Computer Science Chapter 5

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/46

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

47 Terms

1
New cards

Inernet

Worldwide collection of interconnected networks.

Relies on physical infrastructure that allows networks and individual devices to connect to other networks and devices. Uses transmission protocols and internet protocols.

2
New cards

World Wide Web

Only part of the internet that users can access using a web browser software. It is a massive collection of web pages, and is based on hypertext transfer protocol.

3
New cards

Web Browsers

Software that allow users to access and display web pages on their device screens.

4
New cards

URLs (Uniform Resource Locators)

Text addresses used to access websites.

5
New cards

Format of URL …:////

protocol:// website address/path/file name

Protocol: usually either http or https

Website Address:

» Domain Host (www)

» Domain Name (website name)
» Domain Type (.com, .org, .net, .gov, etc.)
» Country Code (.uk, .id, etc.)

Path: web page — often omitted and it then becomes the root directory of the website

File name: item on the web page

6
New cards

Hypertext Transfer Protocol (http)

Set of rules that must be obeyed when transferring files across the internet. When some form of security (SSL/TLS) is used, then this changes to https The ‘s’ stands for secure, and it indicated a more secure way of sending and receiving data across a network.

7
New cards

Features of Web Browsers

  1. Home page

  2. Favorite website/webpages

  3. History of websites

  4. Navigating forwards/backwards through websites/pages that have already been opened

  5. Multiple tabs (open many at same time)

  6. Cookies

  7. Hyperlinks

  8. Data stored as cache

  9. Uses JavaScript

  10. Address Bar

8
New cards

Domain Name System (DNS)

System for finding IP addresses.

It involves converting URL into an IP address the computer can understand. DNS provides more than one server. It contains a database of URLs with the matching IP address.

9
New cards

Mention the 5 Stages of Retrieval and Location of Web Pages

  1. The user opens their browser and types in the URL. The browser asks the DNS server (1) for the IP address of that website.

  2. If unable to find the IP address in its cache or database it sends out a request to DNS server (2)

  3. DNS Server (2) finds the URL and maps it to the IP address which is sent back to DNS Server (1) which now puts this IP address and associated URL into its cache/database.

  4. IP address is sent back to the user’s computer

  5. The computer now sets up a communication with the website server and required files are downloaded. HTML files are sent from the website server to the computer. Browser interprets the HTML, which is used to structure content, and then displays the information on the user’s computer.

<ol><li><p><span style="color: red;">The user opens their browser and types in the URL. The browser asks the DNS server (1) for the IP address of that website.</span></p></li><li><p><span style="color: purple;">If unable to find the IP address in its cache or database it sends out a request to DNS server (2)</span></p></li><li><p><span style="color: green;">DNS Server (2) finds the URL and maps it to the IP address which is sent back to DNS Server (1) which now puts this IP address and associated URL into its cache/database.</span></p></li><li><p><span style="color: blue;">IP address is sent back to the user’s computer</span></p></li><li><p><span style="color: rgb(255, 84, 197);">The computer now sets up a communication with the website server and required files are downloaded. HTML files are sent from the website server to the computer. Browser interprets the HTML, which is used to structure content, and then displays the information on the user’s computer.</span></p></li></ol><p></p>
10
New cards

Cookies

Small files or code stored on a user’s computer.

They are sent by a web server to a browser on a user’s computer. Each cookie is effectively a small look-up table containing pairs of (key, data) values.

Every time a user opens a server it checks if it has set cookies on their browser before. If so, the browser reads the cookie which holds key information on the user’s preferences such as language, currency, and previous browsing activity.

11
New cards

Purpose of Cookies

Cookies allow user tracking and maintain user preferences. Collected data can also be used to customize the web page for each individual user.

12
New cards

What are the two types of cookies?

» Session Cookies

» Persistent (permanent) Cookies

13
New cards

Session Cookie

A cookie that is stored temporarily on a computer; it is deleted when the browser is closed or the website session ends

  • They keep user’s items in a virtual shopping basket.

  • Stored: Temporary Memory on the computer

  • Doesn’t collect any information from user’s computer

  • Doesn’t personally identify a user

  • Only exist until browser closes or website session is terminated

14
New cards

Persistent Cookie

A cookie that is stored in the hard drive and only deleted when the expiry date is reached or the cookie is deleted by the user

  • Stored on the hard drive of a user’s computer

  • Exists until its expiry date or if deleted

  • Remember a user’s login details

  • Advantage: remove the need to type in login details every time a certain website is visited

  • Very efficient way of carrying data from one website session to another, or even between sessions on related websites; they remove the need to store massive amount of data on the web server itself

15
New cards

Uses of Persistent Cookie

  1. Remember user’s passwords, email addresses and invoice details

  2. Serve as memory

  3. Save user’s items in virtual shopping basket or cart

  4. Track internet habits and users’ website histories or favorites or bookmarks

  5. Target users with advertising related to previous habits

  6. Store users’ preferences

  7. Used in online financial transactions

  8. Allow progress in online games and quizzes to be stored

  9. Allow social networking sites to recognize certain preferences and borrowing histories

  10. Allow different languages to be used on the web pages automatically as soon as users log on

<ol><li><p>Remember user’s passwords, email addresses and invoice details</p></li><li><p>Serve as memory</p></li><li><p>Save user’s items in virtual shopping basket or cart</p></li><li><p>Track internet habits and users’ website histories or favorites or bookmarks</p></li><li><p>Target users with advertising related to previous habits</p></li><li><p>Store users’ preferences</p></li><li><p>Used in online financial transactions</p></li><li><p>Allow progress in online games and quizzes to be stored</p></li><li><p>Allow social networking sites to recognize certain preferences and borrowing histories</p></li><li><p>Allow different languages to be used on the web pages automatically as soon as users log on</p></li></ol><p></p>
16
New cards

Digital Currency

Currency that exists on electronic form only.

Exists purely in digital format. It has no physical form unlike conventional fiat currency.

17
New cards

Meaning of Fiat

‘Let it be done’

18
New cards

Centralisation

Digital currency relies on a central banking system.

Example:
nick —> bank ‘x’ —> CENTRAL BANK —> bank ‘y’ —> irina

The problem with centralization is maintaining confidentiality and security; these have always been issued with digital currency systems. Cryptocurrency has overcome these issues.

19
New cards

Cryptography

The protection of data/information by use of coding; it usually involves encryption and decryption

20
New cards

Cryptocurrency

A form of digital currency that uses a chain of decentralized computers to control and monitor transactions

21
New cards

Significance of Cryptocurrency

  • transactions are publicly available, therefore all transactions can be tracked and the amount of money in the system is monitored

  • works with blockchain network which means it is much more secure

22
New cards

Blockchain

A decentralized database where all transactions are stored.

It consists of a number of interconnected computers but not a central server.

  • not connected to a central server

  • transactions cannot be changed without the consent of all the network members

  • effectively removes risk of security issues like hacking

23
New cards

Uses of Blockchaining

  1. Cryptocurrency

  2. Smart Contracts

  3. Research

  4. Politics

  5. Education

24
New cards

How Blockchain Works

  • whenever a new transaction takes place, a new block is created

  • new hash value created each time new block created

  • contains timestamp

  • contains hash value of that block and of the previous block

  • Block ‘1’ (first block) is known as the genesis block since it doesn’t point to any previous block

  • Containing previous hash value prevents tampering since all the following blocks will then become invalid

  • Proof-of-work makes it almost impossible to hack into the blockchain

  • If a new network user is created, they get a copy of everything in the whole blockchain system.

<ul><li><p>whenever a new transaction takes place, a new <strong>block </strong>is created</p></li><li><p>new hash value created each time new block created</p></li><li><p>contains <strong>timestamp</strong></p></li><li><p>contains hash value of that block <strong>and </strong>of the previous block</p></li><li><p>Block ‘1’ (first block) is known as the <strong>genesis block </strong>since it doesn’t point to any previous block</p></li><li><p>Containing previous hash value <strong>prevents tampering </strong>since all the following blocks will then become invalid</p></li><li><p><em>Proof-of-work</em> makes it almost impossible to hack into the blockchain</p></li><li><p>If a new network user is created, they get a copy of everything in the whole blockchain system.</p></li></ul><p></p>
25
New cards

Proof-of-Work

The algorithm used in blockchain networks to confirm a transaction and to produce new blocks to add to the chain; special users called miners complete and monitor transactions on the network for a reward

  • Proof-of-work makes sure it takes ten minutes to determine the necessary proof-of-work for each block before it can be added to the chain

  • This process slows down the creating of a new block which foils hackers and also means that the currency is regulated by all the network computers

26
New cards

8 Cyber Security Threats

  1. Brute Force Attacks

  2. Data Interception

  3. Distributed Denial of Service (DDos) Attacks

  4. Hacking

  5. 6 Malware (viruses, worms, Trojan Horse, Spyware, Adware, Ransomware)

  6. Phishing

  7. Pharming

  8. Social Engineering

27
New cards

Brute Force Attack

A ‘trial and errorr’ method used by cybercriminals to crack passwords by finding all possible combination of letters, numbers and symbols until the password is found.

how it works:

  1. checks if password is most simple (qwerty, 11111, abc123, 123456, password)

  2. word list: a text file containing a collection of words used in a brute force attack

28
New cards

Data Interception: Packet Sniffing and Wardriving

An attempt to eavesdrop on a wired or wireless network transmission; cybercriminals often use packet sniffing or access point mapping/wardriving to intercept data

  • Packet sniffing: a method used by a cybercriminal to examine data packets being sent over a network and to find the contents of a data packet, which are sent back to the cybercriminal

  • Wardriving: using a laptop, antenna, GPS device and software to intercept Wi-Fi signals and illegally obtain data; sometimes called Access Point Mapping

29
New cards

Avoid Data Interception

  1. Wired Equivalency Privacy (WEP): an algorithm for wireless networks to protect them against data interception

  2. Firewall

  3. Protect use of wireless router by having complex password

  4. Not use Wi-Fi connectivity in public places

30
New cards

Denial of Services (DoS) and Distributed Denial of Service (DDoS) Attack

DoS: A cyberattack in which cybercriminals seek to disrupt the normal operation of a website by flooding it with requests; also used to clog up a user’s mailbox by sending out thousands of spam emails

Prevents users from…

» accessing their emails

» accessing their websites/web pages

» accessing online services (such as banking)

DDoS: A cyberattack in which cybercriminals in which the fake requests come from many different computers, which makes it harder to stop

‘Spam’: unsolicited emails sent to a user’s mailbox

31
New cards

How does DoS work?

When a user enters a website’s URL in their browser, a request is sent to the web server that contains the website or web page.

Server can only handle a finite number of requests.

So if it becomes overloaded by an attacker sending out thousands of requests, it won’t be able to service a user’s legitimate request.

32
New cards

3 Ways to Avoid DoS/DDoS

  1. using up-to-date malware checker

  2. setting up firewall to restrict traffic to and from the web server or user’s computer

  3. applying email filters to filter out unwanted traffic

33
New cards

3 Signs user has become victim of DDoS Attack

  1. slow network performance (opening files or accessing certain websites)

  2. inability to access certain websites

  3. large amounts of spam email reaching the user’s email account

34
New cards

Hacking

The act of gaining illegal access to a computer system without the owner’s permission

can lead to → identity theft, gaining personal information, deleted data, passed on data, changed data, corrupted data

35
New cards

5 Ways to Avoid Hacking

  1. firewalls

  2. user names

  3. frequently changed strong passwords

  4. anti-hacking software

  5. intrusion-detection software

36
New cards

Ethical Hacking

Occurs when companies authorise paid hackers to check out their security measures and test how robust their computer systems are to hacking attacks

37
New cards

Malware

Programs installed on a user’s computer with the aim of deleting, corrupting, or manipulating data illegally

6 types of malware → viruses, trojan horse, worms, spyware, adware, ransomware

38
New cards

Viruses

A program or program code that replicated itself with the intention of deleting or corrupting files or by causing the computer system to malfunction

  • need an active host program on the target computer or an operating system that has already been infected, before they can actually run and cause harm (that is, they need to be executed by some trigger before being able to start any damage)

  • Often sent as email attachments, reside on infected websites or on infected software downloaded to the user’s computer

39
New cards

3 Ways to Avoid Viruses

  1. Don’t open emails from unknown sources

  2. Don’t install non-original software

  3. Always run up-to-date virus scanner

40
New cards

Worms

A stand-alone type of malware that can self-replicate, they can spread throughout a network without the need for any action by an end-user

Intention is to corrupt whole networks — unlike viruses, they don’t need an active host program to be opened in order to do any damage.

They rely on security failures within networks to permit them to spread unhindered

41
New cards

How Worms Work

Worms frequently arrive as message attachments and only one user opening a worm-infested email could end up infecting the whole network.

Ways to mitigate are same as that of viruses.

42
New cards

Significance of Worms

Worms tend to be problematic because of their ability to spread throughout a network without any action from an end-user; whereas viruses require each end-user to somehow initiate the virus

Example: 'I love you’ worm
Attacked nearly every email user in the world, overloaded phone systems and even brought down television networks. All of this makes them more dangerous than viruses

43
New cards

Trojan Horse

A type of malware that is designed to look like legitimate software but contains malicious code that can cause damage to a computer system

Intent of carrying out some harm to the user’s computer system

  • they need to be activated by end-user

  • usually arrive as an email attachment or are downloaded from an infected website

  • once installed, they will give cybercriminals access to personal information

  • Spyware and Ransomware are often installed on a user’s computer via Trojan Horse malware

  • Firewalls and other security systems are often useless since user can overrule them and initiate the running of the malware

44
New cards

Spyware

A type of malware that gathers information by monitoring a user’s activities on a computer and sends the gathered information back to the cybercriminal who sent out the spyware

Designed to monitor and capture web browsing activities to gain personal data.

  • Can be removed by anti-spyware software

45
New cards

Adware

A type of malware that attempts to flood the end-user with unwanted advertising

Adware can…

» highlight weaknesses in a user’s security defenses

» be hard to remove — anti-malware software may be confused whether or not they are dangerous

» hijack a browser and create its own default search requests

46
New cards

Ransomware

A type of malware that encrypts data on a user’s computer and ‘holds the data hostage’ until a ransom is paid

Can be installed through trojan horse or social engineering

Best way to avoid: keep regular back-ups of key files

47
New cards

Phishing

Sending out legitimate-looking emails to trick users into giving personal information to the sender of the email