5.1 and 5.3 Internet + Cyber security Flashcards

(37 cards)

1
Q

Describe the internet (2)

A

huge public network of computer systems

It is the physical infastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the World Wide web (WWW)

A

The world wide web is the collection of websites
and web pages accessed using the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

https://www.britannica.com /science/ computer-science

Identify the protocol, domain name, file path, and the webpage/file name (4)

A

protocol - https

domain name - www.britannica.com

file path - science

webpage/file name - computer-science

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does HTTP work

A

uses request codes to send and receive data and perform other various tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Purpose of HTTPS

A

secure method of sending data via the world wide web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does HTTPS work?

A

operates by using encryption to obscure data, using a method called TLS

TLS uses a method called asymmetric public key infrastructure and uses public key and private key to encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define web browser

A

software that allows users to access documents and other resources on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Function of web browsers (6)

A

Storing bookmarks and favourites

Recording user history

Allowing use of multiple tabs

Storing cookies

Providing navigation tools

Providing an address bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does DNS stand for

A

Domain Name Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Purpose of DNS servern (2)

A

keeps a record of all of the domains in existence, and maps each of these domains to an IP address

acts as a lookup table for domain names, and replies to the request with an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define web server

A

A computer connected to the internet that stores and shares many files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How web server work? (3)

A

Once web browser obtains IP address, it sends request to web server to send the resources

The web server allows or disallows request depending on the nature of request

If allow, web server returns raw HTML to web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define cookies

A

A small piece of data stored by the web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two types of cookies (2)

A

persistent cookies

session cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is persistent cookie

A

A cookie that is stored long-term on the computer system.

Retained until it expires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is session cookie

A

A cookie that is deleted after closing the browser, exists in memory.

17
Q

In what situations might a cookie be used

A

saving personal details

tracking user preferences

holding items in an online shopping cart

storing login details

18
Q

8 examples of cyber threats

A

Brute force attacks

Data interception

Distributed denial service (DDoS) attacks

Hacking

Malware (virus, worm, trojan horse, spyware, adware, ransomware, pharming)

Phishing

Social engineering

19
Q

Explain brute force attacks (2)

A

Finding the password of a user by systemically trying all different combinations

Can be manual or automated

20
Q

Explain data interception (3)

A

form of stealing data by tapping into a wired or wireless connection

hacker may use technique known as “network sniffing” to pick out unecrypted messages

intercepted data is sent back to the hacker

21
Q

Explain hacking

A

general term for gaining access to a computer system without authorisation

can be automated or manual

22
Q

Distributed Denial of service attack (DDos) (2)

A

flooding a server or other target with useless traffic from multiple machines operating together, causing it to become overloaded and unavailable

often makes use of botnet (group of hi-jacked, internet connected devices) to carry out large scale attacks

23
Q

Explan social engineering (2)

A

Art of manipulating people so they give up confidential information

common types of social engineering include “phone calls”, “baiting”, “Scareware (eg: fake anti-virus that looks real)”

24
Q

Explain phishing (2)

A

online fraud technique designed to trick a user into giving away personal info

perpetrators disguise themselves by imitating an institution via email

25
Explain pharming (3)
form of attack that redirects a user to a fake website designed to look identical to the real thing even when the user types in the genuine URL malicious code is installed on user's computer and so the web server redirects them to fake website unlike phishing, user doesn't need to take any actions for the redirect to be initiated
26
Name + explain the 6 types of malware (6)
Viruses - programs that can replicate themselves, intending to delete or corrupt files trojan horse - a program that appears harmless, but is in fact malicious, typically user is invited to clink on link and download a program that seems genuine, then attack gains access to user's knowledge worm - can spread and replicate itself without human interaction, can spread easily with lack of knowledge or awareness ransomeware - encrypts victims files, attacker demands ransom from victim to restore access to the data, after ransom, users given decryption key Spyware - obtains info about user's computer by transmitting data from the victim's hardrive (eg: passwords) Adware - malware that automatically displays adverts to the user
27
Define HTML
The language used to design, display, and format webpages
28
What does an HTML consist of (2)
HTML presentation HTML structure
29
What is HTML structure
Part of the HTML document which is responsible for layout of the document
30
What is HTML presentation
Part of the HTML document which is responsible for the content and style of the document
31
What are the purposes of a web browser (2)
render hypertext markup language (HTML) display webpages
32
Define HTTP
protocol that is used to transfer across the internet
33
Define Uniform Resource Locator (URL)
text - based address used in the web browser to request a resource from the WWW
34
examples of HTML structure (4)
placement of text/image margins line break padding
35
examples of html presentation (5)tml
font colour font size font style background colour image size
36
Reasons for seperating HTML presentation and structure (3)
Can easily change the style of webpage Can add new content and add same style easily can re-use presentation for other websites
37