Chapter 5 Note
Chapter 5 Note
Internet:
- is the infrastructure
- massive network of networks/interconnected network of computer devices
- Internet stands for Interconnected Networks
- uses TCP/IP protocol
A URL is typed into a browser address bar using the following format:
protocol://website address/path/file name
Example of a URL:
https://www.computerhope.com/jargon.html
Here https is the protocol
www is the domain host
computerhope is the website / web server / domain name
.com is the domain type (.net, .org, .gov etc.)
Path refers to the exact location of a page but not always visible
jargon.html is the file name / web page name
and sometimes country code (.bd, .uk, .de, .cy, for example).
Another example:
https://www.hoddereducation.co.uk/ict
Web server:
- Stores web pages
- Receives requests from clients and returns requested web page
(Rendering is a process used in web development that turns website code into the interactive pages users see
when they visit a website. The term generally refers to the use of HTML, CSS, and JavaScript codes. The
process is completed by a rendering engine, the software used by a web browser to render a web page.)
How web pages are located, retrieved and displayed on a device when a user enters a URL:
• The web browser sends the URL to DNS
• DNS stores an index of URL and matching IP address
• DNS searches for URL to obtain the IP address
Page 2 of 14
• if found IP address is sent to web browser
• Web browser sends request to IP of webserver
• Webserver sends web page to web browser
• Browser renders HTML to display web pages
• If URL not found DNS returns error
DNS (Domain Name System): The domain name system (DNS) is a naming database in which internet
domain names are located and translated into Internet Protocol (IP) addresses. The domain name system
maps the name people use to locate a website to the IP address that a computer uses to locate that website.
For example, if someone types "example.com" into a web browser, a server behind the scenes maps that
name to the corresponding IP address. An IP address is similar in structure to 203.0.113.72.
Cookies:
- Small text file
- Stored by a browser
- Downloaded to a user’s computer when a website is visited // webserver sends to web browser
- Stored on a user’s computer
- Detected by the website when it is visited again
How cookies can be used to store and automatically enter a user’s payment details.
• Webserver sends (cookie) file to user’s browser
• User’s payment details stored in encrypted text file // data is encrypted to be stored
• Cookie file is stored by browser/on user’s HDD/SSD
• When user revisits website, webserver requests cookie file // webserver
• can access the data stored in the cookie file (to automatically enter details)
• and browser sends cookie file back to webserver (to automatically enter the details)
Explain why a user may be concerned about their personal data and online browsing habits being
stored in cookies.
- User does not see what information is stored // might collect data that user does not know about so,
Page 3 of 14
user may feel their privacy is affected
- A profile could be built about the user that could expose a user’s identity // lead to identity theft
- Sensitive information stored in cookies could be intercepted in transmission
- Other websites could gain access to the cookies stored on a user’s computer
- Computer could be hacked to obtain data stored in cookies so, payment information could be stolen
and used by a third party
Identify the ways that cookies can be used to enhance the user’s experience of a website.
• Storing preferences so the user does not have to select their preferences each time they visit the site
• Storing account details so the user does not have to remember/enter their username and password
each time they visit the site
• Storing recent purchases to allow the user to quickly re-order more items
• Storing the pages visited/items selected // to display relevant adverts
• Storing shopping basket so when the user leaves the site the items are still in their basket
Digital Currency:
- A currency that exists only in electronic form
- Digital currencies are often tracked using digital ledgers
- Can be a decentralised system
- Can be a centralised system
- Usually encrypted
Cryptocurrency: A form of digital currency which introduces decentralization. Some important features of
cryptocurrency are:
- Cryptocurrency uses cryptography to track transactions; it was created to address the problems
associated with the centralisation of digital currency.
- Traditional digital currencies are regulated by central banks and governments (in much the same way
as fiat currencies). This means all transactions and exchange rates are determined by these two
bodies. Cryptocurrency has no state control and all the rules are set by the cryptocurrency
community itself.
- Unlike existing digital currencies, cryptocurrency transactions are publicly available and therefore all
transactions can be tracked and the amount of money in the system is monitored.
- The cryptocurrency system works by being within a blockchain network which means it is much
more secure.
Blockchains:
- These are known as digital ledgers
- These are decentralized databases where each transaction is stored as a new set of data with a time-
stamp and is linked to the previous set of data.
- This means that transactions cannot be altered, only new transactions added, which allows the
location of the data to be traced.
Process of blockchain:
• It acts as a digital ledger by tracking each transaction
• It keeps a series of time-stamped records that cannot be altered
Whenever a new transaction takes place, all the networked computers get a copy of the transaction;
therefore, it cannot be changed without the consent of all the network members. This effectively removes the
risk of security issues such as hacking.
Prevention method:
• Two-step verification//Two-factor authentication
• Biometrics
• Firewall // Proxy-server
• Strong/complex password
• Setting a limit for login attempts
• Drop-down boxes
• Request for partial entry of password
Data interception:
- Data interception is a form of stealing data by tapping into a wired or wireless communication link.
- Interception can be carried out using a packet sniffer, which examines data packets being sent over a
network. The intercepted data is sent back to the hacker. This is a common method when wired
networks are used.
- Wi-Fi (wireless) data interception can be carried out using wardriving (or sometimes called Access
Point Mapping).
Page 5 of 14
The aims of carrying out data interception attack:
- The intent is to compromise privacy or to obtain confidential information
Prevention method:
- Use of encryption - if the data is intercepted it will be meaningless (because they do not
- have the decryption key)
- Not to use wi-fi connectivity in public places since no data encryption will exist and your data is then
open to interception by anyone within the place
Signs that a user can look out for to see if they are a victim of one of these attacks include:
- slow network performance (opening files or accessing certain websites)
- unavailability or inability to access particular websites
- large amounts of spam mail reaching the user’s email account.
Prevention method:
- Users scanning their computers with anti-malware
- setting up a firewall to restrict traffic to and from the internet server or user’s computer
- using Proxy server
- applying email filters to manage or filter out unwanted traffic or spam emails
Hacking:
- gaining illegal / unauthorised access to a computer system without the user’s permission
Prevention method:
- use of strong passwords
- use of firewalls
- encrypt data/encryption
- biometrics
- two-step verification
However, you have to understand that encryption does not stop hackers from hacking the system; it just
makes the data meaningless to the hacker
Malware:
- are pieces of software that have been written and coded with the intention of causing damage to or
stealing data from a computer or system
There are six forms of malware. They are: Virus, Worm, Trojan horse, Spyware, Adware and Ransomware.
They are discussed below:
Viruses:
- software / code that self-replicates with the intention of deleting or corrupting files, or causing a
computer to malfunction
- Viruses need active host program. The virus writes its own code into the host program. When the
program runs, the written virus program is executed first, causing infection and damage.
- Viruses are often sent as email attachments, reside on infected websites or on infected software
downloaded to the user’s computer
Prevention method:
- use of /run anti-virus (software)
- do not download software or data from unknown sources
- Firewall
Worms:
- Worms are a type of stand-alone malware / software / code that can self-replicate on a network
- It does not require user input // it can work without active host
Prevention method:
- use of /run anti-virus (software), do not download software or data from unknown sources
Trojan horse:
Page 7 of 14
- A Trojan horse is a program which is often disguised as legitimate software but with malicious
instructions embedded within it.
- Software/code that is hidden within other software // Software that is disguised as authentic software
- when downloaded/installed the other malware it contains is installed
- They need to be executed by the end user. They usually arrive as an email attachment or are
downloaded from infected website
Prevention method:
- Never download or install software from a source you don't trust completely.
- Never open an attachment or run a program sent to you in an email from someone you don't know.
- Keep all software on your computer up to date with the latest patches.
Spyware/key logger:
• Malware downloaded without the user’s knowledge
• which secretly records the user’s actions / keystrokes on the computer
• and sends logs of the actions to a third party
Prevention method:
- use of/run anti-spyware (software),
- use data entry methods such as drop-down boxes to minimise risk
- Two-step verification
- Firewall
Adware:
- Software/code that generates/displays (unwanted) adverts on a user's computer
- Some may contain spyware/other malware
- Some when clicked may link to viruses
Prevention method:
- Use antivirus software
- Perform regular updates
- Only download apps from known app stores
- Don’t click on pop-up ads
Ransomware:
- Software/code that stops a user accessing/using their computer/data by encrypting the
Page 8 of 14
data/files/computer
- A fee has to be paid to decrypt the data // A fee has to be paid to 'release' the computer/device/data
Prevention method:
- Avoid phishing email
- Make regular back-up of data so that payment of ransom can be avoided
Phishing:
• Legitimate looking email sent to user
• encourages user to click a link that directs user to a fake website
• User encouraged to enter personal details into a fake website // designed to obtain personal details
from a user
Prevention method:
- users need to be aware of new phishing scams
- it is important not to click on any email’s links unless totally certain that it is safe to do so;
- always look out for https or the green padlock symbol in the address bar
- Be very wary of pop-ups and use the browser to block them
Pharming:
- Pharming is malicious code installed on a user’s computer or on an infected website.
- The code redirects the user’s browser to a fake website without the user’s knowledge. They
manipulate the DNS server
- Unlike phishing, the user doesn’t actually need to take any action for it to be initiated.
- The creator of the malicious code can gain personal data, such as bank details, from the user. Often
the website appears to come from a trusted source and can lead to fraud and identity theft
Prevention method:
• Checking the spelling and tone of the email/website
• Checking the URL attached to a link
• Scanning a download with anti-malware
• Only downloading data / software from trusted sources
• Never providing personal details online
• Install a firewall to check if the website is valid
Social Engineering:
Page 9 of 14
- Manipulating / deceiving / tricking people to obtain data // to force them to make an error
- This form of cybercrime is where users are manipulated into behaving in a way that they would not
normally do
- The whole idea of social engineering is the exploitation of human emotion (fear, curiosity, empathy
and trust)
There are five types of Social Engineering threat that commonly exist:
Instant messaging:
- Malicious links are embedded into instant messages; for example, an important software upgrade
(relies on user’s curiosity)
Scareware:
- This is often done using a pop-up message that claims that the user’s computer is infected with a
virus; the user is told they need to download the fake anti-virus immediately (relies on user’s fear)
- for example, fake anti-virus that looks real
Emails/phishing scams:
- The user is tricked by the apparent genuineness of an email and opens a link in the email; this directs
their browser to a fake website (relies on user’s trust of well-known companies)
Baiting:
- The cybercriminal leaves a malware-infected memory stick somewhere where it can be found; the
finder picks up the memory stick and plugs it into their computer (just to see who it belongs to) and
unwittingly downloads malicious malware (relies on user curiosity)
Phone calls:
- For example, a so-called IT professional calls the user on their mobile claiming their device has been
compromised in some way; the user is advised to download some special software that allows the
cybercriminal to take over the user’s device giving them access to personal information (relies on
fear)
Anti-malware:
- The type of software that is used to find and remove malware from a computer is known as Anti-
malware
The two most common types of anti-malware are anti-virus and anti-spyware.
Anti-virus:
- Scans the computer system (for viruses)
- Has a record of known viruses
- Constantly scans documents, files and also incoming data from the internet
- They are designed to detect suspicious activity and files before they are opened or stored / warn the
user against opening the files
- If a file detected as harmful, the anti-virus will quarantine the file away from the network, preventing
it from installing or multiplying itself to other areas of the network or hard drives
Page 10 of 14
- Upon user instructions, the software will then remove and delete the offending malware or virus
- Checks data before it is downloaded and stops download if virus found/warns user may contain virus
Anti-spyware:
- Scans the computer for spyware
- Looks for typical features which are usually associated with spyware thus identifying any potential
security issue
- Anti-spyware software detects and removes spyware programs installed illegally on a user’s
computer system.
Authentication:
- process of determining whether somebody/something is who/what they claim to be
- frequently done through log on passwords/biometrics
- helps to prevent unauthorised access to data
Security token:
- Security tokens are physical devices that people use as hardware authenticators to securely access a
system
- The security token always generates a random code for every transaction
- Extra data is sent to device, pre-set by user making it more difficult for hacker to obtain it
- Data has to be entered into the same system so if attempted from a remote location, it will not be
accepted
Two-factor authentication:
- Two-factor authentication requires two methods of authentication to verify who a user is.
- The first factor is a password and the second commonly includes a text with a code sent to your
smartphone, or biometrics using your fingerprint, face, or retina etc.
- It is used predominantly when a user makes an online purchase using a credit/debit card as payment
method.
Biometrics:
- Data needed to enter is unique to individual therefore it is very difficult to replicate
- Lock out after set number of attempts
Checking the spelling and tone of communication and URL links: When emails are sent to you, there are
few actions you always need to take before opening them or activating any links in them.
- Check out the spellings in the email and in the links; professional, genuine organisations will not
send out emails which contain spelling or major grammatical errors (for example, Amazzon.com)
- Carefully check the tone used in the email message; if it is rushing you into doing something or if the
language used seems inappropriate or incorrect, then it could be a phishing email or worse.
Firewalls:
- A firewall can be either software or hardware.
- It sits between the user’s computer and an external network (for example, the internet) and filters
information in and out of the computer.
- Firewalls are the primary defense to any computer system to help protect it from hacking, malware
(viruses and spyware etc.), phishing and pharming.
Proxy servers:
- Proxy servers act as an intermediate between the user and a web server.
- This can be either software or hardware
Features of proxy-servers:
- allows internet traffic to be filtered; it is possible to block access to a website if necessary
- keeps users’ IP addresses secret which improves security
- if the internet traffic is valid, access to the web server is allowed
- if the internet traffic is invalid, access to the web server is denied
- it is possible to block requests from certain IP addresses
- prevents direct access to a web server by sitting between the user and the web server
- if an attack is launched, it hits the proxy server instead – this helps to prevent hacking, DDoS, and so
on
- used to direct invalid traffic away from web servers which gives additional protection
- by using the feature known as a cache, it is possible to speed up access to information/data from a
website; when the website is first visited, the home page is stored on the proxy server; when the user
next visits the website, it now comes from the proxy server cache instead, giving much faster access
- proxy servers can also act as firewalls.
Page 12 of 14
• Store whitelist/blacklist
• Block incoming/outgoing signals
• Both block unauthorised access
• Keep a log of traffic
• Both can be hardware or software (or both)
Privacy settings:
- Privacy settings are the controls available on web browsers, social networks and other websites that
are designed to limit who can access and see a user’s personal profile.
- Examples:
o ‘Do not track’ setting
o Allow payment method to be saved (avoid the need to key in information every time)
o Safer browsing
o Sharing of location
State how the SSL protocol secures the data for transmission
• It encrypts the data by using digital certificates
Page 13 of 14
• Once the certificate is authenticated, the transaction will begin
Page 14 of 14