0% found this document useful (0 votes)
16 views6 pages

Computer Internet

Uploaded by

ahanadun26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views6 pages

Computer Internet

Uploaded by

ahanadun26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

The Internet and Its Uses

The Internet and the World Wide Web

Internet World Wide Web (WWW)

Uses transmission protocols such as TCP and IP (Internet Collection of webpages and other information on
Protocols) websites

Allows the user to communicate with other users via Uses HTTP(S) protocols that are written using Hypertext
chat, email, calling and more Mark-up Language (HTML)

Worldwide Collection of Interconnected Networks and URLs (Uniform Resource Locator) are used for the
Devices location of the web pages

Web browsers can access web pages.

Uniform Resource Locator (URLs)

 URLs are used to locate and access web pages. The typical format of URLs is -

protocol://website address/path/file name

 The protocol would usually be HTTP or HTTPS

 The website address would contain -

o domain host (www)

o domain name (website name)

o domain type (.com, .org, .net, .gov) or sometimes country codes (.uk, .in, .cy)

 The path would usually become the file directory roots. for example, https://www.znotes.com/computer-science

o The /computer-science is the file name

HTTP and HTTPS

 HTTP stands for Hypertext Transfer Protocol, and HTTPS stands for Hypertext Transfer Protocol secure

 They are safety protocols maintained while transmitting data.

Web Browsers

 It is software used to connect to the internet

 It translates the HTML code

 ensures SSL & TLS security can be established

 Offers additional features like search history & ad blockers

Retrieval and Location of web pages

 The browser sends the URL to the domain name server (DNS)

 DNS stores the index and matches it with the IP

 IP is sent to the browser if it exists


 The browser sends a request to the IP of the webserver

 Browser interprets the HTML

Cookies

 Cookies are small files stored on the user’s computer

 They are used to track data about the users and autofill forms or give suggestions accordingly

 Types of Cookies -

Session Cookie Persistent Cookie

Temporary cookies are stored in the RAM till Remembers the user’s login details so the user doesn’t have to
the browser is closed. log in every time they visit a website

Stored on the hard disk on the computer until their expiry date
Doesn’t collect any information on the user
or the user deletes them

A good example is the virtual shopping basket


on e-commerce websites.

Digital Currency

 Form of payment to pay for goods and services

 A few examples are Debit/Credit Cards, Apps (Paypal, Apple Pay, Bank Transfers and many more)

 Cryptography was later introduced due to the problem in centralised banking systems.

 Cryptocurrency uses cryptography to maintain track of transactions.

 Cryptocurrency is also more secure because it uses Blockchain Network

Blockchain Network

 Blockchain Network involves several interconnected computers where the transaction data is stored

 Hacking isn’t possible here as transaction details would be sent to all the computers, and the data can’t be
changed without the consent of all the network members

How do blockchains work

Every time a transaction takes place, A block is created. The block would contain -

 Data - Name of the sender and the receiver, amount of money and more

 Hash Value - Unique value generated by an algorithm

 Previous Hash Value - Hash Value of the previous block in the chain
The first block is called the genesis block
as it doesn’t point to any previous block (Previous Hash Value - 0000)

Cyber Security

Brute Force Attack:

 Hackers try to guess your password by trying all the different combinations of letters, numbers and symbols.

 Effect:

o Hacker gets access to user’s personal data (credit cards, passwords and more)

 To remove risk:

o Use stronger passwords with more characters and symbols

Data Interception:

 This involves stealing data by tapping into a wired or a wireless transmission line

o Wardriving - The act of locating and using wireless internet connections illegally

o Packet Sniffing - Uses Packet sniffers to examine packets sent over a line; all the data collected is sent
back to the attacker

 Effect:

o It can cause a computer to crash

o Can delete or corrupt files/data

 To remove risk:

o Install anti-virus software

o Don’t use software from unknown sources

o Be careful when opening emails from unknown

Distributed Denial of Service Attacks (DDoS)

 An attempt at preventing users from accessing part of a network

 Usually temporary but may be damaging

 An attacker may be able to prevent the user from:

o Accessing their emails

o Accessing websites
o Accessing online services

Hacking

 The act of gaining illegal access to a computer system

 Effect:

o This leads to identity theft, gaining personal information

o Data can be deleted, changed or corrupted

 To remove risk:

o Firewalls

o Strong passwords/ user IDs

o Use of anti-hacking software

 Difference between hacking and cracking

o Hacking breaks into computer systems to steal data

o Cracking is when someone edits a program code, malicious

Malware

 Stands for Malicious Software. A few examples are -

o Virus - A program that can replicate itself with the intention of deleting or corrupting files, causing a
computer malfunction

o Ransomware - Attackers encrypt the user’s data until a certain amount of money is paid

o Adware - Displays unwanted ads on the user’s screen

o Trojan Horse - Programs that are disguised as legitimate software

o Spyware - Sends data about all the activities of the user to the attacker

o Worms - Programs that can replicate themselves with the intention of corrupting the entire network
instead of the computer alone

Phishing

 Attackers send legitimate-looking emails to bait the user into giving out their information.

 To remove risk:

o Don’t open links from unknown receivers

o Use anti-phishing tools

o Block pop-up ads

o Have an up-to-date browser

Pharming

 The attacker installs a malicious code on the computer, which redirects the user to fake websites

 Effect:

o The user gives out login details and other personal details
 To remove risk:

o Using anti-virus software

o Checking the spelling and the weblink carefully

o Make sure that the green padlock is present in the URL bar

Social Engineering

 Attackers create a social situation which leads to victims giving out their details (For example - Spam calls
informing them that their account has been hacked)

Keeping data safe from threats

 Access Levels - Having Different levels of access for different people (for example - Only doctors can have access
to patient’s data)

 Antivirus - Protects user’s computer from malware attacks

 Authentication - User proving who they are. The most common methods are passwords, PINs, Mobiles (OTPs),
biometrics and more)

Benefits and Drawbacks of Biometric Method

Biometric
Benefits Drawbacks
Methods

Most development methods are very


Fingerprint easy to use and require very low Intrusive as used to identify criminals, Can’t be used
Scans storage space to store the biometric if the finger gets dirty or damaged (e.g. cuts)
data.

With very high accuracy, it Impossible It is very intrusive, Takes longer to verify, Expensive to
Retina Scan
to replicate a person’s retina install and set up

Face Non-intrusive method, Relatively Can’t identify if there are any changes in the lighting,
Recognition cheaper change in age or person’s age.

Voices can be recorded and used for verification, but


Voice Non-Intrusive method, verification is low accuracy and illnesses such as colds or coughs
Recognition done quickly and relatively cheaper can affect a person’s voice, making identification
impossible.

 Two-Step Verification - Requires two methods of authentication to prove who the user is

 Automatic Software Updates - Latest updates contain patches which improve device security

 Spelling and Tone - Fake emails tend to have wrong spelling and grammar (amazonn instead of amazon), and the
tone would also seem urgent

 Firewalls - Hardware or Software which monitors the traffic between a network and the user’s computer

 Proxy Servers - Acts as an intermediate between the user’s computer and the web server. They are used for -

o Filtering Internet traffic

o Keeping the user’s IP Address Confidential


o Blocking access to certain websites

o Attacks like DDoS and Hacking attack the proxy server, keeping the web server safe.

o Acts as a firewall as well.

 Privacy Settings - Used to limit who can access and see a user’s profile

 SSL (Secure Socket Layer) - Set of rules used while communicating with other users on the internet.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy