0% found this document useful (0 votes)
11 views5 pages

Chapter_5_Z-Notes

Uploaded by

Shreya Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views5 pages

Chapter_5_Z-Notes

Uploaded by

Shreya Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

domain name (website name)

domain type (.com, .org, .net, .gov) or

The Internet sometimes country codes (.uk, .in, .cy)


The path would usually become the le
The Internet and the World directory roots. for example,

Wide Web https://www.znotes.com/computer-science


The /computer-science is the le name
World Wide Web HTTP and HTTPS
Internet
(WWW)
HTTP stands for Hypertext transfer protocol

Uses transmission Collection of and HTTPS stands for Hypertext transfer

protocols such as TCP webpages and protocol secure

and IP (Internet other information They are safety protocols maintained while

Protocols) on websites transmitting data.

Web Browsers
Allows the user to Uses HTTP(S)
It is software used to connect to the internet
communicate with protocols that are
It translates the HTML code
other users via chat, written using
ensures SSL & TLS security can be established
email, calling and Hypertext Mark-up
O ers additional features like search history &
more Language (HTML)
ad blockers
URLs (Uniform Retrieval and Location of web pages
Worldwide Collection Resource Locator) Browser sends URL to the domain name
of Interconnected are used for the server (DNS)
Networks and Devices location of the web DNS stores index and matches with the IP
pages IP is sent to browser if it exists

Web pages can be Browser sends request to IP of webserver

accessed by web Browser interprets the HTML

browsers Cookies
Cookies are small les stored on the user’s
Uniform Resource Locator (URLs) computer

URLs are used to locate and access web They are used to track data about the users

pages. The typical format of URLs is - and auto ll forms or give suggestions

protocol://website address/path/ le name


fi
accordingly

The protocol would usually be HTTP or HTTPS Types of Cookies -

The website address would contain -

domain host (www)


How do blockchains work
Session Cookie Persistent Cookie
Every time a transaction takes place, A block is
Temporary cookies Remembers the user’s
created. The block would contain -
which are stored in login in details so the
Data - Name of the sender and the
the RAM till the user doesn’t have to
receiver, amount of money and more
browser is closed. log in every time they
Hash Value - Unique value generated by
visit a website
an algorithm
Stored on the hard disk Previous Hash Value - Hash Value of the
Doesn’t collect any
on the computer until previous block in the chain
information on the
their expiry date or the
user The rst block is called the genesis block as it
user deletes them
doesn’t point to any previous block (Previous
A good example is Hash Value - 0000)
the virtual
shopping basket on
e-commerce
websites Cyber Security
Digital Currency Brute Force Attack:

Hackers try to guess your password by trying


Form of payment to pay for goods and
all the di erent combinations of letters,
services
numbers and symbols.
A few examples are Debit/Credit Cards, Apps
E ect:
(Paypal, Apple Pay, Bank Transfers and many
Hacker gets access to user’s personal data
more)
(credit cards, passwords and more)
Cryptography was later introduced due to the
To remove risk:
problem in centralised banking systems.
Use stronger passwords with more
Cryptocurrency uses cryptography to maintain
characters and symbols
track of transactions.
Data Interception:
Cryptocurrency is also more secure because it
This involves stealing data by tapping into a
uses Blockchain Network
wired or a wireless transmission line
Blockchain Network Wardriving - The act of locating and using
Blockchain Network involves several wireless internet connections illegally
interconnected computers where the Packet Sni ng - Uses Packet sni ers to
transaction data is stored examine packets sent over a line; all the
Hacking isn’t possible here as transaction data collected is sent back to the attacker
details would be sent to all the computers and E ect:
the data can’t be changed without the consent It can cause a computer to crash
of all the network members
Can delete or corrupt les/data Virus - A program that can replicate itself
To remove risk: to delete or corrupt les, causing
Install antivirus software computer malfunction
Don’t use software from unknown Ransomware - Attackers encrypt the
sources user’s data until a certain amount of
Be careful when opening emails from money is paid
unknown Adware - Displays unwanted ads on the

Distributed Denial of Service Attacks (DDoS) user’s screen

An attempt at preventing users from Trojan Horse - Programs that are

accessing part of a network disguised as legitimate software

Usually temporary but may be damaging Spyware - Sends data about all the

The attacker may be able to prevent the user activities of the user to the attacker

from: Worms - Programs that can replicate itself

Accessing their emails to corrupt the entire network instead of

Accessing websites the computer alone

Accessing online services Phishing

Hacking Attackers send legitimate-looking emails to

The act of gaining illegal access to a computer bait the user into giving out their information.

system To remove risk:

E ect: Don’t open links from unknown receivers

This leads to identity theft, gaining Use anti-phishing tools

personal information Block pop-up ads

Data can be deleted, changed or Have an up-to-date browser

corrupted Pharming

To remove risk: The attacker installs a malicious code on the

Firewalls computer, which redirects the user to fake


Strong passwords/ user IDs websites
Use of anti-hacking software E ect:
Di erence between hacking and cracking The user gives out login details and other
Hacking breaks into computer systems to personal details
steal data To remove risk:
Cracking is when someone edits a Using antivirus software

program code, malicious Checking the spelling and the weblink


Malware carefully

Stands for Malicious Software. A few examples Make sure that the green padlock is

are - present in the URL bar


Social Engineering
Attackers create a social situation which leads Biometric
Bene ts Drawbacks
to victims giving out their details (For example Methods
- Spam calls informing them that your account
Relatively in the
has been hacked)
cheaper lighting,
Keeping data safe from threats
changes in
Access Levels - Having Di erent levels of
users's age.
access for di erent people (for example - Only
Voices can be
doctors can have access to patient’s data)
recorded and
Antivirus - Protects user’s computer from
used for
malware attacks
In a non- veri cation,
Authentication - User proving who they are.
intrusive low accuracy,
The most common methods are passwords,
method, and illnesses
PINs, Mobiles (OTPs), biometrics and more) Voice
veri cation is such as cold
Bene ts and Drawbacks of Biometric Method Recognition
done quickly or cough can

Biometric and relatively a ect a


Bene ts Drawbacks
Methods cheap. person’s

voice, making
Most
Intrusive as identi cation
development
used to impossible.
Method are
identify
very easy to
criminals, Two-Step Veri cation - Requires two methods
Fingerprint use and
Can’t be used of authentication to prove who the user is
Scans Requires very
if the nger Automatic Software Updates - Latest updates
low storage
gets dirty or contain patches which improve device security
to store the
damaged Spelling and Tone - Fake emails tend to have
biometric
(e.g. cuts) wrong spelling and grammar (amazonn
data.
instead of Amazon), and the tone would also

With very It is very seem urgent

high intrusive, Firewalls - Hardware or Software which

accuracy, it Takes longer monitors the tra c between a network and

Retina Scan Impossible to to verify, the user’s computer

replicate a Expensive to Proxy Servers - Acts as an intermediate

person’s install and set between the user’s computer and the web

retina up server. They are used for -


Filtering Internet tra c
Face Non-intrusive Can’t identify
Keeping the user’s IP Address Con dential
Recognition method, if there are
Blocking access to certain websites
any changes
Attacks like DDoS and Hacking attack the
proxy server, keeping the web server safe.
Acts as a rewall as well.
fi
Privacy Settings - Used to limit who can access
and see a user’s pro le
fi
SSL (Secure Socket Layer) - Set of rules used
while communicating with other users on the

internet.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy