Chapter_5_Z-Notes
Chapter_5_Z-Notes
and IP (Internet other information They are safety protocols maintained while
Web Browsers
Allows the user to Uses HTTP(S)
It is software used to connect to the internet
communicate with protocols that are
It translates the HTML code
other users via chat, written using
ensures SSL & TLS security can be established
email, calling and Hypertext Mark-up
O ers additional features like search history &
more Language (HTML)
ad blockers
URLs (Uniform Retrieval and Location of web pages
Worldwide Collection Resource Locator) Browser sends URL to the domain name
of Interconnected are used for the server (DNS)
Networks and Devices location of the web DNS stores index and matches with the IP
pages IP is sent to browser if it exists
browsers Cookies
Cookies are small les stored on the user’s
Uniform Resource Locator (URLs) computer
URLs are used to locate and access web They are used to track data about the users
pages. The typical format of URLs is - and auto ll forms or give suggestions
Usually temporary but may be damaging Spyware - Sends data about all the
The attacker may be able to prevent the user activities of the user to the attacker
The act of gaining illegal access to a computer bait the user into giving out their information.
corrupted Pharming
Stands for Malicious Software. A few examples Make sure that the green padlock is
voice, making
Most
Intrusive as identi cation
development
used to impossible.
Method are
identify
very easy to
criminals, Two-Step Veri cation - Requires two methods
Fingerprint use and
Can’t be used of authentication to prove who the user is
Scans Requires very
if the nger Automatic Software Updates - Latest updates
low storage
gets dirty or contain patches which improve device security
to store the
damaged Spelling and Tone - Fake emails tend to have
biometric
(e.g. cuts) wrong spelling and grammar (amazonn
data.
instead of Amazon), and the tone would also
person’s install and set between the user’s computer and the web
internet.