Computer Internet
Computer Internet
Uses transmission protocols such as TCP and IP (Internet Collection of webpages and other information on
Protocols) websites
Allows the user to communicate with other users via Uses HTTP(S) protocols that are written using Hypertext
chat, email, calling and more Mark-up Language (HTML)
Worldwide Collection of Interconnected Networks and URLs (Uniform Resource Locator) are used for the
Devices location of the web pages
URLs are used to locate and access web pages. The typical format of URLs is -
o domain type (.com, .org, .net, .gov) or sometimes country codes (.uk, .in, .cy)
The path would usually become the file directory roots. for example, https://www.znotes.com/computer-science
HTTP stands for Hypertext Transfer Protocol, and HTTPS stands for Hypertext Transfer Protocol secure
Web Browsers
The browser sends the URL to the domain name server (DNS)
Cookies
They are used to track data about the users and autofill forms or give suggestions accordingly
Types of Cookies -
Temporary cookies are stored in the RAM till Remembers the user’s login details so the user doesn’t have to
the browser is closed. log in every time they visit a website
Stored on the hard disk on the computer until their expiry date
Doesn’t collect any information on the user
or the user deletes them
Digital Currency
A few examples are Debit/Credit Cards, Apps (Paypal, Apple Pay, Bank Transfers and many more)
Cryptography was later introduced due to the problem in centralised banking systems.
Blockchain Network
Blockchain Network involves several interconnected computers where the transaction data is stored
Hacking isn’t possible here as transaction details would be sent to all the computers, and the data can’t be
changed without the consent of all the network members
Every time a transaction takes place, A block is created. The block would contain -
Data - Name of the sender and the receiver, amount of money and more
Previous Hash Value - Hash Value of the previous block in the chain
The first block is called the genesis block
as it doesn’t point to any previous block (Previous Hash Value - 0000)
Cyber Security
Hackers try to guess your password by trying all the different combinations of letters, numbers and symbols.
Effect:
o Hacker gets access to user’s personal data (credit cards, passwords and more)
To remove risk:
Data Interception:
This involves stealing data by tapping into a wired or a wireless transmission line
o Wardriving - The act of locating and using wireless internet connections illegally
o Packet Sniffing - Uses Packet sniffers to examine packets sent over a line; all the data collected is sent
back to the attacker
Effect:
To remove risk:
o Accessing websites
o Accessing online services
Hacking
Effect:
To remove risk:
o Firewalls
Malware
o Virus - A program that can replicate itself with the intention of deleting or corrupting files, causing a
computer malfunction
o Ransomware - Attackers encrypt the user’s data until a certain amount of money is paid
o Spyware - Sends data about all the activities of the user to the attacker
o Worms - Programs that can replicate themselves with the intention of corrupting the entire network
instead of the computer alone
Phishing
Attackers send legitimate-looking emails to bait the user into giving out their information.
To remove risk:
Pharming
The attacker installs a malicious code on the computer, which redirects the user to fake websites
Effect:
o The user gives out login details and other personal details
To remove risk:
o Make sure that the green padlock is present in the URL bar
Social Engineering
Attackers create a social situation which leads to victims giving out their details (For example - Spam calls
informing them that their account has been hacked)
Access Levels - Having Different levels of access for different people (for example - Only doctors can have access
to patient’s data)
Authentication - User proving who they are. The most common methods are passwords, PINs, Mobiles (OTPs),
biometrics and more)
Biometric
Benefits Drawbacks
Methods
With very high accuracy, it Impossible It is very intrusive, Takes longer to verify, Expensive to
Retina Scan
to replicate a person’s retina install and set up
Face Non-intrusive method, Relatively Can’t identify if there are any changes in the lighting,
Recognition cheaper change in age or person’s age.
Two-Step Verification - Requires two methods of authentication to prove who the user is
Automatic Software Updates - Latest updates contain patches which improve device security
Spelling and Tone - Fake emails tend to have wrong spelling and grammar (amazonn instead of amazon), and the
tone would also seem urgent
Firewalls - Hardware or Software which monitors the traffic between a network and the user’s computer
Proxy Servers - Acts as an intermediate between the user’s computer and the web server. They are used for -
o Attacks like DDoS and Hacking attack the proxy server, keeping the web server safe.
Privacy Settings - Used to limit who can access and see a user’s profile
SSL (Secure Socket Layer) - Set of rules used while communicating with other users on the internet.