Describe the internet Describe the World Wide Web
It is a worldwide collection of interconnected It is part of the internet that users can access
networks. It is a concept, not something using a web browser. It consists of a massive
tangible. collection of web pages, all stored on web
servers. URLs are used to specify the
location of web pages.
What is hypertext transfer protocol? Why is http (S) needed?
It is a protocol (rules) that web pages use for Ensure a (S)ecure connection is made
data transfer. They are needed because data between two devices engaging in data
sent across the web can contain private and transfer. The data packets are encrypted.
sensitive information.
What are the features of a web browser? What is a domain name server (DNS)?
(Hint: BANCAR)
- Bookmarks and favorites A system for finding IP addresses for a
- Allow multiple browsing tabs domain name given in a URL.
- Navigation tools
- Cookies DNS servers contain a database of URLs with
- Address bar the matching IP addresses.
- Record user history
URLs and DNS eliminate the need for a user
to memorize IP addresses.
What are cookies? List 2 usages of cookies
They are small files or code stored on a Any two:
user’s computer. They are sent by a web - Hold user’s preference
server to a browser on a user’s computer. - Customize the web page for individual
use
- Store login details
- Store items in online shopping cart
Difference between session and persistent What is digital currency?
cookies?
Session cookies are temporary cookies that Currency that exists in electronic form only. It
are deleted when you close your web has no physical form and is essentially data
browser. They stop to exit once the browser on a database.
is closed.
Persistent cookies have expiration dates and
will be deleted once they expire. They make
websites appear to remember a user on the
next visit.
Describe a blockchain How do DDoS attacks work?
It is a decentralized database. All the A criminal uses a software that forces
transactions are stored on this database. thousands of innocent computers around the
They consist of a number of interconnected world to send a viewing request to a web
computers but they are not connected to a server. The server will be overloaded and
central server. won’t be able to service a user’s legitimate
request.
List 3 types of malware The difference between virus and worms
- Virus Virus needs an active host, worms do not.
- Trojan horse
- Worm
- Spyware
- Adware
- Ransomware
Once installed on the user’s computer, I will Difference between phishing and pharming.
give cyber criminals access to personal
information on your computers, such as IP
addresses, passwords and other personal
data. Spyware and ransomware are often
installed on a user’s computer via ME.
WHO AM I?
Trojan horse Phishing - Sending out legitimate-looking
emails designed to trick the recipients into
giving their personal details. They will take
the user to a fake website to enter personal
details.
Pharming - Redirect users from a genuine
website to a fake one. They do this by
manipulating the DNS server.
How does antivirus software work? Name 3 authentication methods.
They are constantly scanning documents, - Password and usernames
files and also incoming data from the internet. - Biometrics authentication
If a file is detected as harmful, the anti-virus - Two step verification
will quarantine the file away from the network.
What does a firewall do? How does a firewall filter harmful traffic?
A firewall can either be software or hardware. Checks whether incoming or outgoing data
It sits between the user’s computer and an meets a given set of criteria. If the data fails
external network and filters information in and the criteria, the firewall will block the traffic.
out of the computer.
The firewall can be software installed on a
computer.
What is a proxy server and what are its What is a secure socket layer?
benefits?
A proxy server acts as an intermediate It is a protocol that is commonly found on
between a user and a web server. websites where financial transactions take
place.
Benefits:
- Allows internet traffic to be filtered SSL encrypts the connection between the
- Keeps user’s IP addresses a secret, user’s computer and the website that is being
which improves security used.
- [star] If a DDoS attack is launched, it
hits the proxy server instead
- Act as a firewall
How do we know that a website is using What is transport layer security (TSL)
SSL?
When we see: A more modern and more secure version of
- HTTP(S) or SSL. IT is a form of protocol that ensures the
- Small padlock in the status bar security and privacy of data between devices
and users when communicating over a
network.
Discuss with your friends the structure of a URL.
Discuss with your friends the flow to retrieve a web page.
Describe with your friends the flow of how cookies are used.
Discuss with your friends on what makes blockchains safe.
The previous hash value attribute.
*modifying the value inside each box changes the hash value
Second, proof of work makes the creation of blocks slower.
Third, the exact blockchain is stored in all the computers in the networks.