(new) C5 - The internet and its uses

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/81

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:10 AM on 8/19/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

82 Terms

1
New cards

What is the Internet?

A very large global network to allow users to access the World Wide Web

2
New cards

What type of network is the Internet?

Wide area network

3
New cards

Who made the World Wide Web and why?

Tim Berners-Lee as he would need to access different computers for different information so he shared information using hypertext

4
New cards

What is the World Wide Web?

Collection of webpages and websites

5
New cards

What is Uniform Resource Locator (URL)?

Text-based address for a website

6
New cards

What does web browser?

Software that retrieves and displays web pages

7
New cards

How does a user accesses a webpage?

The user types the URL into the web browser

8
New cards

What are the components of a URL?

Protocol, domain name, webpage file name

9
New cards

How is a web page requested and retrieved by a computer?

  • The user opens the web browser an types the URL into the address bar

  • The web browser sends the URL to the domain name server (DNS)

  • The DNS stores the IP address to the domain name

  • If the IP address was not found in the DNS, it sends the domain name to the second DNS

  • This happens till the domain name is found

  • If it is not found a message is sent back to the web browser saying that the website is not found

  • The web browser receives the IP address

  • The web browser sends a request to the web server

  • When the web server receives a request to the web page, its sends the data for the website HTML, CSS and javascript to the web browser using HTTP

  • The web browser renders HTML and CSS and runs the javascript

10
New cards

What does HTTPS do?

Add an extra layer of security that encrypt data that is transferred by using a digital certificate

11
New cards

What is a digital certificate?

A certificate awarded to a website if they can prove they are a real organisation

12
New cards

What is the certificate authority?

Awarding organisation that checks if another organisation is real and secured before giving additional certificate

13
New cards

How is a layer of security added?

Before web browser send a request to Web servers for the webpage it sends a request to the web server for digital certificate

Server send a copy of Of the digital certificate to browser

Web browser check if the certificate is authentic

If the certificate is authentic web browser allows communication to continue with WebServer and data transmitted is encrypted

If certificate is not authentic, the web browser will report that the website is not secure

14
New cards

What does HTTPS protocol use?

Secure socket layer or transport layer security

15
New cards

What is the main purpose of a web browser?

A software application allowing you to access information available on the worldwide web

16
New cards

What does render mean?

Processing webpage data like HTML to display a webpage

17
New cards

What is a cookie?

Small text file that is used to your personal data by a web browser

18
New cards

What are examples of what cookie store?

String usernames and passwords for accounts

String bank card details for buying products online

Storing products in a virtual shopping cart

Help formatting websites

Track content you are looking at in the worldwide web for advertisement

19
New cards

what are the two types of cookies?

Session and persistent cookies

20
New cards

What are session cookies?

Deleted when the browser is closed

21
New cards

What are persistent cookies?

Cookie stored by web browser until deleted by user or expired

22
New cards

Where are persistent cookies stored in?

Hard drives

23
New cards

What are risks of cookies?

Invasion of privacy

Identity being stolen

24
New cards

How can you reduce the risks of cookies?

By limited cookies by changing the settings of your web browser

25
New cards

What is digital currency?

exists electronically then physically

26
New cards

How is payment encrypted?

Using hTTPS protocol

27
New cards

Where are payment details stored in?

Persistent cookies

28
New cards

What is cryptocurrency?

Additional currency that uses encryption and not managed by central authority

29
New cards

What is Blockchain?

A method used to track transactions made with cryptocurrency

30
New cards

What is Digital ledger?

Database that is a list of transactions recorded by Blockchain

31
New cards

How does Blockchain work?

When a payment is made a record is added to the ledger, including a digital signature with the time, and the payment was made is encrypted and cannot be changed, but anyone can view the data

32
New cards

What are digital currencies?

exist electronically then physically

33
New cards

How was payment encrypted?

Using HTTPS Protocol

34
New cards

Where are payment details stored in?

Persistent cookies

35
New cards

What is cryptocurrency?

Digital currency that uses encryption and not managed by central authority

36
New cards

What is Blockchain?

A method used to attract transaction made with cryptocurrency

37
New cards

What is digital ledger?

Database that is a list of transactions recorded by Blockchain

38
New cards

How does Blockchain work?

When a payment is made a record is added to the ledger, including additional signature with the time and date the payment was made. The data is encrypted and cannot be changed, but anyone can view the data.

39
New cards

What is brute-force attack?

Type of cyber threat involving repeatedly inputting a password until the correct one is found to break into a device

40
New cards

Why is brute force attacked done?

To steal personal data or use it to buy the items

41
New cards

How to avoid brute force attack

Strong Password

Limiting number of attempts allowed to enter the password

Biometric passwords

Two-step verification

42
New cards

What is a biometric password?

Type of password that uses biological data

43
New cards

What is two step verification?

A process that involves inputting two different kinds of data

44
New cards

Why biometric passwords good

They are unique to us

45
New cards

Why are two step verification good?

The attackers also need access to another device increasing difficulty

46
New cards

What is a packet sniffer?

Piece of Software used to examine contents of data

47
New cards

What is Datta interception?

Data packets are intercepted and examined through packets sniffers

48
New cards

What is data interception used for?

Interception is used to steal data for fraud or theft

49
New cards

How was Datta interception avoided?

Using encryption and checking URLs

50
New cards

How does DDoS attack happen?

Creates a botnet by sending malware to many computers

Bot sent multiple request to access Web servers at the same time

This flood, the web server with too many requests and struggles with dealing with each request

The web server slows down and eventually crashes

Web server denied service to a normal request

51
New cards

Why is DDOS done?

To demand a company to pay to stop the attack punish the company as an active revenge or activism

52
New cards

What is a proxy server?

Method of cyber security examining request sent by devices to access pages

53
New cards

How does proxy server help with DDoS?

It is used as a barrier by getting all requests for a Web server to pass through proxy servers

If there are too many requests, it passes them at a slower rate so web servers are not flooded with requests

Cashing - once request has been sent from an IP address. It can stop repeated request for a short time from the same IP address.

54
New cards

What is anti Malware?

Type of software that scans a device to find and remove malware

55
New cards

How does anti Malware work?

By comparing each file with a known list of malware, if there is a match, it puts the file into quarantine area and tells the user a malware has been found

56
New cards

How to avoid DDoS?

By using proxy servers and anti-malware

57
New cards

What does hacking mean?

Gain unauthorized access to data to steal or corrupt data

58
New cards

Why is hacking done?

To steal data and identity, corrupt or leaked data about a company or has an act of revenge or activism

59
New cards

What is a firewall?

A cyber security method used to examine incoming and outgoing traffic from a computer

60
New cards

How does a firewall work?

By giving it a set of criteria to examine the data, the data is sent through a firewall is compared with the criteria firewall can either accept or reject the data and stop it from passing through Or stop certain ports

61
New cards

What are security solutions for hacking?

Firewall automatic software updates, strong, passwords, and two-step verification

62
New cards

Why are software updates necessary?

As hackers try to explore software software companies, develop updates to solve the issue

63
New cards

What is malware?

Malicious software used to disrupt Computers

64
New cards

What is a virus?

Once downloaded in replicates and corrupt data or Uses all memory into computer, crashing it

65
New cards

What is a worm?

Replicate itself by finding vulnerabilities in the network and clog the network slowing it down

66
New cards

What is spyware?

Software that spies on users action, while using a computer spyware works by using a key logger to record key presses on a good keyboard this is sent to attackers where it is analyze to find patterns in the data

67
New cards

What is Trojan horse?

Disguises itself to look harmless but contains malware

68
New cards

What is Adware?

Designed to automatically create pop-up adverts

69
New cards

What is ransomware?

Download it to encrypt data and stopped access so the creators demand money to the crypt

70
New cards

What is Datta back up?

Copy of data store separately

71
New cards

How do you protect against malware?

Anti-malware

Firewall

Being cautious

Creating backup of data

Typing passwords in other ways – drop-down boxes or virtual keyboards Or typing random letters from the password

72
New cards

What is farming??

Download a software that redirect request aimed at a genuine website and redirect to a fake website instead

73
New cards

What is farming used for?

To steal personal data

74
New cards

What should you do if you see a website is fake

You should change your password immediately

75
New cards

How do you protect against farming?

anti-malware, By checking websites

76
New cards

What is fishing?

Sending a fake email which redirect them to a fake website or respond to an email

77
New cards

How do you protect against fishing?

Checking the URL and checking the tone of the email

78
New cards

What is social engineering?

Deceiving people into giving personal data

79
New cards

What are access levels?

Amount of access user is given to Datta

80
New cards

how social engineering avoided?

By using axis levels and awareness of how social engineering happens

81
New cards

What is the username?

Textbased identification, given to users identifying the level of access they have

82
New cards

Why are acess levels good?

Because if an employee is targeted, the attacker only gains access to a limited amount of data