Y11 Comp Sci 1.3 & 1.4 test

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/77

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

78 Terms

1
New cards

network definition

a system that allows computer systems to communicate and share resources with each other. Usually 2 or more devices

2
New cards

standalone computer

a computer thats not connected to any network (e.g. the internet)

3
New cards

LAN

Local Area Network

computers connected over a small geographical area e.g. a single building or site

owner is responsible for the connections (cabling, wifi, hotspots etc)

examples of lans - home networks, school networks, networks in shops

cheaper than wans (only costs are devices & networks) + cost less to maintain (smaller area)

more secure than WANs (smaller area)

4
New cards

WAN

computers connected over a large geographical area - several sites, town, country, or international

owners use existing network infrastructure to connect sites together e.g. phone lines, satellite connections

examples of wans - city, university campus with several sites, the internet (biggest wan)

cost more than lans (sophisticated hardware) & are less secure (larger area)

5
New cards

network hardware: network interface card (NIC)

allows computers to connect to other computers by allowing them to connect to a wired network and data packets to travel to & from it

contains a MAC address (Media Access Control) - physical hardware address

allows an ethernet cable to be plugged into it

6
New cards

network hardware: transmission media

different types of cabling you need to connect to other computers

ethernet cable - aka twisted pair, networking standard

fibre optic cable - very fast but expensive, often used in WANs / big LANs

coaxial cable - older networking cable

7
New cards

packet definition

a message containing data that is sent from one device to another

8
New cards

network hardware: switch

connects multiply devices (printers, computers, servers) in a network & allows them to communicate with each other

when a device sends data to another device it forwards the data packet to the correct destination device using the MAC address of each device to see where to sent it

if 2 or more computers place a packet onto a network at the same time a data collision occurs. a switch helps solve this by examining the destination device and creating a direct connection to that device

as far as the 2 devices are concerned, there are no other computers on the network - no other devices exist

9
New cards

how switches send packets

each device on a network has a unique MAC address, given to them when they are manufactured

switches don’t initially know which device is connected to which one of its ports but will build up a MAC address table by learning from the traffic that passes through it

10
New cards

network hardware: router

interconnection device used on a network

contains routing table with a list of IP addresses & common routes for packets to take. examines the IP adresses of data packets, identifies a network, and determines which network / host the packet should be forwarded to

router allows computers to access the internet - allow packets from different network types to be exchanged

11
New cards

home broadband routers

network hardware device that combines features of a switch, WAP and router in one

12
New cards

network hardware: wireless access point (WAP)

allows for wireless devices to connect to a network using a switch. includes connections through wifi & bluetooth

can also provide internet access in public places e.g. wifi hotspot

13
New cards

benefits of a WAP

no need for cables - allow devices to connect to networks wirelessly so no need for physical cabling. beneficial in environments where cables would be impractical e.g. big buildings, conference rooms, public spaces

mobility & flexibility - users can connect laptops, smartphones, tablets etc to the network from anywhere in the WAP’s coverage area

cost saving - cables can be costly & labour intensive to set up - save on infrastructure costs

14
New cards

limitations of WAPs

bandwidth limitations - all devices must share available bandwidth - network congestion

capacity - limited total bandwidth which is split between all devices. can slow down network

radio interference - wireless signals are susceptible to interference from other devices that operate on similar frequencies (microwaves, cordless phones, bluetooth devices). can lead to packet loss, signal degradation, retries, leading to reduction in overall speed & reliability of network.

signal strength - as distance between device & WAP increases, signal strength decreases leading to slower speed & higher latency (time it takes for packet to travel from one device to another). devices far away can experience packet loss / need to reconnect

15
New cards

factors affecting network poerformance

bandwidth - how much data can be transferred in a unit of time (in bits per second). smaller bandwidth = less data can be sent & network slows down

latency - time it takes for a packet to arrive. big delay = more data on network = more data collisions = more packets on network

number of users - too many can cause network to slow down if there’s not enough bandwidth / can cause data collisions

error rate - how many packets don’t reach their destination. higher rate = less reliable connections

transmission media - type of cable used as some have higher bandwidth (fibre optic is the best

16
New cards

client definition

a device capable of obtaining information from a server

17
New cards

server definition

a computer that manages a centralised resource

18
New cards

peer defintion

a computer of the same status / ability

19
New cards

client-server network

relies on a centralised server that all clients request services from. additional hardware is also needed e.g. high end powerful servers

useful if there are lots of computers & a high traffic environment

all computers can update central databases, backups are easily managed as they are done centrally in one go

centralised security can be installed & configured from the server (e.g. antivirus / firewall)

20
New cards

peer-peer network

all computers have equal status - each device can act like a client & a server. all devices can request & provide network services

useful for a small number of computers & low traffic environment

if it’s a home network no additional software would be needed, but in a corporate situation additional hardware may be needed

all files can be accessed by anyone and individual computers need to back up their own files

individual security needs to be installed on individual machines

21
New cards

topology definition

the way devices are arranged & connected on a network

22
New cards

node definition

any device connected to a network

23
New cards

server

powerful computer that provides service / resources

stores files, hosts websites, runs apps, manages emails

other devices can be added & access the server

24
New cards

star topology

the most common type of topology where every message goes through a central device. typical layout for classrooms, home networks, large organisations

can look the same as a client-server network but can run applications in either client-server or peer-to-peer model

25
New cards

benefits & limitations of star topology

benefits

  • fast & reliable as each device has its own connection to central node, reducing data collisions

  • if one device fails the rest won’t be affected

  • easy to add new devices by connecting them to just the central node

  • increased security - central node can screed data packets & reject corrupt ones

  • management of network can be done centrally

  • signal doesn’t need to be transmitted to all computers

  • simple to understand & troubleshoot

  • fewer cables needed (compared to mesh)

limitations

  • requires lots of cabling so can be expensive

  • if central node fails the whole network fails

  • bottlenecks can be caused

26
New cards

mesh topology

devices are connected to lots of devices with no central switch

expensive as more cables & maintenance is required

mostly used by military & emergency services to avoid a breakdown in communications as data can be rerouted

partial vs full mesh - in a partial mesh, most devices are connected to several other devices. in a full mesh, every device is connected to every other device

27
New cards

benefits & limitations of mesh topology

benefits

  • allows packets/data to be rerouted around a bottleneck

  • more reliable & robust - single failure won’t stop the rest of the network

limitations

  • needs more cabling (more connections)

  • more complicated to add/remove devices

  • more complicated to understand & troubleshoot

  • expensive

28
New cards

the internet

a worldwide collection of computer networks that are all linked together

29
New cards

internet protocols (IP)

a set of rules that ensure that devices can work together

30
New cards

URLs

we use URLs (Uniform Resource Locators, aka domain name) to access webpages as IP addresses are hard to remember

‘http’ tells the computer to use hypertext transfer protocol which puts packets together in the same web browser

‘www’ tells the webpage that it’s located on the world wide web

31
New cards

DNS servers

Domain Name Server / Domain Name System Server

when you type a URL into the web browser the computer will query a DNS server which has a list of all domain names and their associated IP addresses

all packets are addressed to IP addresses so to access the server you need to know the IP address. this is what DNS servers do. without them you would have to type IP addresses in to access a webpage

  1. you search for something

  2. it goes to the DNS server that attributes your search to an IP address

  3. it finds the computer with that IP address

  4. it sends the data pack to your computer using your IP address

32
New cards

hosting

when you place your website on a web server to let other people see it

a company can host different types of content like files, web pages, email, video, or game servers

you need to register the domain name with a domain registrar who ensures the domain name is unique & not already registered. each registered domain name has an associated IP address that is registered on a DNS

hosting companies charge a fee and provide facilities depending on the price e.g. storage space

33
New cards

the cloud

a network of servers that are accessed via the internet rather than being stored locally on a device

benefits

  • access files from anywhere in the world

  • collaborate and share data around the world easily

  • has the most up to date software & minimal user requirements

  • reduces reliance on network managers

  • flexible file storage

  • data is backed up & secure

limitations

  • no internet = no files

  • users have little control over your data - could be hacked

  • unclear who owns the data (user or provider?)

  • providers can increase their fees - too expensive

34
New cards

web servers & clients

every website is hosted on a web server - a dedicated computer on the internet that stores web pages. it holds the data needed for the website, content & layout

when someone wants to view the page their web browser sends a request to the web server which processes the request and prepares the data before sending it back. the web browser receives the data and displays the webpage

anyone can set up a web server but people typically use web hosting companies. they provide the space while web servers have the website files

the web server acts as a host, controlling access to a centralised resource. the web browser is a client, requesting access to that resource

35
New cards

wired connections: ethernet

aka LAN ethernet cable - the most common type of cable, uses wires to carry electrical signals between devices. common in offices & classrooms

advantages

  • more secure - you need physical access to the cables to get onto the network

  • connections are more stable, faster, less susceptible to interferences

disadvantages

  • requires physical cables to be connected - harder to move around

  • cables can be trip hazards - need to be routed along walls, under floors, through the ceiling

36
New cards

wireless connections: wi-fi

the most common type of wireless used in LANs

devices communicate with a WAP - often the centre of a home network. many schools & offices have wi-fi access + ethernet

advantages

  • don’t need to buy extra cables - devices have wifi adapters built in

  • no physical connections = ease of movement

disadvantages

  • vulnerable to hacking as radio waves can be intercepted

  • walls & obstructions reduce signal strength, electrical objects (e.g. fridges & microwaves) cause interference

  • transfer speeds are slower than ethernet

37
New cards

wireless connections: bluetooth

shorter range than wi-fi so is typically used for direct connections between 2 devices e.g. headphones, mice, keyboards. it’s possible to send files over bluetooth but its slow

advantages

  • ideal for personal devices

  • small range makes it harder to intercept data

  • uses less power than wi-fi

  • designed to make quick ad-hoc connections

disadvantages

  • only works over a very short range

  • slow transfer speeds

  • can still be intercepted by anyone in range

38
New cards

encryption on the internet

a method of scrambling data with a key code so it makes no sense and is protected

if encrypted data is intercepted e.g. on a public wi-fi network it will have no meaning - only devices with the correct key can read the data.

when visiting a secure website encryption is applied to keep details safe. this is called SSL - secure socket layer

you know data is encrypted when you see the padlock in your browser window and the website starts for htpps

39
New cards

IP addressing

IP (internet protocol) addresses are used for uniquely defining a computer within a network. they are dynamic (can change)

if you connect a device to one network it will be given an IP address and if you move it to another network, the IP address will change

40
New cards

IPv4

Internet Protocol Version 4

type of IP address that uses 32-bit numbers written as four 8-bit sections separated by full stops, each representing a number between 0-255

provides over 4 billion unique addresses but there are over 8 billion people on the planet (and people may have more than one device) so IPv6 is now used

41
New cards

IPv6

Internet Protocol Version 6

used now due to shortage of IPv4 addresses. new devices have both version 4 & 6 addresses so can work on any network

IPv6 addresses are represented by 128 bits divided into eight 16-bit sections written in hexadecimal and separated by colons

42
New cards

MAC addressing

Media Access Control

a MAC address is made up of 48 bits shown as 6 groups of 2 hexadecimals separated by colons or hyphens

every MAC address is completely unique and MAC addresses are static - they never change. they are printed on the NIC of the device by the manufacturer

43
New cards

standards

a set of guidelines that when used with different hardware & software allows them to work with each other (compatibility) and allow data exchange (interoperability)

standards give manufacturers & software developers the ability to create hardware and software that will function together

countries that use different plug sockets and devices that use different charger cables are examples of where standards are not used

examples of computer standards:

  • HTML - standard for creating websites, allows them to be viewed on the world wide web using browser software

  • ethernet - standard for wired network cables that allows the network to function

  • USB - standard defining physical connector used for connecting peripheral devices to computers

  • wi-fi - standard allowing wireless devices to communicate on a LAN

44
New cards

protocols

a set of rules that govern communication on a network

standards outline the broad guidelines and protocols focus on specific procedures

45
New cards

protocols: http & https

http (hypertext transfer protocol) is used for accessing and receiving web pages on the internet which are made in HTML (hypertext mark up language). it requests a web page from the web server. the server then sends its response including the web page

https (hypertext transfer protocol secure) encrypts the information so it can’t be understood by an eavesdropper. most websites use it to deal with personal data e.g. banks, online shops and social networks

46
New cards

protocols: FTP

file transfer protocol - used for sending / retrieving files to / from a FTP server, allowing files to be taken from a computer to the server

47
New cards

how an email is sent with protocols

when an email is sent from a computer it will first be sent to a mail server using the SMTP protocol. it’s then forwarded on by other SMTP servers. when it reaches its destination server it’s stored and the user computer can use POP or IMAP to access the email

<p>when an email is sent from a computer it will first be sent to a mail server using the SMTP protocol. it’s then forwarded on by other SMTP servers. when it reaches its destination server it’s stored and the user computer can use POP or IMAP to access the email</p>
48
New cards

protocols: SMTP

Simple Mail Transfer Protocol - email protocol used for sending emails

email software send the email to the SMTP server used by the person, which relays the message through various other servers (mail relays), eventually arriving at the destination mail server

49
New cards

protocols: POP

post office protocol - downloads every new message to your device, leaving them no longer available on the server (like sending a letter through a post office)

50
New cards

protocols: IMAP

internet message access protocol - downloads an email from a server but will leave a copy of it there which can be accessed by multiple devices and is only removed if the user deletes them

51
New cards

communication protocols

a set of rules for transferring data over the internet

52
New cards

protocols: TCP & IP

TCP (transmission control protocol) breaks up messages sent over the internet into small chunks (packets) and reassembles the packets at the other end. also detects errors and resends lost messages

IP (internet protocol) routes the individual packets from one IP address to another

the TCP & IP protocol stack has four layers and enables communication on the internet

53
New cards

layers

networks rely on many complex parts all working together at the same time. managing the complexity of networks is helped with layers

a layer is a sub part of a more complex task. dividing the network tasks into layers reduces the complexity and makes each layer more manageable. example is the TCP/IP protocol stack (4-layer model)

advantages of layers

  • self contained - managing, repairing, upgrading is easier as each one can be worked on independently

  • allow focus on specific parts of a protocol without affecting other parts

  • promotes data exchange / interoperability between hardware & software

54
New cards

malware

an executable program that runs on a computer and is usually installed without the user’s knowledge

viruses, worms, trojans, ransomware, spyware

55
New cards

malware: viruses & worms

viruses infect computers and can then replicate their code in other programs & infect other computers. harm the computer by deleting / corrupting / modifying files

worms replicate themselves to spread to other computers. can slow down networks and computers but cause no damage to attacked computers

56
New cards

malware: trojans

a program / game / cracked file that’s something the user wants so they are tricked into installing the program. have negative program code which causes damage / takes control / provides access to computer

57
New cards

malware: ransomware

holds a computer hostage by locking / encrypting data and denying access to it

if data is encrypted you can’t recover it unless backups are available. but there’s no guarantee that files will be released once you pay the ransom

58
New cards

malware: spyware

installed without the user’s knowledge (usually bundled in legitimate looking software downloads)

collects personal / sensitive data (e.g. login details & browsing habits) and can monitor user activity like keystrokes (keylogging) to obtain passwords & login details. sends data to a remote attacker

59
New cards

vulnerabilities in systems that hackers exploit

unpatched software - if software updates / security updates aren’t installed software will be vulnerable

out of date anti malware software - if antivirus isn’t regularly updated it can’t detect more up to date viruses

60
New cards

social engineering

the art of manipulating people into providing confidential data / unauthorised access to a computer system.

impersonation - pretend to be someone to trick someone into giving personal info

baiting - leave a drive in plain sight / offer free downloads to trick people into downloading malware

61
New cards

social engineering: shoulder surfing

the ability to get information / passwords by observing as someone types them in

e.g. looking over someone’s shoulder, using cameras, observing from a distance

62
New cards

social engineering: phishing

sending emails/texts/phone calls pretending to be from a trusted organisation to get personal information (usernames, passwords, credit card details)

63
New cards

social engineering: pharming

a type of cyberattack that redirects users from a real website to a fake one, either with malware (using a virus/trojan) or with DNS server poisoning (harder way of exploiting DNS server vulnerabilities)

64
New cards

denial of service attacks (DoS)

hacker will use/infect a computer so it sends as many requests to the server as it can (flood the server). the server can’t respond fast enough so it slows down / goes offline

distributed DoS attack (DDoS) - many computers are used to send requests all at the same time

65
New cards

man in the middle attack (MITM)

attacker intercepts communications between user & server, and can eavesdrop, find passwords / personal info, add info to web pages / emails, and see, steal, change data being sent

unencrypted wi-fi make it easy to perform a MITM attack, and fake websites are also used to trick users into entering details

MITM attacks can be prevented by encryption, secure wifi, VPNs, and digital certificates to verify trusted websites

66
New cards

baiting

criminals can leave USB sticks containing malware in public spaces. someone could pick it up & insert it into their computer, and a hacker can gain access to files, personal data, and system resources

67
New cards

data interception & theft

thieves/hackers can compromise usernames and passwords / other sensitive data by using devices like a packet sniffer

a packet sniffer will be able to collect the data that is being transferred on a network, and a thief can use this data to gain unauthorised access to websites, companies and more 

68
New cards

attacks on digital devices

loss of mobile phone = loss of data stored on it - passwords, account numbers, card details

malware targeting digital devices can create back doors to give attackers access to your device

malicious apps can appear legitimate but lead to fraudulent charges on phone bill / theft of personal info

69
New cards

brute force attacks

hacker will try every combo until they find the right password - computer programs used (can try millions of passwords a second). purpose is usually to manipulate / delete data

prevent through strong passwords, account lockout after an amount of failed login attempts, 2FA, and CAPCHA to prevent bots

70
New cards

SQL injection

takes advantage of web input forms to access/destroy data. SQL commands are input into web forms instead of expected data and vulnerable web applications interpret it which can cause damage / release info

if a website doesn’t check inputs properly, malicious code can be run and the attacker could be able to view private data e.g. usernames / passwords. they can log in and delete / change data

prevent through input validation, not showing detailed database errors, and limiting access to the database / keeping it separate from user input

71
New cards

people as weak points

people are week points in systems because human errors can lead to issues

  • not locking doors to computer / server rooms

  • not locking devices

  • sharing passwords

  • not encrypting data

    • not keeping operating systems / anti-malware up to date

72
New cards

penetrating testing / pen testing

deliberately trying to find security holes in a system

someone is employed to try find vulnerabilities in a system - they attempt to break in and report back their findings. goal is to identify targets of attacks and possible entry points

73
New cards

anti malware software

will detect malware and send it to the antivirus company to verify it’s malware and create a signature of the virus. they add it to their virus database and tell computers to run an update

but viruses can morph to avoid detection so creating signatures can be hard

74
New cards

encrypting files etc

files can be encrypted individually on a computer using a password so they can only be viewed if you have the password

computer drives can be encrypted so a password is needed to access info and this can prevent a hacker from understanding the contents of the hard drive if it’s installed on a different computer

special hardware can be purchased which encrypts removable media on the disk

75
New cards

firewalls

monitors and controls network traffic between trusted internal and untrusted external networks

Blocks / allows data based on security rules to prevent unauthorised access or attacks

Uses packet filtering to drop data that doesn’t match rules

Can be hardware (e.g. built into home wifi router) or software

packet inspection (more advanced) examines contents inside data packets (not just header info) and checks for suspicious / harmful content and illegal / unwanted activities (malware, hacking attempts)

port bocking - firewall can block access to certain ports on the network

76
New cards

user access levels

can be set on disks, folders, or individual files

read (view/open), write (change info) or execute (run program applications / script, open file as a program)

77
New cards

password policy

make sure passwords have secure features e.g. minimum length & symbols. may also require password changes every so often

passwords are checked to make sure they conform to parameters of policy

78
New cards

physical security

hardware/software/networks are protected by physical methods e.g. CCTV, intruder alarms, locks, walls / fences, security guards, ID cards