Computers Chapter 5
Computers Chapter 5
Computers: Chapter 5
5.1 The internet and world wide web
The internet and the world wide web are not the same thing. The internet is an infrastructure
consisting of components and cables connecting devices, and a large network called a wide
area network (WAN). It connects homes and businesses worldwide, serving millions of
people. The internet and the world wide web are not the same thing. The internet is an
infrastructure consisting of components and cables connecting devices, and a large network
called a wide area network (WAN). It connects homes and businesses worldwide, serving
millions of people.
Computers: Chapter 5 1
The DNS stores all domain names and their equivalent IP addresses, and if it doesn't find the
domain name, it sends it to the next DNS. If the domain name isn't found, a message is sent
back to the web browser, indicating that the website is not found. The web browser then sends
a request to the web server, using the hypertext transfer protocol (HT TP). Each web page is
created using HTML, CSS, and active scripts, and the server sends the data back to the web
browser.
HTTPS is a protocol used for requesting data for web pages that requires an additional
process. It uses an additional layer of security, encrypting data using digital certificates.
Website owners need to apply for a digital certificate from a certificate authority, which
checks a website's authenticity. If the certificate authority believes the website is authentic,
they issue a digital certificate.
Before sending a request to the web server, the web browser requests a digital certificate from
the server. The server sends a copy of the digital certificate to the web browser, which checks
if the certificate is authentic. If it is, the web browser allows communication to continue and
the data is encrypted. If the certificate is not authentic, the website is not secure. To check a
website's security, check if it uses HTTPS, see a padlock at the start of the URL, and view the
digital certificate by right-clicking on the padlock.
Computers: Chapter 5 2
stored by the browser. There are two main types of cookies: session cookies and persistent
cookies.
Session cookies are temporary files created when a user visits a web page and are deleted
when the browser is closed. They are useful for online shopping, as they allow users to add
items to their cart and then return to the same page at a later time.
Persistent cookies are permanent files created when a user visits a web page and are stored on
the user's computer's hard drive. When the user visits the same page again, the cookie file is
sent back to the web server to provide personal details or preferences. These cookies remain
stored until manually deleted or the browser deletes them due to expiration.
Internet users have mixed opinions on cookies, as they can be useful but also potentially
harmful. Some believe cookies invade privacy, while others believe they can increase identity
theft risk. To mitigate these concerns, users can adjust web browser settings.
Blockchain is a system used to track payments, consisting of a digital ledger with records
added each time a payment is made. The ledger contains a digital signature with the time and
date of the payment, and the data stored in the ledger is encrypted to prevent anyone from
changing it. However, anyone who wants to view the data can do so.
In summary, digital currency is a secure and efficient method of payment that differs from
traditional bank systems. It allows for the automatic entry of payment details and is stored
securely in a persistent cookie.
Computers: Chapter 5 3
Despite the challenges, having security solutions can significantly increase the risk of
personal data being exposed to cyber threats.
Cyber threats:
•Data interception is a common issue on the internet, where criminals intercept data packets
to use it for identity theft and fraud. This is often done using software called packet sniffers
installed on routers. Encryption is the main security solution to keep data secure, typically
using SSL protocol. Encrypting data before transmission ensures that it is meaningless to
anyone who tries to read it. To check if a website uses HTTPS, check if the URL uses
HTTPS, and set your web browser to only connect to websites that use encryption.
•Distributed Denial of Service (DDoS) attack involves creating a botnet by sending malware
to multiple computers, causing them to download the malware and use it as a bot. These bots,
called zombies, send multiple requests to a web server, flooding it with too many requests.
This causes the server to slow down and crash, preventing users from accessing the website.
DDoS attacks can target other server and network hardware, making them a common form of
cyberattack. DDoS attacks can occur for various reasons, including a demand for payment or
revenge or activism. To prevent DDoS attacks, companies can use a proxy server as a security
Computers: Chapter 5 4
solution. A proxy server acts as a barrier, allowing requests to pass through first, examining
each request and forwarding it to the web server. If many requests are received, the server can
allow them to pass at a slower rate to avoid flooding the web server. Caching is another
security feature that prevents DDoS attacks from being successful. Once a request is received,
the proxy server stops repeated requests from the same IP address, making it more difficult
for a bot to flood the server. Users can prevent their computers from being used as bots in
DDoS attacks by regularly scanning their computers with anti-malware software. This
software scans all files in a computer to detect any known malware and puts them in a
quarantine area. If a file matches, the software informs the user and asks if they want to delete
it. Regular scanning ensures that a computer is free from any malware that could be used to
turn it into a bot in a DDoS attack.
•Hacking is the act of gaining unauthorized access to data by a hacker using technical skills
such as brute-force attacks or exploiting vulnerabilities in a computer or network. Hackers
can gain access for various reasons, such as identity theft, revenge, data corruption, leakage
of confidential information, or activism. To prevent computer hacking, it is essential to have
multiple security solutions in place, such as firewalls, which act as a barrier between data and
the network. Firewalls can be software-based or hardware-based, and can be set to accept or
reject data based on criteria. They can also close certain ports to prevent hackers from
exploiting open ports. Outdated software can also be exploited by hackers. Software
companies often develop updates to protect against hackers, so regular software updates are
crucial. Setting software to automatically update ensures that your computer downloads
updates automatically. Password protection with strong or biometric passwords and two-step
verification can also help prevent hackers from gaining unauthorised access to your data.
Overall, having a strong security system in place can help protect your computer from
hacking.
•Malware refers to malicious software designed to disrupt your computer or data. There are
several types of malware, including:
•Viruses are downloaded onto your hard drive and replicate, corrupting your stored data or
using up memory.
•Worms replicate, aiming to find vulnerability holes in networks to slow down the network.
•Spyware, such as keyloggers, records your actions on your computer and sends this data to
the perpetrator for analysis.
•Trojan horses disguise other malware, disguised as harmless software, and release other
malware once downloaded.
Computers: Chapter 5 5
•Adware automatically creates pop-up and banner ads, often causing frustration and money
for the creators.
•Ransomware encrypts your data and prevents you from accessing it. The creators demand a
ransom, often demanding a set amount of money, and may threaten to release and leak all
your stored data if not paid.
Understanding these types of malware is crucial for protecting your computer and data. To
protect against malware, use various security solutions. Anti-virus software scans your
computer for viruses by comparing files against a known list of viruses. If a match is found, it
puts it in a quarantine area and asks you to delete the file. Regularly updating your anti-virus
software is crucial as perpetrators constantly develop new viruses. Anti-malware software can
scan for other types of malware, such as worms, spyware, adware, and ransomware. Anti-
spyware is a specific type of anti-malware. A firewall can prevent malware from being
downloaded onto your computer by examining both incoming and outgoing data. It may
recognize a malicious program trying to leave your computer, preventing it from being sent to
the perpetrator for analysis.
Be cautious when downloading software online, as malware can be hidden in seemingly
innocent links or games. Only download from trusted sources and store a backup of your data
to protect against damage or ransomware. Encrypt your data if necessary to prevent
unauthorized access. Use an onscreen virtual keyboard to enter passwords, as key presses
aren't recorded for the password. Some companies also offer drop-down boxes or random
characters to input passwords, preventing full passwords from being sent to the perpetrator.
Avoid keeping personal data on your computer that could be accessed and leaked by
ransomware perpetrators.
•Pharming is a scam where attackers steal personal data via redirecting a request, such as
usernames and passwords, from online accounts. They can then use these data to commit
identity theft and fraud. The attackers will entice users to click on links or icons to start
downloads, downloading malicious software onto their hard drive. This software redirects
website requests to fake websites, posing as genuine websites like PayPal or social media
pages. If the fake website appears, users should change their password immediately. Anti-
malware software can help remove the malicious code, quarantine the file, and redirect users
to the genuine website. To prevent pharming, users should only download software or click
links from trusted sources and thoroughly check websites before entering personal details. If
unsure, close the website without entering any details and scan their computer with anti-
malware software.
Computers: Chapter 5 6
•Phishing is a scam where attackers steal personal data via fake websites etc, such as
usernames and passwords, from online accounts. They then use these data to make fraudulent
purchases and steal personal details, such as addresses, for identity theft and fraud. The
attacker then sends a fake email claiming to be from a genuine company, such as your bank,
to entice the user to click a link to a fake website. The link takes the user to a website that
looks like the genuine one, where they can input personal details to be sent to the perpetrator.
To avoid phishing scams, check the spelling, tone, professional tone, URL, security, and
appearance of the website. Most companies do not ask for personal details over the internet,
so if you are unsure about the website's authenticity, close it without entering any
information. If you suspect a phishing scam, change your password immediately.
Computers: Chapter 5 7