5.1 and 5.3 Internet + Cyber security Flashcards
(37 cards)
Describe the internet (2)
huge public network of computer systems
It is the physical infastructure
Describe the World Wide web (WWW)
The world wide web is the collection of websites
and web pages accessed using the internet
https://www.britannica.com /science/ computer-science
Identify the protocol, domain name, file path, and the webpage/file name (4)
protocol - https
domain name - www.britannica.com
file path - science
webpage/file name - computer-science
How does HTTP work
uses request codes to send and receive data and perform other various tasks.
Purpose of HTTPS
secure method of sending data via the world wide web
How does HTTPS work?
operates by using encryption to obscure data, using a method called TLS
TLS uses a method called asymmetric public key infrastructure and uses public key and private key to encrypt data
Define web browser
software that allows users to access documents and other resources on the internet
Function of web browsers (6)
Storing bookmarks and favourites
Recording user history
Allowing use of multiple tabs
Storing cookies
Providing navigation tools
Providing an address bar
What does DNS stand for
Domain Name Server
Purpose of DNS servern (2)
keeps a record of all of the domains in existence, and maps each of these domains to an IP address
acts as a lookup table for domain names, and replies to the request with an IP address.
Define web server
A computer connected to the internet that stores and shares many files.
How web server work? (3)
Once web browser obtains IP address, it sends request to web server to send the resources
The web server allows or disallows request depending on the nature of request
If allow, web server returns raw HTML to web browser.
Define cookies
A small piece of data stored by the web browser.
What are the two types of cookies (2)
persistent cookies
session cookies
What is persistent cookie
A cookie that is stored long-term on the computer system.
Retained until it expires
What is session cookie
A cookie that is deleted after closing the browser, exists in memory.
In what situations might a cookie be used
saving personal details
tracking user preferences
holding items in an online shopping cart
storing login details
8 examples of cyber threats
Brute force attacks
Data interception
Distributed denial service (DDoS) attacks
Hacking
Malware (virus, worm, trojan horse, spyware, adware, ransomware, pharming)
Phishing
Social engineering
Explain brute force attacks (2)
Finding the password of a user by systemically trying all different combinations
Can be manual or automated
Explain data interception (3)
form of stealing data by tapping into a wired or wireless connection
hacker may use technique known as “network sniffing” to pick out unecrypted messages
intercepted data is sent back to the hacker
Explain hacking
general term for gaining access to a computer system without authorisation
can be automated or manual
Distributed Denial of service attack (DDos) (2)
flooding a server or other target with useless traffic from multiple machines operating together, causing it to become overloaded and unavailable
often makes use of botnet (group of hi-jacked, internet connected devices) to carry out large scale attacks
Explan social engineering (2)
Art of manipulating people so they give up confidential information
common types of social engineering include “phone calls”, “baiting”, “Scareware (eg: fake anti-virus that looks real)”
Explain phishing (2)
online fraud technique designed to trick a user into giving away personal info
perpetrators disguise themselves by imitating an institution via email