Understanding Internet and Web Basics
Understanding Internet and Web Basics
????
Server
Format of a
URL
Format of a
URL
Retriev
Displa e HTML
y
Features of a web browser
HINT:BAN CAR
Features of a web browser
DNS
[Link] Server 128.17.13
Flow to retrieve a web page Using the IP address, the
computer now sets up a
communication with the
website server and the
required pages are
downloaded.
User types in
The browser The IP address
the URL of a
asks the DNS is sent back to HTML files are sent from
site into the
server for the IP the user's the website server to the
address bar of
address of the computer computer.
the web
website
browser
The browser interprets the
HTML, which is used to
structure content, and
then displays the
information on the user’s
computer.
Flow to retrieve a web page
[Link]
128.17.13
4.25
128.17.13
4.25
HTML
<h1> ....
</h1>
Cookies
Cookies
Person A Person B
Person A Person B
MINER
- Use the power of their personal computers to process
transactions. The reward for doing so is that miners
receive some of the transaction fees involved in the
process of payment made.
Decentralisation - Cryptocurrency
• Traditional digital currencies are regulated by central banks and
governments. This means all transactions and exchange rates are
determined by these two bodies.
• Cryptocurrency has no state control and all the rules are set by the
cryptocurrency community itself.
• The cryptocurrency system works by being within a blockchain
network which means it is much more secure.
Blockchain
A technology that sits behind all
cryptocurrency transactions. It makes all sorts
of cryptocurrency safe to use.
Blockchaining - How cryptocurrency work?
• Blockchain is a decentralised database.
• All the transactions of networked members are stored on this
database.
• The blockchain consists of a number of interconnected computers
but they are not connected to a central server.
• All transaction data is stored on all computers in the blockchain
network.
Blockchaining - A chain of blocks
Blockchaining - A chain of blocks
Hash: A4BF
Previous Hash: 0000
Blockchaining - A chain of blocks
Hackers will find it hard to re-create block 3 and 4, due to proof-of-work, which
makes sure it takes 10 minutes to add a block to the chain.
THIRD REASON: The exact blockchain is stored in all the computers
in the networks.
Hash: 34EE
Hash: A4BF Hash: 6AB1 Hash: 34EE
Hash: A4BF Hash: 6AB1 Hash: 34EE Hash: 34EE Previous Hash: 6AB1
Previous Hash: 0000 Previous Hash: A4BF Previous Hash: 6AB1
Previous Hash: 0000 Previous Hash: A4BF Previous Hash: 6AB1 Previous Hash: 6AB1
Hash: 34EE
Hash: A4BF Hash: 6AB1 Hash: 34EE
Hash: A4BF Hash: 6AB1 Hash: 34EE Hash: 34EE Previous Hash: 6AB1
Previous Hash: 0000 Previous Hash: A4BF Previous Hash: 6AB1
Previous Hash: 0000 Previous Hash: A4BF Previous Hash: 6AB1 Previous Hash: 6AB1
I Hack This!
All nodes within this network creates a consensus. Majority wins. This
means that hacker will have to tamper a block in more than half of the
nodes, which is impossible.
Failed!
Cyber Security
Cyber Security
Threa
t
Cyber Security
Threats Solutions/Prevention
Cyber Security
Threats Solutions/Prevention
Cyber Brute-Force
B Attack D DDOS Attack
Security
Threa
Data
D Interception H Hacking
t M Malware
P Phishing
Social
P Pharming
S Engineering
Cyber Brute-Force
B Attack D DDOS Attack
Security
Threa
Data
D Interception H Hacking
t M Malware
P Phishing
Social
P Pharming
S Engineering
B Brute-Force Attack
Security
Threa
Data
D Interception H Hacking
t M Malware
P Phishing
Social
P Pharming
S Engineering
DDistributed Denial of Service (DDOS)
Patient ..
DDistributed Denial of Service (DDOS)
How does it attack?
x100000
DDistributed Denial of Service
Distributed = Many computers
Denial of Service = Deny user
(DDOS)
from using a service
How does it attack?
Sorry
can't do
x100000 it!
DDistributed Denial of Service (DDOS)
Signs to detect a DDOS attack
Security
Threa
Data
D Interception H Hacking
t M Malware
P Phishing
Social
P Pharming
S Engineering
DData Interception
Encryption of data.
Eg. Wired Equivalency privacy (WEP)
Security
Threa
Data
D Interception H Hacking
t M Malware
P Phishing
Social
P Pharming
S Engineering
HHacking
Black-hat White-hat
hacker hacker
Hacker that try to find security
Hacker who seeks to gain loopholes in a system and give
unauthorised access to a advice to the network owners
computer system. about how to close them.
Cyber Brute-Force
B Attack D DDOS Attack
Security
Threa
Data
D Interception H Hacking
t M Malware
P Phishing
Social
P Pharming
S Engineering
M Malware = Malicious Code Software
Trojan Ransomware
Virus Worm Spyware Adware
Horse
V Virus
Trojan Ransomware
Virus Worm Spyware Adware
Horse
T Trojan Horse
Trojan Ransomware
Virus Worm Spyware Adware
Horse
W Worm
Trojan Ransomware
Virus Worm Spyware Adware
Horse
S Spyware
Trojan Ransomware
Virus Worm Spyware Adware
Horse
A Adware
Trojan Ransomware
Virus Worm Spyware Adware
Horse
R Ransomware
Trojan Ransomware
Virus Worm Spyware Adware
Horse
Flashcard
THE
DIFFERENCE
BETWEEN
VIRUS
AND WORMS
VIRUS NEEDS
AND ACTIVE
HOST, WORMS
DO NOT.
Flashcard
HOW IS VIRUS
SENT TO A
USER
VIA EMAIL
ATTACHMENTS,
INFECTED
SOFTWARE/
WEBSITE
Flashcard
Once installed on the user’s
computer, I will give cyber
criminals access to personal
information on your computers,
such as IP addresses, passwords
and other personal data. Spyware
and ransomware are often
installed on a user’s computer via
ME.
WHO AM I?
TROJAN
HORSE
Flashcard
Security
Threa
Data
D Interception H Hacking
t M Malware
P Phishing
Social
P Pharming
S Engineering
P Phishing
• Sending out legitimate-
looking emails
designed to trick the
recipients into giving
their personal details to
the sender of the email.
• These emails may
contain links or
attachments, when
initiated, take the user
to a fake website to
enter personal details.
P Phishing
• Sending out legitimate-
looking emails
designed to trick the
recipients into giving
their personal details to
the sender of the email.
• These emails may
contain links or
attachments, when
initiated, take the user
to a fake website to
enter personal details. Clickbait
P Phishing
Can you find something
that is not so right?
P Phishing - Legit Emails
P Phishing
Ways to prevent phishing
Security
Threa
Data
D Interception H Hacking
t M Malware
P Phishing
Social
P Pharming
S Engineering
P Pharming
Security
Threa
Data
D Interception H Hacking
t M Malware
P Phishing
Social
P Pharming
S Engineering
S Social Engineering
Security Automating
A Authentication
A
Solution and
Software Updates
S Tone in
communications F Firewalls
Privacy
P Setting P Proxy Server
Secure Socket
S Layer
Cyber A Access Level A Anti-Malware
Security Automating
A Authentication
A
Solution and
Software Updates
S Tone in
communications F Firewalls
Privacy
P Setting P Proxy Server
Secure Socket
S Layer
A Access Level
• This method of protection is hugely important in
organisations where there are lots of users accessing a
network (eg. Havil Computer Lab).
• User will be assigned different levels of access
depending on the role they have. It ensures that users'
behaviour can be controlled while they use a computer
on a network.
• When using databases, levels of access are important to
determine who has the right to read, write and delete
data.
Cyber A Access Level A Anti-Malware
Security Automating
A Authentication
A
Solution and
Software Updates
S Tone in
communications F Firewalls
Privacy
P Setting P Proxy Server
Secure Socket
S Layer
A Anti-malware
• Danger of malicious software
• Theft of company data
• Corruption of data (data becomes unreadable)
• Hence, a network should have anti-malware and anti-
virus applications installed that protect all devices on
the network (just like a vaccine to covid).
Types of Anti-malware
Security Automating
A Authentication
A
Solution and
Software Updates
S Tone in
communications F Firewalls
Privacy
P Setting P Proxy Server
Secure Socket
S Layer
A Authentication
Password
Biometrics Two-step Credit Card &
and user Authentication verification Hotel Card
names
P Password and user names
Password
and user
names
Let's try this out
Password
and user
names
T Tips for a stronger password
• Combine different types of character (lowercase, uppercase,
special character)
• Don't put in pattern in your passwords (eg. cabbag3), use
random patterns eg. Hp3oe7Ls*(!kajmc)
• Don't use the same passwords for all accounts
• Be aware of spyware that tries to steal your passwords (via
keyboard stroke)
Password
and user
names
B Biometric Authentication
Biometric
Authentication
B Biometric Authentication
• Biometrics relies on certain unique characteristics of human
beings:
• Fingerprint scans (compare image stored versus image
scanned; fingerprints are unique)
• Face recognition
• Voice recognition
Biometric
Authentication
T Two-step verification
Two-step
verification
C Credit Card & Hotel Card
Security Automating
A Authentication
A
Solution and
Software Updates
S Tone in
communications F Firewalls
Privacy
P Setting P Proxy Server
Secure Socket
S Layer
A Automating Software Updates
• Why?
A Automating Software Updates
A Automating Software Updates
• This ensures that applications
like operating systems, anti-
virus and other commonly
used pieces of software are
always operating with the
latest version installed.
• Greater threats are constantly
evolving and that anti-virus
companies are always
attempting to stay up to date
with new attacks.
Cyber A Access Level A Anti-Malware
Security Automating
A Authentication
A
Solution and
Software Updates
S Tone in
communications F Firewalls
Privacy
P Setting P Proxy Server
Secure Socket
S Layer
S Spelling and Tone in communications
[Link]
[Link]
Cyber A Access Level A Anti-Malware
Security Automating
A Authentication
A
Solution and
Software Updates
S Tone in
communications F Firewalls
Privacy
P Setting P Proxy Server
Secure Socket
S Layer
F Firewall
• A firewall can be either software or hardware. It sits between the user’s computer
and an external network (for example, the internet) and filters information in and out
of the computer.
F Firewall
• A firewall can be either software or hardware. It sits between the user’s computer
and an external network (for example, the internet) and filters information in and out
of the computer.
• Firewalls are the primary defence to any computer system to help protect
it from hacking, malware (viruses and spyware), phishing and pharming.
• Main tasks
• Examine the ‘traffic’ between user’s computer (or internal network)
and a public network
• checks whether incoming or outgoing data meets a given set of
[Link] the data fails the criteria, the firewall will block the ‘traffic’
• criteria can be set so that the firewall prevents access to certain
undesirable sites; the firewall can keep a list of all undesirable IP
addresses
• The firewall can be software installed on a computer; in some cases, it is
part of the operating system.
Cyber A Access Level A Anti-Malware
Security Automating
A Authentication
A
Solution and
Software Updates
S Tone in
communications F Firewalls
Privacy
P Setting P Proxy Server
Secure Socket
S Layer
P Privacy Setting
Security Automating
A Authentication
A
Solution and
Software Updates
S Tone in
communications F Firewalls
Privacy
P Setting P Proxy Server
Secure Socket
S Layer
P Proxy Server
Security Automating
A Authentication
A
Solution and
Software Updates
S Tone in
communications F Firewalls
Privacy
P Setting P Proxy Server
Secure Socket
S Layer
S Secure socket layer
• SSL is a protocol/rule that is commonly found on
websites where financial transactions take place.
• SSL encrypts the connection between the user's
computer and the website that is being used.
Sensitive data can be bank card numbers, login
details and passwords.
S Secure Socket Layer Handshake
A connection that is created between a web
browser and a web server
S Secure Socket Layer - flow
The user’s browser The browser then The web server
sends a message so requests that the web responds by sending a
that it can connect with server identifies itself copy of its SSL
the required website certificate to the
which is secured by SSL user’s browser
Certificate
An SSL certificate is a form of digital certificate
which is used to authenticate a website and
enables an encrypted connection
S Secure Socket Layer Handshake
The user’s browser The browser then The web server
sends a message so requests that the web responds by sending a
that it can connect with server identifies itself copy of its SSL
the required website certificate to the
which is secured by SSL user’s browser
A user will know if SSL is being applied when they see https or the
small padlock in the status bar at the top of the screen.
S How do we know if a website is using SSL?
Examples of where SSL will be used:
• Online banking and all online financial transactions
• Online shopping/commerce
• Sending and receiving emails
• Instant messaging
Security Automating
A Authentication
A
Solution and
Software Updates
S Tone in
communications F Firewalls
Privacy
P Setting P Proxy Server
Secure Socket
S Layer
EXAM QUESTION(JUNE21)
E X A M Q U E S T I O N ( M A RC H 1 9 )
EXAM QUESTION(JUNE21)
E X A M Q U E S T I O N ( M A RC H 1 9 )
EXAM QUESTION(JUNE20)
EXAM QUESTION(JUNE20)
E X A M Q U E S T I O N ( M A RC H 2 1 )
E X A M Q U E S T I O N ( M A RC H 2 1 )
EXAM QUESTION(JUNE20)
EXAM QUESTION(JUNE20)
EXAM QUESTION(JUNE20)
EXAM QUESTION(JUNE20)