CIE IGCSE Computer Science Topic 5 The internet and its uses

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Describe how web pages for the website are requested and displayed on a user’s computer

− Browser sends URL to DNS; [1 mark]

− ... using HTTP/HTTPS; [1 mark]

− IP address is found on DNS; [1 mark]

− DNS returns IP address to the browser; [1 mark]

− Browser sends request to web server/IP address; [1 mark]

− Web server sends web pages back to browser; [1 mark]

− Browser interprets/renders the HTML (to display web pages); [1 mark]

− Security certificates exchanged; [1 mark]

2
New cards

Why do websites make cookie requests

– to enable logon information to be kept on his computer; [1 mark]

– to provide pages customised for Ahmed the next time he logs on; [1 mark]

– to implement shopping carts and one-click purchasing; [1 mark]

– to be able to distinguish between new and repeat visitors to the website; [1 mark]

3
New cards

What are the two layers in the TLS protocol?

Handshake
Record

4
New cards

Protocols that can be used to secure data transmission over the internet

HTTPS
SSL
TLS

5
New cards

Examples of HTML structure

where text is placed, margins of page;

6
New cards

Examples of HTML presentation

font size, font colour

7
New cards

What is meant by HTML?

Hypertext Mark-up Language; [1 mark]

− Web authoring language // language used to write/create websites/web page; [1 mark]

8
New cards

Explain how data is sent securely using the TLS protocol

− Client/browser requests secure connection to server; [1 mark]

− Client/browser requests the server to identify itself; [1 mark]

− Server provides a digital certificate; [1 mark]

− Client/browser validates the certificate; [1 mark]

− Client/browser send signal back to server (to begin transmission); [1 mark]

− Session caching can be used; [1 mark]

− A session key is generated; [1 mark]

− Encryption method is agreed // data is encrypted; [1 mark]

9
New cards

Describe what is meant by a DDOS attack

multiple computers are used as bots; [1 mark]

● designed to deny people access to a website; [1 mark]

● a large number / numerous requests are sent (to a server) …; [1 mark]

● … all at the same time; [1 mark]

● the server is unable to respond / struggles to respond to all the requests; [1 mark]

● the server fails / times out as a result; [1 mark]

10
New cards

Security device that can be used to help prevent a DDOS attack

Firewall / proxy server

11
New cards

An art gallery uses secure socket layer (SSL) to provide a secure connection when selling art on its website. Describe the process of SSL and explain how it provides a secure connection.

SSL is a (security) protocol; [1 mark]

● It encrypts any data that is sent; [1 mark]

● It uses/sends digital certificates …; [1 mark]

● … which are sent to the (buyer’s/user’s) browser // requested by the (buyer’s/user’s) browser; [1 mark]

● … that contains the gallery’s public key; [1 mark]

● … that can be used to authenticate the gallery; [1 mark]

● Once the certificate is authenticated, the transaction will begin; [1 mark]

12
New cards

Methods to keep data secure

Password; [1 mark]

− Biometrics (device); [1 mark]

− Encryption; [1 mark]

− Physical methods (e.g. locks); [1 mark]

− Two-factor authentication // Two-step verification; [1 mark]

− Anti-viruses; [1 mark]

firewall

13
New cards

What is meant by phishing?

Legitimate looking email sent to user; [1 mark]

− encourages user to click a link that directs user to a fake website; [1 mark]

− User encouraged to enter personal details into a fake website // designed to obtain personal details from a

user; [1 mark]

14
New cards

What is meant by pharming?

Malicious code/malware is downloaded/installed // software downloaded without users' knowledge; [1 mark]

− ... that re-directs user to fake website (when legitimate URL entered); [1 mark]

− User encouraged to enter personal details into a fake website // designed to obtain personal details from a

user; [1 mark]

15
New cards

Security threats

Hacking; [1 mark]

− Denial of service (DoS) attack; [1 mark]

− Virus; [1 mark]

− Malware; [1 mark]

16
New cards

How proxy server helps protect website

− Acts as a firewall; [1 mark]

− Monitor/filters/examines incoming and outgoing traffic; [1 mark]

− Rules/criteria for traffic can be set // blacklist/whitelist set; [1 mark]

− Blocks any traffic that does not meet criteria …; [1 mark]

− … and can send a warning message to the user; [1 mark]

− Stop the website failing in a DoS attack // DoS attack hits the proxy server and not the webserver; [1 mark]

17
New cards

Ways that data could be accidentally damaged

Loss of power/electricity; [1 mark]

− Spillage of liquids; [1 mark]

− Flood; [1 mark]

− Fire; [1 mark]

− Human error; [1 mark]

− Hardware failure; [1 mark]

− Software failure; [1 mark]

18
New cards

Similarities between phishing and pharming

Both are designed to steal/collect personal data; [1 mark]

− Both pretend to be a real company; [1 mark]

− Both use fake websites

19
New cards

Differences between phishing and pharming

− Phishing involves use of an email whereas pharming involves installing malicious code; [1 mark]

− Phishing involves clicking a link or an attachment whereas pharming creates a redirection; [1 mark]

20
New cards

State what is meant by a digital currency

Currency that only exists in electronic form

21
New cards

Describe the process of blockchain in digital currency

• It acts as a ledger [1 mark]

... by tracking each transaction [1 mark]

• It keeps a series of time-stamped records [1 mark] that cannot be altered [1 mark]