.

You connect to the Internet service provider that you are contracted with, when you connect to the ISP you become a part of their network. This ISP may connect to a larger network and become a part of that.

Every ISP has its own data storage facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Browser softwares

Examples
How to access

A

Internet explorer, google chrome and firefox are all browser softwares. One way to access a particular page is by typing its address into an address bar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Cloud based services

Mini def
Examples

A

Servers host software or services that you can access.

Online storage:
Dropbox
OneDrive
Google Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Connecting to the internet

A

PC > Router > Modem > ISP > Internet

router provides access to local area network
modem connects to your internet service provider (ISP)
- modem no longer used in modern technology
ISP connects you to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Modem

A

stands for modulator/demodulator
converts digital signal from computer and converts to analogue signal for phone lines
a second modem at the receiving end converts the signal back to digital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Router

A

A router is a hardware device that allows you to connect several devices to a single internet connection (home setting)
Many routers have a WAP (Wireless access point) allowing you to create a wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

TCP/IP protocol

A

TCP (transmission control protocol)

breaks up messages sent over the internet into packets
reassembles packets at the other end
detects errors
resends lost messages
IP protocol
- routes the individual packets between sender and recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

HTTP and HTTPS Protocol

A

HTTP (hyper text transfer protocol) used for accessing and receiving web pages in the form of HTML files on the internet
The protocol requests the web server to upload the requested web page to the users browser for viewing

HTTPS (secure protocol) encrypts the information so that it can not be hacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Packet switching

files and packets micro def

packet header

A

Each file is broken up into packets
Each packet is given a header containing:
- IP address its going too (Internet protocol)
- IP address it came from
- Sequence number of the packet
- Number of packets in the whole communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

IP Addressing

A

Every device connected to the internet has an IP address
eg. 81. 101. 137. 12
Packets are labelled with the senders and the destinations IP address
Packets are sent across the internet along separate routes and reassembled at the end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Public vs Private IP addresses

A

A PC network has a public and private IP address
Public IP belongs to the router on your LAN
Private IP is accessible only through the LAN

ISPs are allocated blocks of IP addresses
Once a message arrives at the router of your LAN it will use the private IP address to identify which device requested information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

MAC Addressing

in full and assigned by who

how many addresses and for what

what it looks like

similarity of and combinations

role

A

A media access control address is assigned to each Network interface card by the manufacturer.

Computers may have 2, one for ethernet and one for wireless or for a phone wireless and bluetooth

Hex value eg.
3B:14:E6:39:0A:2C

Every network device in the world has a unique MAC address
There are 2^48 possible MAC addresses

Role of a MAC address:
When you request a web page each router along the way uses the MAC address of the next router to send the data packet to the next leg of its journey.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

URL

A

Uniform resource locator is a web page and all are unique

WWW.

Domains names (TDLs)
.uk , .nz etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

DNS

A

Domain Name system
DNs technology allows you to type a URL into your web browser and it translates the web address into an IP address.

There are 13 DNS “root” servers worldwide that keep complete database of all names and IP addresses
Lower level DNS servers are owned by ISPs and hold parts of the database
When a DNS server receives a request not in its database it will pass it on until reaches one with the matching name and IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Cookies

A

A cookie is a small data file that a web server puts onto your computer when you visit a website

Cookies save any data entered such as registration details, passwords and relevant adverts for you as well as web preferences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Role of a browser

how browser gets webpage/website on your computer

A

User types web address (URL) into browser
Browser forwards request to web server to access page
Web server acknowledges request and sends HTML source code for the web page to the computer
Source code is rendered (translated) into viewable web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Malicious software

what it does

what it can/typically does

types x6

A

Malware is any software written with malicious intent.

Disrupt computers from their work
Corrupt files
Record key presses and gather information
Gain unauthorised access to a computer or files
Not all viruses cause harm, but the ones (most) that do:

limiting hard disk space and memory
destroying or damaging files and data
spamming your address book with contacts
consuming your internet bandwidth
Types of Malware:

Spyware,
gathers information, installs more spyware, sends information back to spyware author, sells to advertising companies or help with identity theft

Adware,
irritating pop ups, instals itself on a computer, rarely harms

Viruses,
small program that replicates by inserting itself in other computer programs
- attach them self to existing software programs and infect when you run that program
- self replicate

Worms,
a standalone file that does not need a host program to attach itself to

Trojans,
a non-self-replicating virus that masquerades as a harmless file that you might want to open

Ransomware,
malware used to lock your computer or access to your flies for which you are then asked to pay a fee to regain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Botnets

A

A virus can compromise a computer and use the host’s storage and processing power to perform jobs

This computer can then become a part of a Botnet network ( a group of computers secretly cooperating to send spam or cause disruption on a much larger scale)

Computers in a botnet can:

send email spam to other users
store and distribute illegal material
perpetrate a Denial of Service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

DOS attacks

A

Denial of service attack
Frequently aimed at company or web servers to overload them or make them crash by:
- flooding servers with millions of requests
- absorbing 100% of its processor time or memory
- using all available bandwidth

Attempts to make a network or website unavailable to legit users and the motive is often revenge, blackmail or terrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Reducing the risk of any cyber security issues

A

Use strong passwords, keep software up to date, and avoid clicking on suspicious links or downloading files of unknown sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Anti-virus softwares

what they do

how they do

A

detects viruses
deletes or quarantines infected files
commonly finds all malware including adware, spyware,
worms and Trojans
Works by:

holding a dictionary of snippets used in viruses
scans new files, downloads, external drives on your computer
looks for suspicious codes by comparison
keeps a dictionary of know viruses up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Firewall

A

acts as a filter or barrier between your own trusted
network and others
only allows certain data packets across that meets set
filtering rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Hacking

A

Breaking security defined as unauthorised access to files or data

Exploiting weaknesses in websites or security systems
to access data
Guessing default or common passwords
Tricking people into downloading malware to gain
access to their computer
Logging in as someone else without their permission
In order too:

pure mischief or a challenge
steal money
steal or modify information
for political reasons, expose wrongdoing or revenge on opposing views

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Black and white hats

A

Black hat hackers are illegally hacking with criminal intent

White hat hackers ethical hackers employed by companies to deliberately find holes in their own security

Grey hat hackers look for wholes in other systems and ask for a payment from those systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Cracking

A

Not hacking

Illegally accessing program source code to change it or fool it to:

Bypass security or licensing control
prevent software from expiring
unlock features that otherwise would require a subscription

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Hyper Text Markup Language

A

International standard language that all pages can read and all pages are written in.

Webpages, webpage code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

HTML Code

A

In a text file containing the content of the website to be displayed by the browser

Uses to govern how to present sections of content

Stores locations of images that are to be displayed

Stores the location of other websites that are linked to using hyperlinks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

HTML vs CSS

A

HTML controls content and function of a web page

Cascading Style Sheets control its style and appearance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Writing HTML code

A

open <> and close >

Websites are made of a head and body

<h1> , <h2>, <h3>, <h4> - different headings (main , sub)

<img></img></img>

<em> </em>:
emphasis

<a>
Click here for more info
</a>:
link placed in middle line, click to access</h4></h3></h2></h1>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Adding CSS to a webpage

A

Define the style at the top between tags

h1 {colour:blue; text-align: centre}

Everything that falls inside the style tag, that html will adopt that style

Sector ==> h1 or other
Declaration ==> property and value
Property ==> colour or other
Value ==> blue or other

h1 {colour: blue;}

To add a CSS style:
Define a style for a particular tag eg. h1
or
Define a general style and attribute it to a new name eg. #page

Attribute style to a <div> block:
Image file on desktop

</div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Describe how the SSL works

A

− Browser / client sends request to webserver for identification
− Web server sends its digital / security certificate
− Browser authenticates certificate
− If authentic connection, is established any data sent is encrypted
− Using public and private key to do this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Describe how the TSL works

A

− Handshake and record protocols
− Client/Browser requests secure connection to web server
− Browser requests server to identify itself
− Web server then provides digital certificate after identification
− Browser validates certificate
− Browser sends signal to web server to begin transmission
− Session key generated
− Encryption method is agreed on

The handshake protocol is used to exchange all the information needed by both computers in order to establish a secure SSL/TLS connection

The record protocol handles the actual data and it’s encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Describe how a browser accesses a web page

A

Browser sends URL to DNS using HTTP
DNS find matching IP address for URL and sends it to the browser
Browser requests web server for web pages
Web pages are then sent from web server to the web
browser
Browser then renders the HTML to display web pages
Security certificates authenticated, SSL and TSL used to
encrypt data sent to and fro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Describe how a proxy server works

A

− Acts as mediator between the user’s computer and web server
− Allows internet traffic to be filtered
− Speed access to information on website using cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Describe encryption

A

− Encryption key used
− Key uses algorithm to scramble data
− Data before encryption is plain text
− After encryption it is known as cypher text
− Same key used to decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Describe symmetric encryption

A

− Key is kept secret, only sender and receiver know
− Sender uses same key to encrypt and decrypt
− Key has to be sent over internet, can be intercepted
− Less safe but fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Describe asymmetric encryption

A

− Public and private key mathematically linked
− Public key used to encrypt, anyone can see
− Private key not transmitted, used to decrypt
− Safer process but slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Describe a Denial of Service attack

A

− Webserver is sent multiple requests, requests flood the webserver at the same time
− Webserver crashes / runs slow
− Designed to prevent access to e.g. a website // Stops legitimate requests being processed/serviced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Describe copyright, plagiarism

A

Copyright
− law/legislation that requires permission to use intellectual property / other people’s work

Plagiarism
− To claim other’s work as your own
− To use other people’s work without consent / acknowledgement
− Theft of intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Accidental loss of data and prevention

A

Lost from

Human error, accidentally deleting file
Hardware failure
Power failure or surge
Physical damage, fire or flood
Misplacing storage device

Prevention

Back up data regularly
Use surge protection and UPS
Keep data in protective case
Use verification method for deleting file
Follow and educate on correct procedure of ejecting files, saving, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Internet risks

A

Phishing
Pharming
Spyware
Dos
Malware
Viruses
Worm
Rootkit
Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

How to minimise risk of spyware

A

Anti-spyware

Scans computer for spyware
Removes/quarantines any spyware found
Prevent spyware from being installed

Onscreen keyboard

Key-logger can’t collect data of key press
Can’t relay useful info to 3rd party

2 Factor Authentication

Extra data sent to device
Harder for hacker to obtain data
Data has to be entered into same system if entered from remote location not accepted

Firewall

Can be software or hardware based
Monitors incoming and outgoing traffic
Allows criteria to be set
Blocks access to signal that do not meet criteria
Restricts access to specific applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

How to minimise risk of virus

A

Anti-virus

Scans computer for viruses daily
Has a record of known viruses
Removes/Quarantines any virus found
Warns user of virus
Checks data before downloaded
Prevents download of virus found

Firewall/Proxy server

Monitors incoming and outgoing traffic
Allows setting of criteria
Checks if traffic meets criteria
Blocks traffic that does not meet criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

How to minimise risk of hacking

A

Firewall/Proxy server

Monitors incoming and outgoing traffic
Allows setting of criteria
Checks if traffic meets criteria
Blocks traffic that does not meet criteria

Passwords

Use long and more random passwords
Change it regularly
Lock after a set attempts

Biometrics

Data needed to enter is unique to individual
Hard to replicate
Lock after set attempts

2 Factor Authentication

Extra data sent to device
Hard for hacker to obtain
Data entered needs to be in the same system, if attempted from remote location it’s not accepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Describe Phishing and Pharming

A

Phishing
− Legitimate looking email sent to user
− encourages user to click a link that directs user to a fake website
− User encouraged to enter personal details into a fake website // designed
to obtain personal details from a user

Pharming
− Malicious code/malware is downloaded without users’ knowledge
− That re-directs user to fake website (when legitimate URL entered)
− User encouraged to enter personal details into a fake website
− Designed to obtain personal and sensitive details from a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Describe free software, freeware, shareware

A

Free software-
* Type of software licence
* Free of charge
* Normally distributed without the source code
* Can legally share / copy
* Cannot legally modify code
* Cannot resell
Freeware- Owner has copyright for software but can be given away for free

Shareware- Often a trial version of full software, fee required for full access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Copyright

A

Legal protection person can obtain to provide protection against their work stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Identify and describe risks to a device when accessing the internet

A

Hacking
− When a person tries to gain unauthorised access to a computer system
− Data can be deleted/corrupted by hacker

Malware
− A software program designed to damage data / disrupt the computer system
− Replicates itself and fills the hard disk

Virus
− A program that replicates itself to damage/delete files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Describe Cracking

A

-When someone alters a program source code usually for a backdoor (by disabling computer security software)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is hacking?

A

illegally gaining access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

illegally gaining access to a computer system in known as

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Why do people hack (5)

A

Curiosity
Financial Gain
Malicious
Hacktivism
Military

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Curiosity,Financial Gain,Malicious,Hacktivism,Military are all reasons to___?

A

Hack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Cracking is

A

Changing a program’s source code to be used for another use (illegal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Changing a program’s source code to be used for another use illegally is known as

A

Cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What is spyware

A

Software which tracks keylogs and through this can find out passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Software which tracks keylogs and through this can find out passwords. Is known as

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

How is Spyware prevented

A

Antispyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Antispyware prevents___?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Spyware (5)

A

User clicks on a link from an email or website
When clicked spyware is downloaded
Monitors users activity and relays it back to author
Keypresses can be analysed to find passwords
Common key logs allow password to be found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Viruses (3)

A

Program that replicates itself
Deletes or corrupts files
Ransomware a new form of virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Phishing (5)

A

Fake email sent that looks legitimate
User clicks on link in the email
User redirected to fake website
Often used to try and steal financial details
How to avoid – Don’t click on links from unknown emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Pharming (3)

A

Malicious code stored on a computer
Redirects user to fake website to steal users data
How to avoid – check the URL is as expected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Cookies (4)

A

Message given to browser by webserver
Stored in a text file
Stores detail about users preferences on a website
Message sent back to server each time that page is requested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Cookies uses (5)

A

Enable logon information to be kept
Provide customized pages for the user
Enable target adverts
Enable one-click purchasing with shopping carts
Be able to distinguish between new and repeat visitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Causes of data loss (5)

A

Accidental Deletion
Malicious – virus
Hardware failure
Software failure
Natural disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Data loss prevention (4)

A

Set data to read only
Use correct shut down procedures
Use correct procedures when removing portable storage devices
Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Firewalls(5)

A

Prevents unauthorized access
Acts as a filter for incoming/outgoing data
Checks data meets criteria
Logs incoming and outgoing traffic
Blocks access to specified IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Antivirus (2)

A

Compares virus signature against a database of known virus signatures
Removes any viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Proxy servers (3)

A

Keeps user IP address secret
Prevents direct access to a web server
Filters traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Biometrics examples (3)

A

Voice recognition
Facial Recognition
Thumbprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Text v Biometric (2)

A

Text passwords easier to hack than biometrics
- Biometric passwords are unique and can’t be shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Security methods (2)

A

Encryption
- SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

SSL (5)

A

Uses encryption
Uses SSL
Uses digital certificates – contains public key
Makes use of public and private keys
Data is meaningless without the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

How can we tell a website is using SSL(3)

A

Protocol end in s e.g. https
Padlock on some browsers
Colour of address bar changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

SSL process (5)

A

Web browser connects to the website
Web browser requests web server to identify itself
Web server sends browser a copy of its SSL certificate
Browser checks the certificate is trustworthy and sends message back to server
Server acknowledges message and SSL session begins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

TLS layers (2)

A

Record
- Handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Record layer (2)

A

Contains the data being transferred
- Can be used with or without encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Handshake layer (2)

A

Website and client authenticate each other
- Encryption algorithms used to establish secure session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Differences between TLS and SSL (3)

A

Possible to extend TLS using new authentication methods
TLS can make use of session caching
TLS separates handshake and record protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

How does encryption work on text (6)

A

Before encryption it is plain text
Text encrypted using an algorithm
Text encrypted using a key
Encrypted text called cypher text
Key transmitted separately from text
Key used to decrypt the cypher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Assymetric(5)

A

Private key and Public key needed
Public key given to everyone
Private key only known by the computer user
Encryption keys generated using a hashing algorithm
Different keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Plain text & Cyper text

A

Text encrypted using encryption algorithm
Text encrypted using a key
Key transmitted separately from the text
Key used to decrypt the text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Authentication (1)

A

-Used to verify that data comes from trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Symmetric Encryption (1)

A

-Uses the same key to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Hashing algorithm (4)

A

Takes message or key and translates it into string of characters
Usually shown in hex notation
Length depends on algorithm used
Same hashing algorithm needed to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

DoS Attacks (4)

A

Large number of requests sent to server at once
Designed to flood a server with useless traffic
Server will come to a stop trying to deal with the traffic
Prevents users gaining access to the web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Types of softaware(3)

A

Free software
Freeware
Shareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Free software (4)

A

Can use for any legal purpose you wish
Can study and change the source code
Can pass on to other people
Must not be used to infringe copyright laws by copying existing software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Freeware(2)

A

Can download and use free of charge
- Cannot view or modify the source code e.g. Skype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Shareware (5)

A

Can use for a trial free of charge
Need to pay once the trial is over
Often trial version missing key features
Protected fully by copyright laws
Cannot modify code or distribute the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

What is hacking?

A

the act of gaining illegal access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

What is cracking?

A

the editing of program source code so it can be exploited/changed for a specific purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

What are viruses?

A

program code that can replicate/copy itself with the intention of deleting/corrupting data/files or causing the computer to malfunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

What is phishing?

A

sending legitimate lookng emails to encourage uses to give out personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

What is pharming?

A

malicious code installed to redirect uses to a fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

What is spyware/key logging software?

A

gathers data by monitoring keypresses on user’s keyboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

What are cookies?

A

pieces of data that allow detection of web pages viewed by a user and store their preferences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

What is accidental or malicious loss of data?

A

this could be due to accidentally deleting a file or to a malicious attack from viruses or hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

What are firewalls?

A

examines traffic between user’s computer and a public network - can help prevent viruses or hackers entering a user’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

What is secure sockets layer (SSL)?

A

allows data to be sent and received securely across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

What is transport layer security (TLS)?

A

a protocol that is designed to ensure that no third party may eavesdrop or tamper with any message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

What is symmetric encryption?

A

a secret key which makes a message unreadable unless the recipient also has the decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

What is asymmetric encryption?

A

a form of encryption requiring both a public and private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

What is authentication?

A

used to verify that data comes from a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

What is a denial of service attack?

A

an attempt at preventing users from accessing part of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

What is free software?

A

users have the freedom to run, copy, change or adopt free software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

What is freeware?

A

software which users can download free of charge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

What is shareware?

A

users are allowed to try out shareware for a trial period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

What can hacking lead to?

A

lead to identity theft and loss or corruption of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

How can you minimise the risk of hacking?

A

using strong passwords

using firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Why is cracking done?

A

for malicious purposes (such as modifying legitimate software to do something like redirect a user to a fake website)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

How can you minimise the risk of cracking?

A

it is hard to do
software engineers need to make the act of breaking into the software nearly impossible (make it difficult to identify back doors)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

What do viruses cause computers to do?

A

run slow
crash
cause some software to run abnormally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

How to reduce the risk of viruses?

A

running anti-virus software

don’t open emails/software from unknown sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

What are the main signs that an email is a phishing email?

A

messages containing poor spelling/grammar
asks for personal information
unrealistic threats/promises made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

How can you reduce the risk of pharming?

A

anti-spyware software can identify and remove pharming code on the hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

What is wardriving?

A

the act of locating and using wireless internet connections illegally
can lead to stealing of internet time/bandwith

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

How can you prevent the risk of wardriving?

A

use of WEP (wired equivalent privacy) encryption
complex passwords
firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

What are Networks?

A

Networks are connections between nodes (devices) to share resources. Being connected to a network can be dangerous because there are more access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

What are the types of Networks?

A

Personal Area Network (PAN)
Local Area Network (LAN)
Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

What is PAN?

A

A personal area network is within the range of an individual, +- 10m. Examples are:

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

What is LAN?

A

It is a network that connects devices close to one another, like in the same house; school; office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

What is WAN?

A

A wide area network is a network over a broader, geographic area. For example, an internet connection is given by an ISP. The internet is a WAN made up of individual LANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

What is a Client-Server Network

A

In a Client-Server Network, every device is either Client or Server. A client will request resources from the server.

When a resource is wanted, the client establishes a connection with the server over the network
Servers backup and store data centrally, although expensive and difficult to run.
It is centralized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

What is a Peer-to-Peer Network

A

A P2P network is decentralized. Each node is equal in responsibility and can work as both client and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

What are the factors that affect Network Performance?

A

Latency
The Delay, Speed of Signals
Bandwidth

Max rate of Data Transfer (bps)

Error Rate
How often data is corrupted
How often data must be resent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

What are the differences between wired connections and wireless connections?

A

Wired connections are generally faster
Though Bandwidths must be taken into account, but is shared across a network

Wireless range signals degrade quickly and can be blocked
Signals at the same frequency can interfere, leading to dara collisions
Bus topology have higher error rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

What are network protocols?

A

They are rules that must be accepted to devices can be compatible and reliably communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

How are protocols developed?

A

They are developed in layers, each responsible for a different part of the process of communication. Layers break the process down into managable self-contained parts.

Easier to develop because it is focused on one aspect
easier to develop standards
changing one layer won’t affect another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

What us the TCP/IP Protocol Stac?

A

It has 4 layers:

Application Layer
HTTP/S; FTP; SMTP; IMAP & POP; DNS

Transport Layer
TCP; UDP

Network Layer
IP

Link Layer
Ethernet; Wifi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

What is the Application Layer?

A

The application layer is where network applications can operate, e.g:

Web Browsers, Email Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

What is the Transport Layer?

A

This layer sets up communication between the two hosts, and includes the agreed rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

What is the Network Layer?

A

This layer addresses and packages data, and routes it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

What is the Link Layer?

A

This is where the hardware and drivers operate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

What is the Ethernet?

A

It is a standardised family of protocols.

Ethernet works at the link layer
it describes how devices on the same netwoek degment format data and transmit it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

What is Wi-Fi (WLAN)?

A

It is a form of wireless transmission, radio waves
EM waves are categorised on frequency
A channel represents a small frequency range, designated by number
Frequency overlap can cause interference.
Data is encrypted using WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

What is the TCP?

A

TCP is the transmission control protocol, which runs in the transport layer. It deals with the connection between devices, it:

receives data from the application layer
receives the packets from the network layer
splits data into packets
reassembles them
sends an acknowledgment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

What is the IP?

A

It is the internet protocol, it addresses packets with the source and destination’s IP address, and works at the network layer. The IP removes the IP addresses when the packets are no longer needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

What is HTTP?

A

It is the hypertext transfer protocol, a hypertext is a type of text with links. HTTPS is HTTP with encryption through certificates. HTTP is used to access a webpage from a web server, the process goes as:

The client requests a message
the webserver gives a response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

What is FTP?

A

The file transfer protocol is of the application layer, which handles file uploads and downloads. HTTP transfers viewable content whilst FTP transfers data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

What are the email protocols?

A

SMTP
POP3
IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

What are the outbound email protocols?

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

What are the Inbound email protocols?

A

POP3
IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

What is SMTP?

A

The simple mail transfer protocol is of the application layer.. it handles outbound. It sends the email to a mail server, and then to the internet. SMTP servers have user databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

What is POP?

A

it is post office protocol, this is from the internet, mail server to the client. It doesn’t keep client and server in sync. When the mail is downloaded, it is deleted from the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

What is IMAP?

A

It is internet message access protocol, where it keeps both client and server synced in which the mail is copied instead of downloaded. For the mail to be deleted from the server, you must contact the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

What are the network topologies?

A

Topologies are the arrangement of the nodes and connections in a network.

Bus
Star
Mesh
Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

What is the Bus Topology?

A

All clients, serbers and resrouces are connected to one medium, the bus.
When a node communicates, the data is transmitted down the bus.
All drivers receive it but only the intended recipient accepts and processes the message.
There are terminators on both ends, which are resistors. They prevent data from reverberating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

What are the advantages and disadvantages of the bus topology?

A

Advantages:

Cheaper, because less wires

Disadvantages:

If the main bus fails, all fails
Prone to data collisions in high traffic, which slows the data down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

What is the ring topology?

A

In this topology, each device is connected to two other devices, forming a ring for messages to travel around. The nodes take turns sending data, data is sent one direction through each device until the intended recipient receives it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

What are the advantages and disadvantages of the ring topology?

A

Advantages:

Simple, less wires, cheaper.

Disadvantages:

All nodes must be one for the data to be sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

What is the star topology?

A

Most home networks uses this topology, as each node is connected to the central connection point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

What are the advantages and disadvantages of the star topology?

A

Advantages:

Data goes immediately to recipient

Disadvantages:

If the central connection point fails, network stops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

What is the mesh topology?

A

In a full mesh, every node is connected to every other node. In a partial mesh, there are simply many connections between nodes. A mesh could be used as a backup mechanism, called the redundancy as it is needed but used as an alternative route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

What are the advantages and disadvantages the mesh topology?

A

Advantages:

Provides backup should one route fails
Direct links to recipient.

Disadvantages:

Expensive, many wires
Complicated
Can’t add one device without connecting to every other device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

What is Network Security?

A

It is the processes, practices, and technologies designed to protect networks from attacks, damages, or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Where do attacks originate from?

A

It can happen internally and externally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

What are the kinds of security do you need to watch out for?

A

Physical Security
CCTVs, Case Locks, Disabling USB Ports

Cloud Security
Ensure the cloud servers you use are safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

What should be done when checking security?

A

Validation
Ensuring that data is correct and secure before processing

Authentication
Ensuring that an entity is genuine, like users, product authentications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

What are some security threats?

A

Unpatched Software
Misconfigured Access Controls
Social Engineering
Phishing
Shoulder Surfing
USB devices
Portable Digital Devices
Eavesdropping
Malicious Code, malware basically
Commercial Analysis tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

What is Unpatched Software?

A

It is basically just un-updated software, which may have some protection holes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

It is basically just un-updated software, which may have some protection holes.

A

It is when an entity has permission to access something that they’re not supposed to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

What is Phishing/Pharming?

A

It is the usage of sending emails from a ‘verified’ entity that contains malicious links that can lead to websites that download malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

What is shoulder surfing?

A

Someone staring at you when you type in important information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

What is Malicious Code?

A

It is malware like:

viruses
spyware
things like that

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

How can you identify vulnerabilities?

A

Penetration Testing
Ethical Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

What is penetration testing?

A

It is basically stimulating an attack to find any weaknesses. For example, entering a random username and password just to see if it can access the site. It is normally done by an external entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

What are the kinds of penetration testing?

A

White-box pen test
Inside attack, where attacker has some knowledge of the system

Black-box pen test
Outside attack, hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

What is ethical hacking?

A

Hacking is finding and exploiting vulnerabilities, it is only ethical when done in a testing context. There are kinds identified by white/black/gray hat hackers. For it to be ethical, it must:

Have permission
Be worked on securely
notify admins when weaknesses are found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

What are Firewalls?

A

They monitor network traffic and filter data packets based on agreed rules. Routers and dedicated hardware contain firewalls, they can:

Block Packets
Connections from certain regions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

What is the structure of a data packet?

A

Header

Data

Trailer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

How do firewalls work?

A

Packet filtering is done by looking at the addresses on the packet header. (first generation)
Stateful Inspection is done by looking at the data context. (second generation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

What are some security measures (2)?

A

Design Stage Planning
Audit Trails
Securing Operating Systems
Good Programming Practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

What is Design Stage Planning?

A

It is threat modeling, basically just analysing vulnerabilities from a theoretical attacker’s view.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

What are Audit Trails?

A

These are system records kept, which can trace security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

What is Securing Operating Systems?

A

Limit User Accounts
Directory Permissions
Strong Passwords
Limit automatic softwares
Install patches and update new versions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

What is the internet?

A

It is the worldwide collection of networks that use the internet protocol suite, TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

What is the World Wide Web?

A

It is the collection of web pages hosted on web servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

What is the difference between the WWW and the Internet?

A

The WWW is the resources on the internet, whilst the internet is the hardware.

207
Q

What are URLs?

A

They are addressers to specific web resources.

208
Q

What is the structure of a URL?

A

Network Protocol → Domain Name → File Names

209
Q

What is an IP address?

A

It is an address that uniquely identifies devices on a network. IP addresses are denary, but also uses 8 bit binary, it is:

assigned by the ip
temporary, like in ram
defines geographic locations

210
Q

How does the internet work?

A

Data transverses throughout international servers.

211
Q

How does data get to a certain device?

A

The international routers uses the destination IP address of the packet to identify where to send the packet. Routing algorithms will determine the best route to get there.

212
Q

What is the method of data transmission?

A

Packet Switching

213
Q

What is Packet Switching?

A

There is no fixed paths, but each packet can take different routes, packet heads contain packet numbers, MAC and IP addresses as well as the protocol. The trailer has a validation checks.

214
Q

what are ISPs

A

internet service protocol are companies that provide users with access to the internet

215
Q

what are IP addresses

A

IP address is used to identify a device (on the Internet / network)
32-bits
changes as you move because static or dynamic
ipv4 and ipv6
assigned by ISP
address is unique for given Internet session
256.342.34.235

216
Q

what are MAC addresses

A

hardware/physical address
unique number that identifies a device (connected to the Internet)
address is made up of manufacturer id + serial number of device
address is allocated by the manufacturer
48 - bits
1st half is manufacturing
2nd half is serial number
does not change/ static only
part on Number identification card

217
Q

what is hypertext transfer protocol

A

a set of rules obeyed when transferring files across the internet

218
Q

parts of URL

A

access protocol
domain name
file name

219
Q

What is the Internet?

A

A global infrastructure of interconnected networks

220
Q

What is the World Wide Web?

A

All of the web pages that are accessible via the Internet.

221
Q

What is a URL and what does it stand for?

A

Uniform Resource Locator
Each web page has its own unique text-based address

222
Q

What is the https part of a URL called?

A

Protocol

223
Q

What is the www part of a URL called?

A

Host

224
Q

What is the disney.co.uk part of a URL called?

A

Domain Name

225
Q

What is the index.html part of a URL called?

A

Web page / file name

226
Q

What is a protocol?

A

A set of rules for communication between devices. It allows equipment from different suppliers to work together

227
Q

What does HTTP stand for?

A

HyperText Transfer Protocol

228
Q

What is HTTP?

A

The standard transmission protocol of the Web

229
Q

What is HTTP?

A

The standard transmission protocol of the Web

230
Q

What is the problem with HTTP?

A

Any data you enter into the site is sent in plaintext and is susceptible to hacking

231
Q

What does HTTPS stand for?

A

HyperText Transfer Protocol Secure

232
Q

What is HTTPS?

A

A secure protocol that encrypts any data sent between the website and your browser so that it can’t be understood if intercepted.

233
Q

What are the functions of a browser?

A

Storing bookmarks and favourites
Recording user history
Storing cookies
Providing navigation tools
Allowing use of multiple tabs
Providing an address bar

234
Q

What does HTML stand for and what is it?

A

Hypertext Markup Language

The standard markup language for creating web pages

235
Q

What is an IP address?

A

A public address that is unique to each device. Every networked computer has an IP address

236
Q

What does a Domain Name Server do?

A

It converts a URL address into an IP address

This means that a browser on a client machine can make a request to the correct web server hosting that web page

237
Q

What does a Domain Name Server do?

A

It converts a URL address into an IP address

This means that a browser on a client machine can make a request to the correct web server hosting that web page

238
Q

What happens if the DNS server doesn’t have an entry for the domain name?

A

It passes the request to a more authoritative DNS server. An error is sent back if no match is found.

239
Q

What are cookies?

A

Text files with small pieces of data

240
Q

What do cookies do?

A

They are used to track user preferences, hold items in a shopping cart, store login details and other personal details

241
Q

What are session cookies?

A

They are created and replaced each time a user visits a website

242
Q

What are persistent cookies?

A

They are created and saved on the first visit and retained until they expire

243
Q

What advantages come from using cookies for a retailer on an online shopping site?

A

The retailer can send personalised email advertisements to customers

The retailer can analyse quantity and value of sales/advertising

The retailer can implement one-click purchasing

244
Q

What are the advantages for the user when visiting an online shopping site that uses cookies?

A

They will not need to remember login details

They can use one-click purchasing

Websites will remember their personal customisations

245
Q

What is digital currency?

A

Any money-like asset that only exists in digital form. It is exchanged digitally with no physical banknotes or coins in circulation

246
Q

Why are digital currencies gaining in popularity?

A

Can transfer funds without the intervention of private banks

Reduced transfer fees and sped-up transaction completion time

Improves security and anonymity

247
Q

What is a blockchain?

A

A digital ledger –> a time-stamped series of transaction records sequentially linked in a chain, tracking the movement of a digital currency

248
Q

How does blockchain work?

A

Each new transaction is added onto a chain of transaction blocks
Each block will carry the user’s ID number and a reference to the previous block. This is known as a hash total and is calculated with a hashing algorithm
A change of data in one block will create a ripple effect of incorrect hash totals
The blockchain will be stored on multiple different servers, and if one chain doesn’t match all others, it will be rejected

249
Q

What is digital currency

A

currency (a system of money) that exists in electronic form only;

250
Q

What is cryptocurrency

A

a form of digital currency that uses a chain of decentralised computers to control and monitor transactions

251
Q

What is cryptography

A

the protection of data/information by use of coding; it usually involves encryption and decryption

252
Q

What is a blockchain

A

is a digital ledger, that is a time-stamped series of records that cannot be altered

253
Q

What is a timestamp

A

a digital record of the date and time that a data block is created in blockchain networks

254
Q

4 things a block contains

A

Data
Hash value
Previous hash value
time stamp

255
Q

Why is tampering prevented

A

Because altering one block will change its hash value and break the link to the following blocks - invalidating the whole chain.

256
Q

What is hacking?

A

Automated or manual attempts to gain unauthorised access to programs or data

257
Q

How to protect against hacking?

A

Firewall to block access by unauthorised devices

258
Q

What is a brute force attack?

A

Automated or manual attempts to gain unauthorised access to secure areas by trying all possible password/key combinations

259
Q

How to protect against brute force attacks?

A

Strong passwords
Limited attempts allowed

260
Q

What is data interception and theft?

A

Data may be intercepted during transmission, but physical theft can occur where storage devices or data files are left insecurely

261
Q

How to protect against data interception and theft?

A

Encryption
Passwords
Physical locks

262
Q

What is spyware?

A

Software that hides on your computer and records your activities to send back to a third-party for analysis

263
Q

How to protect against spyware?

A

Anti-malware
Anti-spyware software

264
Q

What is phishing?

A

Phishing emails redirect a user to a fake website where they trick the reader into divulging confidential information such as passwords that can be used fraudulently

265
Q

How to protect against phishing?

A

Network policy
Firewall
User awareness of phishing ‘clues’

266
Q

What is pharming?

A

Sends the user to a fake website that looks like the real thing. The user types in a legitimate address and is redirected to a fake website

267
Q

How to protect against pharming?

A

Checking the URL
Making sure the site says HTTPS, not HTTP

268
Q

What is malware?

A

Checking the URL
Making sure the site says HTTPS, not HTTP

269
Q

What is malware?

A

Malicious software written to cause inconvenience or damage to programs or data

270
Q

What is a virus?

A

A program that is installed on a computer without the user’s knowledge or permission with the intent of doing harm.

It includes instructions to replicate automatically on a computer

271
Q

What is a worm?

A

A program that is similar to a virus, except it cannot self-replicate

272
Q

What does anti-virus software do?

A

Software that runs on a computer checking all files for known viruses
It must be updated regularly

273
Q

What is a Trojan horse?

A

A program that masquerades as having one legitimate purpose, but it actually has another

274
Q

How does a Trojan horse work?

A

A link is spread by email

The user is invited to click on a link for an everyday purpose

This link then executes a program which gives the controller unauthorised access to the computer

275
Q

What is ransomware?

A

A form of malware that encrypts a victim’s files.

276
Q

How does ransomware work?

A

A ransom is demanded from the attacker in return for instructions on how to decrypt the files

277
Q

What is adware?

A

A malware that displays onscreen advertisements. It is not always dangerous, but could redirect the browser to an unsafe site

278
Q

What does DDoS stand for?

A

Distributed Denial of Service

279
Q

What is a DDoS attack?

A

A malicious attempt to disrupt the normal traffic of a targeted server with a flood of Internet requests

280
Q

How does a DDoS attack work?

A

Multiple interconnected devices in different locations establish a botnet

The attacker is then able to direct the attack by sending remote instructions to the bots to send requests to the target’s IP address

The server becomes overwhelmed, and genuine requests cannot be handled

The server fails or times out

281
Q

How can you protect against DDoS attacks?

A

A firewall can filter through requests to separate the genuine and fradulent requests

282
Q

What are biometrics?

A

Pre-recorded characteristics to authenticate authorised users of a system/device

283
Q

What are some examples of biometric authentication?

A

Facial recognition
Iris and retina scanners
Fingerprint recognition
Voice recognition

284
Q

What is two-step verification?

A

Two authentication methods performed one after the other to prove someone’s identity

285
Q

What are automatic software updates?

A

These updates will keep applications and the OS up-to-date. This enables bugs and security flaws in the software to be fixed with a patch

286
Q

What does SSL stand for?

A

Secure Socket Layer

287
Q

What does SSL stand for?

A

Provides a secure channel between two computers or device operating over the internet

288
Q

What is SSL used for?

A

SSL is used to secure communication between a web browser and a web server.
It will then use an HTTPS address for the website
Similar to asymmetric encryption

289
Q

What can privacy settings allow a person to do?

A

Control what information about them is shared on a social media platform. A user can control who has access to what they post, and who can see their full profile

290
Q

What could be counted as a proxy server?

A

Any machine that checks and forwards traffic between networks or protocols.

291
Q

What does a proxy server do?

A

It’s an intermediary server that separates end-user clients from their destination site. It can provide varying levels of functionality, security and privacy.

292
Q

Why does data need to be kept safe?

A

Accidental damage could occur, such as file corruption and human errors
Malicious actions may be taken by other people to view, delete, copy and/or corrupt data without authorisation

293
Q

What is SSL?

A

Secure Socket Layer
Provides secure connection between internet browser and websites
Allows transmission of private data
Indicated by padlock sign on the web browser (sometimes the address bar is green)
Uses two keys to encrypt the data: a public key known to everyone and a private key only known to the recipient
URLs that require an SSL connection start with ‘https’
e.g. e-commerce shops use SSL to keep credit card details secret

294
Q

What is symmetric encryption?

A

A type of encryption where the same key is used to encrypt and decrypt the message. This differs from asymmetric (or public-key) encryption, which uses one key to encrypt a message and another to decrypt the message.

Increasing the length of the key increases the strength of the encryption.

295
Q

Define

network

A

A computer network is a number of computers linked together and able to communicate using certain protocols. Networked computers can share resources including hardware, software and data.

Most computer networks have at least one server.

296
Q

List some advantages of using networks

A

Advantages:

Easy, efficient communication by emails, instant messaging, telephony, video conferencing, chat rooms, etc.
Ability to share files, data and information (beneficial for large organizations to organise data and allow certain people access to data)
Saves costs by sharing hardware (e.g. printer) and software (site licences are likely to be cheaper than buying several standalone licences)
Sensitive files and programs on a network can be password protected.
Rapid sharing and transferring of files, saves time while maintaining the integrity of files

297
Q

List some disadvantages of using networks

A

Disadvantages:

Possibility of breakdowns and loss of resources
Expensive to build
Managing a large network is complicated, requires training and a network manager usually needs to be employed
Viruses can spread to other computers in the network
Danger of hacking, particularly with wide area networks. Security procedures are needed to prevent such abuse, e.g. a firewall.

298
Q

Define

protocol

A

Pre-agreed signals, codes and rules that are used between two or more computer systems to exchange data and information

299
Q

Define

internet

A

The internet is a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.

The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support email.

300
Q

Define

web browser

A

A piece of software used to view and download web pages and various types of files such as text, graphics, sound and video.

301
Q

List the typical functions offered by web browsers

A

Displaying web pages
Browsing back and forward between web pages
Customisation of basic options such as your homepage, content censorship and security preferences
Bookmarking
History
Offline browsing
Downloading
Search engines
E-mail

302
Q

Define

server

A

A combination of computer and software that provides a service to other client computers or application programs.

303
Q

What is an Internet server?

A

This is a computer with specific web server software that provides clients with access to web pages

304
Q

Define

client

A

Client devices send requests for services, e.g. printing or retrieval of data to specific server devices that perform the requested processing

305
Q

What is an Internet Service Provider (ISP)?

A

A company that provides you with access to the Internet, usually for a fee. The most common ways to connect to an ISP are by using a phone line (dial-up) or broadband connection (cable or DSL).

Examples : STC, Mobily, Zain, etc.

306
Q

What is http?

A

Hypertext transfer protocol (http) is the underlying protocol used by the World Wide Web which defines (1) how messages are formatted and transmitted, and (2) what actions Web servers and browsers should take in response to various commands.

For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page.

307
Q

What is https?

A

Hypertext transfer protocol over secure (https) is a secure method of accessing or sending information across a web page. All data is encrypted before it is sent, preventing anyone from understanding that information if intercepted.

Because data is encrypted over https, it is slower than http, which is why https is only used when requiring login information or with pages that contain sensitive information such as an online bank web page.

308
Q

What is HTML?

A

HyperText Markup Language (HTML) is the markup language used in creating web pages on the World Wide Web.

A document Markup Language is a modern system for annotating a document in a way that is clearly distinguishable from the text.

309
Q

Distinguish between HTML structure and presentation

A

Structure consists of the mandatory parts of an HTML document plus the semantic and structured markup of its contents.

Presentation is the style you give the content. In most cases presentation is about the way a document looks, but it can also affect how a document sounds – not everybody uses a graphical web browser.

Separate structure from presentation as much as possible. Ideally you should end up with an HTML document which contains the structure and content, and a separate CSS file which contains everything that controls presentation.

310
Q

What is TCP/IP?

A

IP: internet protocol
TCP: transmission control protocol, it performs handshakes, packet sequencing, flow control and error handling
Extremely popular protocol on which the internet is based
Data is broken up into independent small packets
Size of the packet is up to the network designer (typically they start from 512 bits upwards)

311
Q

What is an IP address and why is it used?

A

An Internet Protocol (IP) address is a unique identifier for computers on the internet
—Each device that is part of a network using TCP/IP (normally internet) has to have an address to be able to identify itself and be allowed to use the network.
Static IP addresses are fixed, dynamic addresses change frequently.

312
Q

What are the two forms of IP address and how do they differ?

A

IPv4:

—Uses 32-bit addresses
There are not enough addresses for all computers on the internet, as some addresses are reserved for certain purposes or for certain companies

IPv6:

Uses 128-bit addresses
Solution to the problem of not having enough addresses

313
Q

What is the format of an IPv4 address?

A

Four numbers separated by periods (in the form w.x.y.z.)
Each number is an 8-bit binary number between 0 and 255, making up a 32-bit address
Each number group in the address sub-divides the network to which the computer is connected with the final number being the actual computer.

11000000.10101000.00000000.11001011
192.168.0.203
Network address
Host address

314
Q

What is a MAC address?

A

Stands for Media Access Control
Also known as a hardware address or physical address
Uniquely identifies each node of a network (A node is a processing location – a network adapter or any device with built-in network capability)
While an IP address can potentially be assigned to any device, a MAC address is ‘burned into’ a given device from the factory – it is hard-coded into the network interface card (NIC) by the manufacturer

315
Q

How are MAC addresses used?

A

Uniquely identifies an adapter on a LAN
Allow communication between devices on a local network by making it possible to reliably distinguish one computer from another
Increase security as cannot be impersonated
If you set up a WiFi one of the things you can do to improve security is to only allow devices with certain MAC addresses to connect to the network.
When a data packet is being sent out to a station that is on the same network LAN segment, only the MAC address is needed.

316
Q

What is the format of a MAC address?

A

Six pairs of hexadecimal digits (48 bits in length), usually separated by colons or dashes

01:1F:33:68:BC:14
OR
01-1F-33-68-BC-14
Organisational Unique Identifier
(OUI)
*Identifies the company that manufactured or sold the product
Universallv Administrated
Address (UAA)
*Specific to the device, like a serial number

317
Q

What is the format of a MAC address?

A

Six pairs of hexadecimal digits (48 bits in length), usually separated by colons or dashes

318
Q

What are cookies and why are they used?

A

A message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server.

They are used:

to enable logon information to be kept on the computer
to provide customised pages the next time the user logs on, e.g. customised adverts
to implement shopping carts and one-click purchasing
to be able to distinguish between new and repeat visitors to the website

319
Q

Standalone computer

A

A computer that is not connected to a network

320
Q

Network

A

An arrangement of two or more computers that are connected together for the purpose of sharing resources and data

321
Q

Internet of Things (loT)

A

A network of physical objects that use sensors, actuators, embedded systems and wireless technology such as WiFi and bluetooth to collect and exchange data with no human interacion

322
Q

VoIP

A

Voice internet protocol

323
Q

LAN

A

Local Area Network

324
Q

WAN

A

Wide Area Network
-Bank / hotel chain network

325
Q

WLAN

A

Wireless Local Area Netwrok
- Hand held scanners

326
Q

Wireless Local Area Netwrok
- Hand held scanners

A

A computer connceted to a network used to coordinate (store and share) huge amounts of data

327
Q

Latency

A

The time it takes for a message to transfer (ms). AkA ping

328
Q

Internet

A

An interconnected network or network of networks.
Most networks are part of the internet.
Consists of multiple cables or links that connect countries together, and can be though of as the backbone.

329
Q

Packet switching

A

Breaking down a large amount of data into small packets, each packet is independent from one another
Each packet is tagged with:
Source address
Destination address
Sequence number of the packet
total number of packets being sent

330
Q

Router

A

Manages communication on the network. Can have a built-in wireless access point (WAP)

331
Q

TCP

A

Transmission Control Protocol
Responsible for delivering data to a given address

332
Q

Modem

A

Modulator / Demodulator

333
Q

HTTP

A

Hyper Text Transfer Protocol

334
Q

SMTP

A

Simple Mail Transfer Protocol

335
Q

Network topology

A

A Network topology is the arrangement with which computer systems or network deveices are connected to each other

336
Q

Bus topology

A

In a bus topology, all nodes in the network are connected directly to a central cable that runs up and down the network

337
Q

Ring topology

A

Each node is connected with two other deveices

338
Q

Star typology

A

All nodes indirectly connect to each other through 1 or more switches. The switch acts as a central point through which all communications are passed.

339
Q

Mesh topology

A

There is no central connection point. Instead each node is connected to at least one other node

340
Q

Avantages of bus topology

A

Easy to install
-Cheap to install

341
Q

Disadvantages of bus topology

A

-If the central cable fails the whole networks fails and stops working

342
Q

Advantages of Ring topology

A

No data collisions, as the data only flows in one directions

343
Q

Disadvantages of ring topology

A

If the main cable fails, the network fails

344
Q

Advantages of star topolgy

A

If a cable fails, the whole network will not fail and other computers can still work
High performance as there are no data collisions

345
Q

Disadvantages of star topology

A

It is expensive to build as it requires more hardware such as switches and wires

346
Q

Advantages of mesh topology

A

Manages a large amount of data as computers can trasnmit data simultaneously
If a cable fails, the network still works

347
Q

Disadvantages of mesh topology

A

-It is expensive to build
- It requires much more time to repair or build

348
Q

IP

A

Internet protocol
Responsible for obtaining the address to which data is sent.
A set of rules that govern data transfer in the internet

349
Q

TCP/IP

A

Layered protocol stack
Collection of protocols
It sets how data should be formatted and transmitted across networks

350
Q

Web Server

A

Holds and shares web pages

351
Q

File server

A

Holds and maintains user files

352
Q

Mail server

A

Handles emails between users

353
Q

Network speed

A

File size / time

354
Q

Standalone computer

A

A computer that is not connected to a network

355
Q

Network

A

An arrangement(or group or setup) of two or more computers that are connected together for the purpose of sharing resources and/or data.

356
Q

Internet of Things (IoT)

A

A network of physical objects that use sensors, actuators, embedded systems and wireless technology such as WiFi, Bluetooth and Zigbee, to collect and exchange data, with minimal or no human interaction.

357
Q

VoIP

A

Voice of Internet Protocol

358
Q

LAN

A

Local Area Network

Example:
- School network

359
Q

WAN

A

Wide Area Network

Example:
- Bank network

360
Q

WLAN

A

Wireless Local Area Network

Example:
- Hand held scanners

361
Q

Server

A

A computer connected to a network used to coordinate(store and share) vast amounts of data.

362
Q

Latency

A

The time it takes for a message to transfer (ms). Also known as ping.

363
Q

Internet

A

An interconnected network or network of networks.
Most networks are part of the internet.
Consists of multiple cables or links that connect countries together, and can be though of as the backbone.

364
Q

Packet switching

A

Breaking down a large amount of data into small packets, each packet is independent of one another.
Each packet is tagged (has a header) with the recipient and source IP, checksum and a sequence number for the packets to be put back in order at the destination and checksum

365
Q

Server

A

A computer connected to a network used to coordinate(store and share) vast amounts of data.

366
Q

Network topology

A

A Network Topology is the arrangement with which computer systems or network devices are connected to each other.

367
Q

Bus topology

A

In a bus topology, all nodes in the network are connected directly to a central cable that runs up and down the network.

Advantages:
- Cheap since little cabling needed
- It still works if a node fails
- Easy to add extra devices

Disadvantages:
- If the central cable is damaged the network stops working
- More devices, slower since more collisions
- All nodes can access all traffic can be security risk

368
Q

Ring topology

A

In a ring topology network, each node is connected to two other devices.

369
Q

Star topology

A

In a star topology, all nodes indirectly connect to each other through one or more switches. The switch acts as a central point through which all communications are passed.

Advantages:
- Still works if a node fails
- Damaged cable doesn’t stop the network from working
- Data traffic only sent to intended recipient, secure
- Easy to add extra nodes

Disadvantages:
- If central node fails, network stops working
- Network capacity depends on central node’s capacity
- Many cables, expensive and difficult to set up

370
Q

Mesh topology

A

In a mesh topology, there is no central connection point. Instead, each node is connected to at least one other node.

Advantages:
- Very fault tolerant, if a connection fails, message is re-routed
- Nodes can be added/removed without having take network offline
- Very scalable
- Very high performance, each node is connected to many other nodes

Disadvantages:
- Many cables, difficult and expensive to set up

371
Q

Router

A

Manages communication on the network. Can have a built-in wireless access point (WAP).

372
Q

TCP

A

Transmission Control Protocol
Responsible for delivering data to a given address (packet switching)
Transport layer

373
Q

Modem

A

Modulator/Demodulator

374
Q

HTTP

A

Hyper Text Transfer Protocol
Application layer

375
Q

SMTP

A

Simple Mail Transfer Protocol
Application layer

376
Q

IP

A

Internet protocol
Responsible for obtaining the address to which data is sent.
Internet layer

377
Q

TCP/IP

A

Layered protocol stack (Application layer, Transport layer, Internet layer, Link layer)
Collection of protocols
It sets how data should be formatted and transmitted across networks

378
Q

Web server

A

Holds and shares web pages

379
Q

File server

A

Holds and maintains user files

380
Q

Mail server

A

Handles emails between users

381
Q

Methods to protect networks

A

Access control: Ensures that only authorised users can access the network and its resources
Authentication (User management) : Ensures that users can only access data relevant to them
File permissions: Prevents misuse: deleting/copying data, installing software
Physical security: Prevents damage to hardware
Firewall: Acts as a barrier between an organisation’s internal network and the internet. Inspects incoming and outgoing data traffic and decides what data to allow through

382
Q

Importance of network security

A

Business success: data on the network is vital for running an organisation, it might fail if comprimised
Privacy: data on the network might be sensitive
Financial: the data might be financially valuable

383
Q

Vulnerabilities of the cloud

A

Cloud data centres attract many attacks due to the vast amount of information stored, sensitive data is best stored locally.

384
Q

Ethical hacking

A

Looks for weaknesses in software and systems by trying to penetrate into them so that they can be addressed.

385
Q

Penetration testing

A

Used to test a computer system or network in order to find vulnerabilities

386
Q

Social engineering

A

Exploiting human behavior. The attacker will ‘engineer’ a situation where the target individuals give away confidential information

387
Q

Unpatched software

A

Someone can exploit a vulnerability in an unpatched (unfixed) software that still has that vulnerability

388
Q

Anti-malware software

A

Prevents infection by malware by searching for it and destroying it

389
Q

Encryption

A

Scambles data for anyone who doesn’t have the key to unscramble it.

390
Q

Asymmetric encryption

A

Uses two different keys
Every user has two keys (public and private)
A message encrypted with a public key can only be decrypted with its private key

391
Q

Symmetric encryption

A

Uses one key
Encrypts and decrypts data using the same key
Both ends of the transmission must know the exact shared key

392
Q

Link layer

A

Ethernet
Wi-Fi

393
Q

Internet layer

A

IP

394
Q

Transport layer

A

TCP

395
Q

Application layer

A

FTP
HTTP
HTTPS
SMTP
POP
IMAP

396
Q

POP

A

Post Office Protocol
Used by a client to retrieve emails from a mail server, message deleted on download, it will be stored on the device it was read/downloaded from

397
Q

IMAP

A

Internet Message Access Protocol
Similar to POP but messages can be read and stored on the message server. The message left on the server on read. Hence accesible from any device

398
Q

Package switching verification

A

Checksum for package computed before leaving the computer
Checksum added to the header
At recipient, checksum is re-computed
If don’t match, re-send request is sent back

399
Q

What do computer networks enable? Give at least 2 examples of possible uses. HINT: ANSWER GIVES 5.

A

Computer networks allow computers and devices to share data. This includes:
1. computer-to-computer communication
2. mobile phone networks
3. computers communicating with devices such as printers, mice and keyboards
4. smart televisions
5. tablets and media players downloading videos and music and playing them through external devices such as speakers and digital projectors.

400
Q

What does LAN stand for?

A

Local Area Network

401
Q

When are LANs used?

A

Computers in a site such as an office building use an LAN to connect with each other.

402
Q

What is a LAN?

A

An LAN is a computer network for data transmission within a small geographical area such as a home, office or school or a group of buildings on a site.

403
Q

What does WAN stand for?

A

Wide Area Network

404
Q

When are WANs used?

A

WANs are used for connecting LANs over a large geographical area.

405
Q

What is a WAN?

A

A WAN is a network that connects separate LANs over a large geographical area. This ensures that computers in one location can communicate with computers and users in other locations.

406
Q

True or false: The internet is a huge WAN.

A

True.

407
Q

What are the two network types?

A

Client-server networks and peer-to-peer networks

408
Q

When are peer-to-peer networks used?

A

Peer-to-peer networks are used to connect a small number of devices, for example in a home or office where there are just a few users.

409
Q

Give two advantages of peer-to-peer networks:

A

easier to set up and maintain
cheaper

410
Q

Give two disadvantages of client-server networks:

A

more expensive to set up and maintain as a more powerful computer is required to act as the server and network software is required
specialist knowledge is needed to administer the network

411
Q

In client-server networks, what are the servers?

A

The computers that control access to the network

412
Q

In client-server networks, what are the clients?

A

The computers on which the users work - computers that act as a desktop for the users and which relies on a server for its operations.

413
Q

Explain how a client-server network works.

A

In a client-server network there are two types of computers: the computers that control access to the network (servers) and the computers on which the users work (clients).
From the client machines, the users log into the network servers in order to be able to access programs and peripherals to save data on the servers.
The server is therefore responsible for the security of the network, expecting users to log in with a username and password. As all files are stored on the server the data can be backed up centrally.

414
Q

True or false: In a peer-to-peer network, all computers are equal.

A

True. The computers are simply connected together without any one computer having superiority over the others.

415
Q

Explain how a peer-to-peer network works.

A

In a peer-to-peer network, the computers are simply connected together without any one computer having superiority over the others. All of the computers on a peer-to-peer network are equal.
Through sharing rights granted by the users any computer can share thee programs of another, save data onto their hard disk and use printed connected to them.
Each computer acts as both a client and a server and can communicate directly with all of the others.
Security is distributed and the users of each computer have to be able to grant access rights to its resources and allot passwords.
As data is stored on all f

416
Q

Explain how a peer-to-peer network works.

A

In a peer-to-peer network, the computers are simply connected together without any one computer having superiority over the others. All of the computers on a peer-to-peer network are equal.
Through sharing rights granted by the users any computer can share thee programs of another, save data onto their hard disk and use printed connected to them.
Each computer acts as both a client and a server and can communicate directly with all of the others.
Security is distributed and the users of each computer have to be able to grant access rights to its resources and allot passwords.
As data is stored on all of the computers and is not held centrally, all the users are responsible for backing up procedures.

417
Q

What does a computer need to connect to a network?

A

A computer needs some hardware and also some software that allows it to communicate with the other computers.

418
Q

What are the most commonly used cables to connect devices?

A

Twisted pair cables

419
Q

What are twisted pair cables?

A

Cables in which pairs of copper wires are twisted together and carry electrical signals.

420
Q

What are optical fibre cables made of?

A

Glass

421
Q

What are microwaves in computer science?

A

Electromagnetic waves that can be used to carry data between computers.

422
Q

What are protocols?

A

Agreed rules for requesting and sending data across networks.

423
Q

What is the motherboard?

A

The main printed circuit board of the computer; it has connectors that other circuit boards can be slotted into.

424
Q

What are optical fibre cables?

A

Cables which are made of glass and transmit information encoded in beams of light. They are much faster than twisted pair cables at transmitting data.

425
Q

What does NIC stand for?

A

Network Interface Card

426
Q

What is the NIC (Network Interface Card) also known as?

A

Network adapter

427
Q

What does the NIC/Network adapter do?

A

It is a component that connects a computer to a network. It formats the data sent from the computer into a required format according to the protocols (rules) of the network.

428
Q

Where is the NIC built into?

A

The motherboard

429
Q

True or false: NICs support both wireless and wired connections.

A

True

430
Q

What does MAC stand for?

A

Media Access Control

431
Q

Every NIC is created with a hardware number permanently burned into it. What is this called?

A

The MAC (Media Access Control) address.

432
Q

What is the purpose of a MAC address?

A

Every MAC address is unique so that all data on a network can be sent to the correct component . MAC addresses are 48 bits in length, usually displayed as a 12-digit hexadecimal number.

433
Q

What do network switches allow?

A

Network switches allow individual devices to connect to a network using cables.

434
Q

How do network switches work? HINT: 5 POINTS

A

all of the computers on a network plug into a port on the switch using a cable.
switches read the messages passing through them.
they can read the destination addresses and send them to only the intended computers.
they can do this because they build up a table of MAC addresses on the network to cut down on unnecessary network traffic.
switches can send and receive information at the same time.

435
Q

What is network traffic?

A

The overall network usage caused by all of the data that is being transmitted at a given time.

436
Q

What do computers need an NIC or network adapter for?

A

To connect to a network.

437
Q

What are switches used for?

A

To allow messages to be transmitted between computers in a single network.

438
Q

What are routers used for?

A

To transmit messages between computers on different networks.

439
Q

Give two ways to carry data across a network:

A

cables
radio waves

440
Q

Why are routers similar to switches?

A

Routers and switches both read the address information and forward the messages to the correct network. A switch does this within a single network, but a router does this across several networks.

441
Q

What are routers commonly used for in the home?

A

Routers are commonly used in the home to allow many computers to access one internet connection. The router links the home network to the Internet. The router will transmit the incoming web pages, streamed audio, etc. to the correct computer on the network.

442
Q

What does WAP stand for?

A

Wireless Access Point

443
Q

What do wireless access points allow?

A

Wireless access points allow wireless devices to connect to a wired network.

444
Q

How do wireless access points work?

A

Wireless access points convert data they receive through cables into a wireless signal (and vice versa) to allow wireless devices to connect to a wired network.

445
Q

True or False: Wireless access points can direct messages to particular devices

A

False. Unlike switches, they CANNOT direct messages to particular devices.

446
Q

What is a web server?

A

A computer that can serve world wide web pages to other computers that request them.

447
Q

What is the Ethernet?

A

A set of technical standards for connecting computers.

448
Q

What is frequency?

A

The number of waves per second.

449
Q

What is Wi-Fi?

A

A set of technical standards or protocols for short-range connection of digital devices using radio waves.

450
Q

What is bluetooth?

A

A set of technical standards or protocols for short-range connection of digital devices using radio waves.

451
Q

What is bandwidth?

A

Bandwidth is the amount of data that can pass through a transmission medium per second.

452
Q

What is bandwidth measured in?

A

Bits per second (bps) or megabits per second (Mbps) - bandwidth is a measure of how many bits can get through a particular point in a second.

453
Q

How does a copper wire carry data?

A

Copper wires carry the data as electric currents.

454
Q

How does a fibre optic cable carry data?

A

Fibre optic cables transmit data as pulses of light generated by a LED or laser.

455
Q

What does LED stand for?

A

Light Emitting Diode

456
Q

Name 3 advantages of fibre optic cables over copper wire cables:

A

Far greater bandwidth
Can carry signals much faster
Can travel over greater distances without needing to be boosted

457
Q

True or False: Radio waves are a type of microwave.

A

True.

458
Q

What do microwaves consist of?

A

Electromagnetic radiation travelling in waves with a frequency higher than 1 GHz.

459
Q

Radio waves can transmit data across networks in what range of frequencies?

A

Radio waves are used to transmit data across networks in frequencies of between 2.4 and 5 GHz.

460
Q

What is The Internet?

A

The Internet is a global system of interconnected computer networks which serves billions of users worldwide - this makes it a wide area network.

461
Q

Name 2 services The Internet provides:

A

Email
World Wide Web (www)

462
Q

Who first proposed the World Wide Web?

A

British scientist, Tim Berners-Lee

463
Q

When was the World Wide Web proposed by Tim Berners-Lee?

A

1989

464
Q

When was the first website launched?

A

Time Berners-Lee launched the first website in 1990.

465
Q

What is a host?

A

A host is a computer which can be accessed by users working at remote locations using networks, including the internet.

466
Q

What do web hosting companies do?

A

Web hosting companies rent space on their servers where people can develop their own websites that can be accessed by users all over the world using the World Wide Web.

467
Q

How many host computer systems were there in 1969?

A

4 - today there are 10s of millions.

468
Q

When was The Internet Society established?

A

1992

469
Q

Why was The Internet Society established?

A

It was established to oversee the policies and protocols that define how we use and interact with the Internet.

470
Q

How does a DNS work?

A

A DNS (Domain Name Server) is used to translate the URL to an IP Address. It does this by sending the domain name to the DNS, then, the DNS finds the corresponding IP Address of the domain name sent. This IP address is sent back to the browser. Finally, the browser uses the IP address to access the web page.

471
Q

What is HTTP?

A

HTTP is a set of rules that is used to send data across the internet.

472
Q

What is HTTPS?

A

This is a protocol that ensures a secure connection is made between the devices before engaging in the transfer of data. The data packets are encrypted before they are sent across the internet and decrypted once they reach their destination. HTTPS uses SSL and TLS

473
Q

How does SSL encryption work?

A

The web server sends a copy of its SSL certificate to the web browser
The web browser confirms the legitimacy of the certificate
If legit, the web browser sends a signal back to let the web server know
Connection begins

474
Q

What are some important data security measures?

A

1) never save passwords for quick access
2) never give out credientials
3) use a strong password
4) frequently change password

475
Q

What are the four different folder access levels?

A

1) Read
2) Write
3) Execute
4) None

476
Q

What can a user do when he has the “read” folder access level?

A

Can access files or directories, user can only read and not make any changes

477
Q

What can a user do when he has the “write” folder access level?

A

Ability to also modify the file

478
Q

What can a user do when he has the “execute” folder access level?

A

Ability to execute a file. (executable programs need this permission to allow the OS to run them)

479
Q

What can a user do when he has the “none” folder access level?

A

Total access for all users

480
Q

What do humans access information through?

A

Domain names

481
Q

What do all web browsers interact through?

A

Internet Protocol addresses (IP)

482
Q

What does the domain name system do?

A

Translates domain names to IP addresses so browers can load internet resources

483
Q

What does each device that is connected to the internet have?

A

A unique IP address

484
Q

The URL/website is input by the user, and the website is outputted as an _____ address

A

IP(v4)

485
Q

What are network speeds measured in?

A

mbps

486
Q

How many ways are there to set up a LAN?

A

three! (bus, star and ring)

487
Q

What stops signals from reflecting back down the bus?

A

A terminator at the end of a cable

488
Q

What is specific about a ring network?

A

Each device is connected in a ring

so each is connected to two other devices

489
Q

How does a ring network work?

A

Each data packet on the network travels in one direction. Each device receives each packet in turn until the destination receives it.

490
Q

What is specific about a star network?

A

Each device on the network has its own cable which directly connects to a swtich or hub.

491
Q

Which method is the most popular for setting up your LAN?

A

Star network

492
Q

What do computers need to make a wireless connection?

A

a wireless NIC

493
Q

What does a wireless router do?

A

A wireless router is connected to a physical network (ethernet) and uses radio signals

494
Q

What does a wireless adapter (in a wireless router) do?

A

Converts data into a radio signal and also decodes it so that the computer can understand it

495
Q

What does Firewall do?

A

It examines the traffic coming in and out of the network
And ensures the traffic meets a certain criteria
If traffic does not meet the criteria, it will block the traffic and warns the user of a possible security issue
Firewall also can add undesirable IP addresses onto a blacklist so it cannot be accessed

496
Q

What does Proxy server do?

A

A proxy acts as an intermediary between the user’s computer and a web server so it prevents direct access to the webserver. It filters traffic and will block requests to certain websites if needed. It can prevent hacking and DDOS of the web server.

497
Q

What is HTML?

A

Hypertext Markup Language, a standardized system for tagging text files to achieve font, colour, graphic, and hyperlink effects on World Wide Web pages.

498
Q

How old is HTML?

A

It was first developed by Tim Berners-Lee in 1990

499
Q

What does an .html file need to contain, in order to be valid?

A

It needs to contain and

500
Q

Name 5 different html elements:

A

Image, heading, table, link

501
Q

What does <a> do?</a>

A

Anchor - used in to make a hyperlink

502
Q

What attribute does <a> need to have?</a>

A

<a> needs to have a link associated with it</a>

503
Q

What elements can a contain?

A

It allows authors to arrange data – text, preformatted text, images, links, forms, form fields, other tables, etc. – into rows and columns of cells.

504
Q

How do you tell an image how wide and high it should be?

A

Using width=’’ ” and height=’’ ”

505
Q

How can you give an element a class?

A

Eg. img src=”example.png” width=”400” height=”400” class=”onetwothree”

506
Q

What is CSS?

A

Cascading Style Sheets is a style sheet language used for describing the presentation of a document written in a markup language like HTML.

507
Q

How do you include a .css file inside your .html file?

A

In the same folder as the .html file, put the style.css file, and in the .html file, say:

508
Q

How can you tell an element to have a color for it’s background?

A

In style.css,

.example{
background-color: rgb(200,300,200);
}

509
Q

How do you select an element based on it’s class?

A

Put “.” + “name of class”

510
Q

What would the css selectors for all images look like?

A

.img{
//something
}

511
Q

What would the css selectors for anchors with a class of “special” look like?

A

.special{
//something
}

512
Q

What would the css selectors for all anchors inside paragraphs that have a class of ‘special’ look like?

A

p::special{
//something
}

513
Q

What would the css selectors for all button with a class of ‘special’, while you’re hovering over them look like?

A

b::special::hover{
//something
}

514
Q

How would you center an element vertically and horizontally?

A

Use margin:auto