T5: The internet and its uses Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Internet?

A

A global infrastructure of interconnected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the World Wide Web?

A

a collection of websites and web pages accessed using the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a URL and what does it stand for?

what does it contain

A

Uniform Resource Locator
Each web page has its own unique text-based address

contains protocol, domain name, web page/file name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purple part of this URL called?

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the red part of this URL called?

A

Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the blue part of this URL called?

A

Domain Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the green part of this URL called?

A

Web page / file name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a protocol?

A

A set of rules for communication between devices. It allows equipment from different suppliers to work together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does HTTP stand for?

A

HyperText Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is HTTP?

A

The standard transmission protocol of the Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the problem with HTTP?

A

Any data you enter into the site is sent in plaintext and is susceptible to hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does HTTPS stand for?

A

HyperText Transfer Protocol Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is HTTPS?

A

A secure protocol that encrypts any data sent between the website and your browser so that it can’t be understood if intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the functions of a browser?

4 of the usual ones

A

RENDERS HTML AND DISPLAYS WEB PAGES
Storing bookmarks and favourites
Recording user history
Storing cookies
Providing navigation tools
Allowing use of multiple tabs
Providing an address bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does HTML stand for and what is it?

A

Hypertext Markup Language

The standard markup language for creating/displaying web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an IP address?

A

A public address that is unique to each device. Every networked computer and websites hosted in a webserver has an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does a Domain Name Server (DNS) do?

A

It converts a URL address into an IP address

This means that a browser on a client machine can make a request to the correct web server hosting that web page

a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What happens if the DNS server doesn’t have an entry for the domain name?

A

It passes the request to another more authoritative DNS server to see if that one has an entry. An error is sent back if no match is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are cookies?

A

small files or code stored on a user’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What do cookies do?

A

They are used to track data about the users and autofill forms or give suggestions accordingly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are session cookies?

2 points with 1 example

A

They are created and replaced each time a user visits a website. Stored in the RAM.

a virtual shopping basket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are persistent cookies?

with 1 example

A

They are created and saved on the first visit (on hard disk) and retained on the hard drive of the computer until they expire

user’s login details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What advantages come from using cookies for a retailer on an online shopping site?

A

The retailer can send personalised email advertisements to customers

The retailer can analyse quantity and value of sales/advertising

The retailer can implement one-click purchasing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the advantages for the user when visiting an online shopping site that uses cookies?

A

They will not need to remember login details

They can use one-click purchasing

Websites will remember their personal customisations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is digital currency?

+ examples

A

Any money-like asset that only exists in digital form. It is exchanged digitally with no physical banknotes or coins in circulation

paypal, cryptocurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a blockchain?

A

A digital ledger –> a time-stamped series of transaction records that cannot be altered, tracking the movement of a digital currency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How does blockchain work?

A
  • Each new transaction is added onto a chain of transaction blocks
  • Each block will carry the user’s ID number and a reference to the previous block. This is known as a hash total and is calculated with a hashing algorithm
  • A change of data in one block will create a ripple effect of incorrect hash totals
  • The blockchain will be stored on multiple different servers, and if one chain doesn’t match all others, it will be rejected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what is the process of locating web pages?

A
  1. user opens browser and types in a URL and the browser asks DNS server (1) for the IP address of the website
  2. if DNS server cant find the URL in its database or cache, it sends a request to DNS server (2)
  3. DNS server (2) finds the URL and maps it to an IP address, which is sent back to DNS server (1), which saves it in its cache/databse
  4. IP address is sent back tothe user’s computer
  5. computer sets up a communication with the website server and the required pages are downloaded, HTML files are sent to the computer to be interpreted and displayed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what is a website server

A

a computer that stores the website’s software and a website’s component files (for example, HTML documents, images, CSS stylesheets, and JavaScript files)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

how are digital currencies used?

A

by relying on a central banking system, online banks or smartphone apps (paypal, apple pay etc.)

bank X and bank Y are different online banks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

what is the differnece between www and internet

4 each

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what is the order of URL setup

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
A
35
Q

What is hacking?

A

Automated or manual attempts to gain unauthorised access to programs or data

36
Q

How to protect against hacking?

A

Firewall to block access by unauthorised devices

37
Q

What is a brute force attack?

A

Automated or manual attempts to gain unauthorised access to secure areas by trying all possible password/key combinations

38
Q

How to protect against brute force attacks?

A

Strong passwords
Limited attempts allowed

39
Q

What is data interception?

A

a form of stealing data by tapping into a wired or wireless communication link to compromise privacy or to obtain confidential information
- carried out using wardriving (per wifi) or packet sniffing (per network data packet) where data that was intercepted is sent back to the hacker

40
Q

How to protect against data interception?

A

Encryption (wired equivalency privacy WEP encription protocol)
- doesn’t stop hacker from getting it but cannot comprehens without decryption key
Firewall
don’t use public wifi

41
Q

What is spyware?

A

Software that hides on your computer and records your activities to send back to a third-party for analysis

42
Q

How to protect against spyware?

A

Anti-malware
Anti-spyware software for detection

43
Q

What is phishing?

A

Phishing emails redirect a user to a fake website where they trick the reader into divulging confidential information such as passwords that can be used fraudulently

44
Q

How to protect against phishing?

A
  • fake email identification: odd addressing, grammar/spelling mistakes
  • anti-phishing toolbar
  • look for s in https OR green padlock symbol
  • changing password regularly
  • up to date browser and firewall
45
Q

What is pharming?

A

Sends the user to a fake website that looks like the real thing. The user types in a legitimate address and is redirected to a fake website

DNS cache poisoning: IP address and URL are not correctly matched up and you get redirected to a fake website

46
Q

How to protect against pharming?

A

Checking the URL
Making sure the site says HTTPS, not HTTP
Spelling of website

47
Q

What is malware?

A

Malicious software written to cause inconvenience or damage to programs or data

48
Q

What is a virus?

A

A program that is installed on a computer without the user’s knowledge or permission with the intent of doing harm.

It includes instructions to replicate automatically on a computer with intention of deleting/corrupting files

49
Q

What is a worm?

A

a type of stand-alone malware that can self-replicate with the intention to spread to other computers and corrupt whole networks
unlike viruses, they don’t need an active host program to be opened to do damage

50
Q

What does anti-virus software do?

A

Software that runs on a computer checking all files for known viruses
It must be updated regularly

51
Q

What is a Trojan horse?

A

A program that masquerades as having one legitimate purpose, but it actually has another

52
Q

How does a Trojan horse work?

A

requires users to take action and security systems are often useless since users can overrule them and initiate the running of the malware

A link is spread by email/downloaded from ilegitimate software

The user is invited to click on a link for an everyday purpose

This link then executes a program which gives the controller unauthorised access to the computer

53
Q

What is ransomware?

A

A form of malware that encrypts a victim’s files.

54
Q

How does ransomware work?

A

A ransom is demanded from the attacker in return for instructions on how to decrypt the files

55
Q

What is adware?

A

A malware that displays onscreen advertisements. It is not always dangerous, but could redirect the browser to an unsafe site

56
Q

What does DDoS stand for?

A

Distributed Denial of Service

57
Q

What is a DDoS attack?

A

A malicious attempt to disrupt the normal traffic of a targeted server with a flood of Internet requests

58
Q

How does a DDoS attack work?

A

Multiple interconnected devices in different locations establish a botnet (bots could be on different computers that planted themselves and can be controlled by the attacker)

The attacker is then able to direct the attack by sending remote instructions to the bots to send requests to the target’s IP address

The server becomes overwhelmed, and genuine requests cannot be handled

The server fails or times out

59
Q

How can you protect against DDoS attacks?

signs of users becoming victims of a DDoS attack

A

A firewall can filter through requests to separate the genuine and fradulent requests
up to date malware checking
apply email filters
- slow network performacne
- inability to access websites
- large amounts of spam email

60
Q

what is social engineering

A

occurs when a cybercriminal creates a social situation that can lead to victims dropping their guard

61
Q

5 examples of social engineering

A
  • instant messaging (links embedded)
  • scareware (scaring user that they have been infected)
  • emails/phishing scams (seems genuine but links embedded)
  • baiting (malware infected memory stick)
  • phone calls (scam callers making user give them their information)
62
Q

what is exploited in social engineering attacks

A

fear
curiosity
empathy and trust

63
Q

cycle of cybercriminals targeting victims

A
64
Q

what are access levels

A

a hirachy of level of access to certain data, requiring different passwords for another layer

65
Q

types of anti-malware

A

anti virus
anti-spyware

66
Q

how does anti-spyware work and what does it do

A
  • detects and removes spyware programs isntalled illegaly on a user’s computer system
  • software has a set of rules and looks at file structures to identify
67
Q

general ability of anti-virus/anti-spyware/personal firewall

A
  • detect and remove spyware already on the device
  • prevent users from downloading spyware
  • encrypt files to make the more secure
  • blocks access to a user’s webcam/mic
68
Q

what is authentication

A

ability of a user to prove who they are through something you know, something you have or something unique to you

69
Q

ways authentication can be done

A
  1. passwords and user names
  2. biometrics
70
Q

types of biometrics

A
  • fingerprint scans
  • retina scans
  • face recognition
  • voice recognition
71
Q

how does biometric work

possible disadvantages

A

pattern on finger or retina or face is scanned and compared to the one stored in the database
can be expensive and if someone is injured, this doesn’t work but it’s hard to replicate and cannot be misplaced

72
Q

passwords and user names

how can they be protected?

A

Passwords are used to restrict access to data or systems.
They can be protected with:
- anti-spyware software
- changing passwords regularly
- hard passwords

73
Q

what is two-step verification

A

requires two methods of authentication to verify who a user is

74
Q

automatic software updates

A

software on computers and mobile phones/ tablets is kept up-to-date because they may contain patches that update the software security

75
Q

what to check for in cyber fraud

A

spelling and tone of communication
- spelling and gramamr in emails/websites
- a too rushed tone is could be a phishing email
URL links
- spelling in emails or links

76
Q

what to check for in an email

A
  • after the @ should be company name
  • bad spelling/grammar
  • rushing
  • mispelling of domain name in the link
77
Q

firewalls

A

can be either software or hardware. It sits between the user’s computer and an external network (for example, the internet) and filters information in and out of the computer

78
Q

what can and cannot firewalls do

A
  • examine the traffic between user and public network
  • checks and logs incoming/outgoing data
  • firewall can be disabled
  • misconduct by users cannot be controlled
  • vulnerable to attacks from internal network
79
Q

what are proxy servers

A

they act as an intermediate between the user and a web server

80
Q

features of proxy servers

A
  • allows internet traffic to be filtered
  • keeps IP addesses secret (security)
  • prevents direct access to a web server by sitting between the user and the web server
  • proxy servers can act as firewalls
  • cache can help speed up access to info from a website if it was visited before
81
Q

what can privacy settings do

A

can limit the access on websites and a user’s personal profile
- ‘do not track’ stops website from collecting data from user
- payment methods saved
- alterting when browser encounters a dangerous website
- web browser privacy options
- sharing location for apps off

82
Q

what is secure sockets layer (SSL)

A

a type of protocol that allos data to be sent and received securely over the internet

83
Q

what can SSL do

how do you know it’s being used

A

it encrypts data when user is on a website and only the computer and web server is able to decrypt the transmission

small padlock (httpS)

84
Q

anti-virus

A
  • checks for virus attacks
  • heuristic checking is when sodtware is checked for tupes of behaviour that may indicate a virus
  • possibly infected files/programs are quarantined and the virus is deleted or users can choose not to)
  • entire system is checked for viruses once a week