Chap 5 The Internet and Its Uses Notes
Chap 5 The Internet and Its Uses Notes
Uses transmission protocols such as TCP and IP Collection of webpages and other information on
(Internet Protocols) websites
Allows the user to communicate with other users via Uses HTTP(S) protocols that are written using
chat, email, calling and more Hypertext Mark-up Language (HTML)
Worldwide Collection of Interconnected Networks URLs (Uniform Resource Locator) are used for the
and Devices location of the web pages
• URLs are used to locate and access web pages. The typical format of URLs is -
o domain type (.com, .org, .net, .gov) or sometimes country codes (.uk, .in, .cy)
• The path would usually become the file directory roots. for
example, https://www.znotes.com/computer-science
• HTTP stands for Hypertext Transfer Protocol, and HTTPS stands for Hypertext
Transfer Protocol secure
Web Browsers
• The browser sends the URL to the domain name server (DNS)
Cookies
• They are used to track data about the users and autofill forms or give suggestions
accordingly
• Types of Cookies -
Temporary cookies are stored in the RAM till Remembers the user’s login details so the user doesn’t
the browser is closed. have to log in every time they visit a website
Doesn’t collect any information on the user Stored on the hard disk on the computer until their expiry
date or the user deletes them
Digital Currency
• A few examples are Debit/Credit Cards, Apps (Paypal, Apple Pay, Bank Transfers and
many more)
Blockchain Network
• Hacking isn’t possible here as transaction details would be sent to all the
computers, and the data can’t be changed without the consent of all the network
members
Every time a transaction takes place, A block is created. The block would contain -
• Data - Name of the sender and the receiver, amount of money and more
• Previous Hash Value - Hash Value of the previous block in the chain
The first block is called the genesis block as it doesn’t point to any previous block (Previous
Hash Value - 0000)
Cyber Security
• Hackers try to guess your password by trying all the different combinations of
letters, numbers and symbols.
• Effect:
o Hacker gets access to user’s personal data (credit cards, passwords and
more)
• To remove risk:
Data Interception:
• This involves stealing data by tapping into a wired or a wireless transmission line
o Packet Sniffing - Uses Packet sniffers to examine packets sent over a line; all
the data collected is sent back to the attacker
• Effect:
• To remove risk:
o Accessing websites
Hacking
• Effect:
• To remove risk:
o Firewalls
Malware
o Virus - A program that can replicate itself with the intention of deleting or
corrupting files, causing a computer malfunction
o Spyware - Sends data about all the activities of the user to the attacker
Phishing
• Attackers send legitimate-looking emails to bait the user into giving out their
information.
• To remove risk:
Pharming
• The attacker installs a malicious code on the computer, which redirects the user to
fake websites
• Effect:
o The user gives out login details and other personal details
• To remove risk:
o Make sure that the green padlock is present in the URL bar
Social Engineering
• Attackers create a social situation which leads to victims giving out their details (For
example - Spam calls informing them that their account has been hacked)
Fingerprint Most development methods are very Intrusive as used to identify criminals, Can’t be
Scans easy to use and require very low used if the finger gets dirty or damaged (e.g. cuts)
storage space to store the biometric
data.
Retina Scan With very high accuracy, it It is very intrusive, Takes longer to verify, Expensive
Impossible to replicate a person’s to install and set up
retina
Face Non-intrusive method, Relatively Can’t identify if there are any changes in the
Recognition cheaper lighting, change in age or person’s age.
Voice Non-Intrusive method, verification is Voices can be recorded and used for verification,
Recognition done quickly and relatively cheaper but low accuracy and illnesses such as colds or
coughs can affect a person’s voice, making
identification impossible.
• Access Levels - Having Different levels of access for different people (for example -
Only doctors can have access to patient’s data)
• Authentication - User proving who they are. The most common methods are
passwords, PINs, Mobiles (OTPs), biometrics and more)
• Spelling and Tone - Fake emails tend to have wrong spelling and grammar (amazonn
instead of amazon), and the tone would also seem urgent
• Firewalls - Hardware or Software which monitors the traffic between a network and
the user’s computer
• Proxy Servers - Acts as an intermediate between the user’s computer and the web
server. They are used for -
o Attacks like DDoS and Hacking attack the proxy server, keeping the web
server safe.
• Privacy Settings - Used to limit who can access and see a user’s profile
• SSL (Secure Socket Layer) - Set of rules used while communicating with other users
on the internet.