5. internet and its uses

studied byStudied by 7 people
0.0(0)
Get a hint
Hint

Internet

1 / 32

33 Terms

1

Internet

global aggregation of different computer networks

New cards
2

World wide web

collection of websites and web pages accessed using the internet

New cards
3

Uniform Resource Locater (URL)

  • used to locate and access web pages

New cards
4

Hypertext Transfer Protocol (HTTP)

a protocol for computers to request and share the web pages

New cards
5

Hypertext Transfer Protocol Secure (HTTPS)

an encrypted form of information transfer on the internet

New cards
6

Hypertext Markup Language (HTML)

language used to compose web pages

New cards
7

Web browser

software which renders HTML and display web pages

New cards
8

Other functions of web browser

  • storing bookmarks and favourites

  • recording user history

  • allowing use of multiple tabs

  • storing cookies

  • providing navigation tools

  • providing an address bar

New cards
9

Retrieval and location of web pages

  1. browser sends URL to the Domain Name Server (DNS)

  2. DNS looks up the domain name in its index and matches it with the corresponding IP address

  3. DNS sends the IP address back to the browser

  4. browser sends a request to the IP address of the web server

  5. web server responds by sending the HTML content of the requested web page to the browser

  6. browser interprets the HTML content received and displays the web page to the user

New cards
10

Cookies

small files stored on the user's computer generally used to track user data

New cards
11

Session cookies

cookies stored in RAM and deleted when the browser is closed

New cards
12

Persistent cookies

cookies that are stored in hard drive even after a session ends

New cards
13

Functions of cookies

  • saving personal details

  • tracking user preferences

  • holding items in an online shopping cart

  • storing login details

New cards
14

Digital currency

payment method which exists only in electronic form and is not tangible

New cards
15

Blockchain

digital ledger, that is a time-stamped series of records that cannot be altered

New cards
16

Brute force attack

  • hackers try to guess passwords by typing all possible combinations of letters, numbers and symbols

  • to get access to user's personal data

New cards
17

Data interception

  • stealing of data by tapping into a wired or wireless transmission line

  • to cause computer to crash, delete data

  • wardriving: act of locating and using wireless internet connections illegally

  • packet sniffing: uses packet sniffers to examine packets sent over a line and sent back to attacker

New cards
18

Distributed denial of service (DDos)

  • attack that uses multiple computers in a botnet to flood a part of a network with requests

  • to prevent users from accessing a part of a network

New cards
19

Denial of Service (DoS)

  • attack by a single attacker to flood a part of a network with requests

  • to prevent users from accessing a part of a network

New cards
20

Hacking

  • act of gaining illegal access to a computer system

  • to gain personal information, corrupt data, test strength of security system

New cards
21

Malware

  • virus: infects computer by attaching to programs, spreads when programs run

  • worm: self-replicates, spreads through networks

  • ransomware: encrypts files, demands payment to unlock

  • adware: displays unwanted ads, redirects users to other websites

  • spyware: secretly gathers user data, including browsing habits and passwords

  • Trojan horse: disguised as legitimate software, tricks users into installing, steals data

New cards
22

Phishing

  • attackers send out legitimate-looking emails

  • to bait the user into giving out their information

New cards
23

Pharming

  • attacker installs a malicious code on the computer which directs user to fake websites

  • to bait user into giving out login and other personal details

New cards
24

Social engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

New cards
25

Access levels

settings that determine who can access an item and what they can do with it (read, write, delete)

New cards
26

Antivirus

software that is specifically designed to detect viruses and protect a computer and files from harm

New cards
27

Authentication

user proving who they are through username and password, biometrics, two-step verification

New cards
28

Automatic software updates

automatic updates fix vulnerabilities and patches to protect against major security threats

New cards
29

Checking spelling and tone

fake emails tend to have wrong spelling and grammar, tone may seem urgent

New cards
30

Firewalls

hardware or software which monitors the traffic between a network and user's computer

New cards
31

Proxy servers

acts as an intermediate between the user's computer and web server

New cards
32

Privacy settings

limits who can access and see a user's profile

New cards
33

Secure Socket Layer (SSL)

standard technology for securing an internet connection by encrypting data sent between a website and a browser

New cards

Explore top notes

note Note
studied byStudied by 20 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 79 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 1873 people
Updated ... ago
5.0 Stars(4)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 477 people
Updated ... ago
4.5 Stars(2)

Explore top flashcards

flashcards Flashcard59 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard29 terms
studied byStudied by 26 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard56 terms
studied byStudied by 122 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard23 terms
studied byStudied by 31 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard40 terms
studied byStudied by 44 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard28 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard26 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard101 terms
studied byStudied by 30 people
Updated ... ago
5.0 Stars(2)