5. The internet and its uses Flashcards
(36 cards)
What’s the difference between the internet and the worldwide web?
- The Internet is a global infrastructure of interconnected networks.
- The World Wide Web is all the web pages that are accessible via the Internet.
What’s the difference between HTTP/HTTPS?
HTTP:
- the standard protocol used to communicate across the web.
- Any data you enter into the site whether it be your name, address, bank details, etc. It is sent in plaintext and is susceptible to hacking
HTTPS:
- Secured protocol
- Any data that is transmitted between the website and your browser is encrypted.
- Data is not understandable to anyone intercepting it.
- The server that you are connecting to is authenticated to ensure the site is genuine.
What are the functions of the browser?
- Storing cookies
- Recording user history
- Storing bookmarks and favorites
- Allowing the use of multiple tabs
- Providing an address bar
- Providing navigation tools
What is the function of HTML(Hypertext Markup language)?
- To render the Hypertext Markup Language (HTML) used to code a web page
- To display the resulting web page as the user should see it.
What is the role of DNS(Domain name server)?
- To convert a website address (URL) into an IP address so that a browser on a client machine can make a request to the correct web server hosting that web page.
- If the DNS server does not have an entry for the domain name, it passes the request to another more authoritative DNS server.
- An error is sent back if no match is found.
What are cookies?
- Cookies are small files or code stored on a user’s computer
- they can track data about a user, such as IP addresses and browsing activity.
What’s the difference between session and persistent cookies?
Session cookies:
- Stored temporarily on a user’s computer
- Once the browser’s closed, the website session ends and the cookie is deleted.
Persistent cookies:
- Remember’s user’s log-in details
- Cookies are stored on user’s hard drive until expiry date’s reached or user deletes them
- Remains in operation even after browser is closed
What are the advantages of accepting cookies?
- Remembers login details
- Websites will remember personal customizations
What is digital currency?
- A digital currency is any money-like asset that only exists in digital form and is exchanged digitally, with no physical banknotes or coins in circulation.
Explain why digital currencies are growing in popularity? (3)
- Reduces any related transfer fees
- speeds up the time a transaction can take to complete
- This improves security and anonymity.
What are forms of attack and defense?
- HACKING - gaining unauthorized access to data (use firewalls to block access by unauthorized devices)
- MALWARE: PHARMING - The user types in a legitimate address and is redirected to a fake website (Check URL - HTTPS, not HTTP. Using a trusted Internet Service Provider (ISP)
- MALWARE: SPYWARE - Software secretly recording your activities to send back to a third party for analysis(Use Anti-malware software/Anti-spyware software)
What is a virus?
- A program that is installed on a user’s computer without their knowledge/permission to harm.
- It also includes instructions to replicate automatically on a computer and to other computers.
What is a worm?
- It is a program that corrupts files and steals info but doesn’t self-replicate
What is a Trojan horse?
- A program that masquerades as having one legitimate purpose but has another.
- Normally, spread by email.
- The user is invited to click on the link for some everyday or interesting purpose, which then executes a program that may give the controller unauthorized access to your computer.
What is ransomware?
- A form of malware that encrypts a victim’s files.
- A ransom is then demanded from the attacker in return for instructions on how to decrypt the files.
What is Adware?
- Malware that automatically displays onscreen advertisement which may lead to the user clicking and redirecting the browser to a dangerous/unsafe site that may contain spyware.
What is Spyware?
- A malware that enables the remote user to gather activities, passwords, and payment info from another user’s computer.
What is the purpose of a distributed denial of service(DDOS) attack?
- The process of a DDOS attack involves using a network of infected computers, known as a botnet, to flood the target server or network with traffic.
- A DDOS attack aims to disrupt the availability of a service, such as a website, making it inaccessible to legitimate users.
How do biometrics keep data safe and what are the methods included?
- Biometrics use pre-recorded human characteristics to authenticate authorized users of a system or device.
- Methods include: Face recognition, Iris and Retina scanners, Fingerprint or palm recognition, and voice recognition
Explain the process of ‘two-step verification’.
- Two-step verification involves two authentication methods performed one after the other (to prove someone’s identity)
- For example, a 4-digit code may be sent in an email or text message to your phone, which you have to type in to complete a login process
What is the purpose of passwords?
- Passwords are effective at preventing access to systems.
- Passwords should be secure and changed regularly
What is the purpose of Automatic software updates?
- Will keep applications and the operating system constantly up-to-date.
- Enables bugs and security flaws in the software to be fixed, as soon as they are known about it, with a patch.
What is the purpose of privacy settings?
- Privacy settings allow a person to control what information about them is shared on a social media platform.
- A user can control who has access to what they post, and who can see their full profile.
What’s a proxy server?
A proxy server is any machine that checks and forwards traffic between networks or protocols.