Internet and the World Wide Wed (Section 5.1, 180-186) Flashcards

1
Q

World Wide Web (WWW)

A

A worldwide collection of interconnected networks; the internet makes use of TCP and IP protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internet

A

the world-wide interconnection of networks; the internet makes use of TCP and IP protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(web) browser

A

software that connects to a domain name server (DNS) to locate IP addresses; a browser interprets HTML web pages sent to a user’s computer so that the user can read documents and watch multimedia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hypertext mark-up language (HTML)

A

the language used to design, display and format web pages, and to write http(s) protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Uniform Resource Locator (URL)

A

a text-based address for a web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hypertext transfer protocol secure (https)

A

http with a web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hyperlink

A

highlighted text or an image that is activated by clicking and links to further text, images, a web page or a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Domain Name Server (DNS)

A

a server that looks up domain names for websites (for example, www.hodereducation.com) in order ti find IP addresses that a computer needs to locate the web servers (for example, 107.162.140.19)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

cookie

A

a text file sent from a website to a user’s browser; it is used to remember user preferences each time they visit the website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

user preferences

A

settings or options stored in cookies that can remember customized wen page or indicate browsing history to target adverts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

session cookie

A

a cookie that is stored temporarily on a computer; is deleted when the browser is closed or the website session ends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

persistent cookie

A

a cookie that is stored on the user’s hard drive and only deleted when the expiry date is reached or the cookie is deleted by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

virtual shopping basket

A

an area of memory in a website where items a user wishes to purchase are temporarily stored; items remain in the basket until payment is made or the session has ended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

digital currency

A

currency (a system of money) that exists in electronic form only; it has no physical form and is essentially data on a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

cryptocurrency

A

a form of digital currency that uses a chain of decentralised computers to control and monitor transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

cryptography

A

the protection of data/information by use of coding; it usually involves encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

blockchain

A

a decentralised database where all transactions are stored; it consists of a number of interconnected computers but not a central server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

timestamp

A

a digital record of the date and time that a data block is created in blockchain networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

proof-of work

A

the algorithm used in blockchain networks to confirm a transaction and to produce new blocks to add to the chain; social users called miners complete and monitor transactions on the network for a reward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

brute force attack

A

a ‘trial and error’ method used by cybercriminals to crack passwords by finding all possible combinations of letters, numbers, and symbols until the password is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

word list

A

a text file containing a collection of words used in a brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

data interception

A

an attempt to eavesdrop on a wired or wireless transmission; cybercriminal often use packet sniffing or access mapping / wardriving to intercept data

23
Q

packet sniffing

A

a method used by a cybercriminal to examine data packets being sent over a network and to find the contents of a data packet, which are sent back to the cybercriminal

24
Q

wardriving

A

using a laptop, antenna, GPS device and software to intercept Wi-Fi signals and illegally obtain data; sometimes called Access Point Mapping

25
Q

wired equivalency privacy (WEP) encryption protocol security

A

an algorithm for wireless networks to protect them against data interception

26
Q

denial of service (DoS) attack

A

a cyberattack in which cybercriminals seek to disrupt the normal operation of a website by flooding it with requests; also used to clog up a user’s mailbox by sending out thousands of spam emails

27
Q

distributed denial of service (DDoS) attack

A

a denial of service(Dos) attack in which that fake requests come from many different computers, which makes in harder to stop

28
Q

spam

A

unsolicited emailed sent to a user’s mailbox

29
Q

hacking

A

the act of gaining illegal access to a computer system without owner’s permission

30
Q

malware

A

programs (such as viruses, worms, and Trojan horses) installed on a user’s computer with the aim of deleting, corrupting or manipulating data illegally

31
Q

virus

A

a program or program code that replicates itself with intention of deleting or corrupting files or by causing the computer system to malfunction

32
Q

active host

A

functioning software that a virus can affect by attaching itself to the code or by altering the code to allow the virus to carry out its attack

33
Q

worm

A

a stand-alone type of malware that can self-replicate; unlike viruses, worms don’t need an active host; they can spread throughout a network without the need for any action by the end-user

34
Q

Trojan horse

A

a type of malware that is designed to look like legitimate software but contains malicious code that can cause damage to a computer system

35
Q

spyware

A

a type of malware that gathers information by monitoring a user’s activities on a computer and sends the gathered information back to the cybercriminal who sent out the spyware

36
Q

adware

A

a type of malware that attempts to flood the end-users with unwanted advertising

37
Q

ransomware

A

a type of malware that encrypts data on a user’s computer and ‘holds the data hostage’ until a ramsom is paid

38
Q

phishing

A

sending out legitimate-looking emails designed to trick recipients into giving their personal details to the sender of the email

39
Q

spear phishing

A

similar to phishing but targeting specific people or organisations rather than carrying out a blanket attack

40
Q

pharming

A

redirecting a user to a fake website in order to illegally obtain personal data about the user without their knowledge; unlike phishing, pharming is initiated without needing any action by the user

41
Q

DNS cache pharming

A

altering IP addresses on a domain name server(DNS) with the intention of redirecting a user’s browser to a fake website; carried out by a pharmer (see pharming) or hacker (see hacking)

42
Q

social engineering

A

manipulating people into breaking normal security procedures (such as giving away their password) in order to gain illegal access to computer systems or to place malware on their computer

43
Q

access levels

A

different levels of access in a computer system allowing a hierarchy of access levels depending on user’s level of security

44
Q

anti-spyware

A

software that detects and removes spyware programs installed on a system; the software is based on typical software rules o known file structures

45
Q

authentication

A

the process of proving a user’s identity by using something they know, something they have or something unique to them

46
Q

biometrics

A

type of authentication that uses a unique human characteristic, such as fingerprints, voice or retina blood vessel pattern

47
Q

two-step-verification

A

a type of authentication that requires two methods of verification to prove the identity of a user

48
Q

patch

A

an update for software that is developed to improve the software and/or to remove any bugs

49
Q

typo squatting

A

the use by cybercriminals of subtle spelling errors in website addresses used to trick users into visiting their fake websites

50
Q

firewall

A

software or hardware that sits between a computer and an external network (for example, the internet); the firewall monitors and filters all incoming and outgoing traffic

51
Q

proxy server

A

a server that acts as an intermediary server through which internet requests are processed; it often makes use of cache memory to speed up web page access

52
Q

privacy settings

A

controls available on social networking and other websites which allow users to limit who can access their profile or what they are allowed to see

53
Q

secure sockets layer (SSL)

A

a security protocol used when sending data over a network (such as internet)

54
Q

SSL certificate

A

a form of digital certificate which is used to authenticate website; providing the SSL certificate can be authenticated, any communication or data exchange between browser and website is secure