CH 5 Internet Quick Revision With Topicals and Marking
CH 5 Internet Quick Revision With Topicals and Marking
Page | 2
Contents
5 The internet and its uses – Quick Revision ....................................................................................................4
5.2 Digital currency, ..............................................................................................................................................7
5.3 Cyber security .................................................................................................................................................8
0a Specimen 1a Q2c) Internet - DDoS ........................................................................................................... 14
0a Specimen 1a Q9) Communication – Security ........................................................................................... 14
0a Specimen 1a Q10) Cyber Security............................................................................................................. 15
0b Specimen Paper 1b- Q4) Cyber Security................................................................................................... 15
0b Specimen Paper 1b- Q8) Crypto Currency................................................................................................ 16
1b fm23 p12 – Q1) Cyber Security................................................................................................................. 16
2a S23 qp11 Q8) Cyber Security .................................................................................................................... 19
2a s23 qp11-Q 10) Cyber Security ................................................................................................................. 20
2b s23 qp12 Q6) Internet .............................................................................................................................. 22
2b s23 qp12 Q7) Cyber Security .................................................................................................................... 23
2b s23 qp12- Q8) Hardware – Network Hardware........................................................................................ 25
3b w23 p12- Q1-Security ............................................................................................................................... 26
3b w23 p12 -Q8 Security ............................................................................................................................... 26
3b w23 p12 -Q9 Internet ............................................................................................................................... 28
3b w23 p12 -Q12 Digital Currency................................................................................................................. 29
3c W23 P13 Q4-Internet ................................................................................................................................ 29
3c W23 P13 Q6-Internet ................................................................................................................................ 30
3c w23 P13 Q8-Internet................................................................................................................................. 31
4b FM24 P12- Q4) Internet, Steps of visiting a website ................................................................................ 33
4b FM24 P12- Q5) Digital Currency ............................................................................................................... 33
5a S24 P11 Q9) Communication & Cyber Security ............................................................................................ 35
5b S24 P12 Q8) Cyber Security ......................................................................................................................... 36
5b S24 P12 Q11) Internet ................................................................................................................................. 36
5c S24 P13 – Q7) Communication & Internet .................................................................................................... 37
6b W24 P12) Q -7 Internet ................................................................................................................................ 39
6c W24 P13 Q 6) Internet .................................................................................................................................. 40
7b fm25 qp12) Q-5 Network & Internet ............................................................................................................ 41
Page | 3
Page | 4
5.1 The internet and world wide web to any other computer information, which is
anywhere in the world accessed via internet.
Q1) Describe the difference between the internet
Internet is www is a service on top
and the world wide web. infrastructure. of that infrastructure.
Ans ) The internet is the infrastructure. The world Internet is super set of www is a subset of the
www. internet.
wide web is the collection of websites and web pages Internet uses TCP & IP. WWW uses http or
accessed using the internet. https. It also uses URLs
to specify the locations
Internet WWW of websites and web
Internet is global WWW is collection of pages
network of networks web pages
Internet is a mean of World Wide Web is a
connecting a computer collection of
Page | 5
requests the server for web documents and services.
It works as a compiler to render HTML, which is used
to design a webpage.
Q 5) Explain the term ‘render’.
Rendering in HTML coding is the process of turning
Q 2) Describe the features of URL.
website code into the interactive pages users see
Ans) Uniform Resource Locator (URL):
when they visit a website.
A URL is a text-based address for a web page.
Q 6) Explain the purpose and functions of a web
Components of URL:
browser
It can contain the protocol, the domain name and the
web page/file name Ans) The main purpose of a web browser is to render
An example of a URL is: hypertext markup language (HTML) and display web
https://www.inqilabpatel.com/classwork. pages
In this example • Functions include:
a. “https” refers to protocols that enables browser – storing bookmarks and favourites
– recording user history
to know what protocol is being used to access
– allowing use of multiple tabs
information in the domain – storing cookies
b. “inqilabpatel.com” is called the domain name or – providing navigation tools
web server name. – providing an address bar
c. "classwork" refers to the file path .
Q 3) Describe the purpose of HTTP and HTTPS.
Ans) HTTP (Hyper Text Transfer Protocol), defines
the rules for websites to format and transmit web
pages.
HTTPS (Hyper Text Transfer Protocol Secure),
means communication is secure, data is
transferred defines the rules for websites to
format and transmit web pages.
2. The web browser sends the request of URL to disk; this enables the website to remember details
DNS of ISP. about the user’s interest when they next visit the
4. URL is translated into machine friendly IP Cookies are stored with the
5. The translated IP address is sent to browser. Web sites will encrypt personal
information stored in the cookie
6. Browser sends http get command to the server
to prevent unauthorized usage by
of the IP address where website is hosted.
another party with access to cookie folder.
7. The web server sends HTML data to the client
Types of Cookies:
web browser.
1 Session cookies: These are temporary cookies that
8. The browser renders html data and displays
are stored in the user's browser memory until they
web page. close their browser. They are used to maintain user
session information, such as:
1. login credentials
2. items in a shopping cart.
Persistent cookies: These cookies are stored on the
user's device even after they close their browser.
They are used to save:
3. Personal details
4. Track user prefrecences
5. Storing login details
Page | 7
Important terminology in Cyber Security: implementation and usage of any system which
Perpetrator (per·pet·ra·tor): a person that carries out stores, processes, or retrieves data.
an illegal, harmful, or immoral action. Data security is about keeping data safe. Many
Bot: a computer that has had malware downloaded individuals, small businesses and major companies
onto it that will cause it to be used in a DDoS attack. rely heavily on their computer systems.
Botnet: a network of bots that are created to carry Cyber Security Threats
out a DDoS attack. Cyber security is the application of technologies,
Zombie: a dormant or sleeping bot, currently not processes, and controls to protect systems, networks,
used in DDoS attacks. programs, devices and data from cyber-attacks.
Port: an entry point into a computer or network. It aims to reduce the risk of cyber-attacks and protect
Malware: a software, developed with intention to against the unauthorised exploitation of systems,
harm other computers. networks, and technologies.
Data Integrity and security 1. Brute-force attack: A brute-force attack is a trial
Data integrity refers to maintaining and assuring the and error method used by cybercriminals to crack
accuracy and consistency of data over its entire life- passwords or encryption codes by trying every
cycle, and is a critical aspect to the design, possible combination until the correct one is found.
Page | 9
This method is time-consuming, but it can be
effective if the password or key is weak.
2. Data interception: Data interception refers to the
unauthorized access or monitoring of data that is
being transmitted between two parties. This can
occur through various means such as eavesdropping
on a network, intercepting wireless transmissions or
through hacking into a system. Packet Sniffer is a
piece of software that is used to examine the
contents in a data packet.
9. Proxy-Servers: Proxy servers can be used to Zero login: This is a type of authentication that aims
mask the IP address of the user, preventing to remove or reduce the need for the user to
manually input their details and instead rely on the
attackers from tracking their online activity.
system to verify the user's credentials automatically.
Newer methods of zero login types of authentication
Page | 12
include the use of networks, location, device data, Smart card: Smart cards are cards that contain a chip
and human behavioral patterns to recognize users and can be used as contactless cards. They are used
automatically. for authentication purposes and can store a variety of
Biometric: Biometric authentication is a type of information such as personal identification, medical
authentication that uses the user's unique biological records, and financial information.
characteristics such as fingerprints or facial features Physical token: A physical token is a device that
to authenticate the user's details. generates a unique code that is used for
Magnetic stripe: Magnetic stripe cards are a form of authentication purposes. The user enters the code
card that stores the user's data on a magnetic strip into the system to authenticate their identity.
usually on the reverse side. The user scans the card Electronic token: An electronic token is a device that
through a reader where the details stored on the card generates a unique code that is used for
authentication purposes. The user enters the code
are compared to the details stored within the system.
into the system to authenticate their identity.
If the data from the card matches the data that is Electronic tokens can be used for a variety of
stored on the system, the user is authenticated and purposes such as online banking, accessing secure
networks, and making online purchases.
granted access .
Page | 13
Threat Risk Security measures
to crack passwords make passwords difficult to crack and
brute force attacks change them often
denial of service Flood of fake traffic, which cause use a malware checker, firewalls and
attack it to crash email filters
Six from:
• SSL is a (security) protocol.
• It encrypts any data that is sent.
• It uses/sends digital certificates …
10 6
• … which are sent to the (buyer’s/user’s) browser // requested by the (buyer’s/user’s) browser
• … that contains the gallery’s public key
• … that can be used to authenticate the gallery.
• Once the certificate is authenticated, the transaction will begin.
Computer virus
Hacking
Spyware
(b) Describe how each security solution you identified in (a) will help protect the computer.
Computer virus security solution .............................................................................................................................
Page | 16
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
Hacking security solution .........................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
Spyware security solution .......................................................................................................................................
…………………….............................................................................................................................................................
...................................................................................................................................................................................
.......................................................................................................................................................................... [6]
(a) Tick (✓) one box to show a correct definition of spyware. [1]
Page | 17
A Software that activates a webcam and transmits the video to a third party that
outputs it live on a website.
B Software that detects when a password is being entered and then emails the
password to a third party
C Software that records all data entered into a computer, analyses this data to find
email addresses and passwords, then posts these to a website.
D Software that records all key presses and transmits these to a third party.
(b) Complete the table by identifying and describing two other examples of malware. [6]
Malware Description
...........................................................................................................
...........................................................................................................
......................................
1 ...........................................................................................................
......................................
...........................................................................................................
...........................................................................................................
...........................................................................................................
...........................................................................................................
......................................
2 ...........................................................................................................
......................................
...........................................................................................................
...........................................................................................................
1(a) D 1
1(b) One mark for identification. E.g. One mark per bullet for description to 6
max two each.Virus
• Software that replicates
• Deletes/damages data/hardware // equivalent
Worm
• Software that replicates itself on a network
• Takes-up bandwidth/storage space
Trojan horse
• Software that is hidden within other software // Software that is
disguised as authentic software
• Deletes/damages data/hardware
Adware
• Software that generates/displays adverts on a user's computer
• Some may contain spyware
• Some when clicked may link to viruses
Ransomware
• Software that stops a user accessing/using their computer/data
• A fee has to be paid to 'release' the computer/device…
• …otherwise the data will be deleted
1(c) One mark for each similarity to max two. One mark for difference (both 3
sides needed unless implied)
Similarities e.g.
• Check incoming and outgoing signals
• Store white/black list // by example
• Block access to incoming signals
• Both block unauthorised access//by example
• Keep a log of traffic
Differences e.g.
• Proxy can hide user's IP address, firewall does not
• Proxy intention is to divert attack from server, firewall is to stop
unauthorised access
• Proxy protects a server/network, firewall protects
network/individual computer
• Proxy filters access from items such as websites, firewall blocks
ports
Page | 19
2a S23 qp11 Q8) Cyber Security
8 A manager at a company is concerned about a brute‑force attack on its employee user accounts.
(a) Describe how a brute‑force attack can be used to gain access to the employee user accounts.
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
................................................................................................................................................................ [3]
(b) One possible aim for carrying out a brute‑force attack is to install malware onto the company network.
(i) State two other aims for carrying out a brute‑force attack to gain access to the employee user accounts.
1 ...............................................................................................................................................................................
..................................................................................................................................................................................
2 ...............................................................................................................................................................................
............................................................................................................................................................................. [2]
(ii) Identify three types of malware that could be installed.
1 ..............................................................................................................................................................................
2 ..............................................................................................................................................................................
3 ......................................................................................................................................................................... [3]
(c) Give two security solutions that could be used to help prevent a brute‑force attack being successful.
1 ..............................................................................................................................................................................
................................................................................................................................................................................
2 .............................................................................................................................................................................
..........................................................................................................................................................................[2]
(c) The student uses a web browser to access data on the internet.
Explain the purpose of the web browser.
…………………………………………………………………………......................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
............................................................................................................................ [2]
(d) Storing cookies is one function of the web browser.
Give three other functions of the web browser.
Page | 21
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
................................................................................................................................................... [3]
(e) A student visits a website that uses session cookies, instead of persistent cookies.
Explain the difference between session cookies and persistent cookies.
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
................................................................................................ [4]
10(a) 1
To obtain personal data/details // by example
10(b) One mark for each correct part of the diagram. 4
Diagram shows:
• User clicks/opens attachment/link that triggers download
• Malicious software downloaded onto user's computer
• User enters website address
• User is redirected to fake website
e.g.
User types in
web address
User
Real
computer
website
malware
Fake
Request website
gets
User clicks link that redirected
downloads malware
to computer
Page | 22
10(c) Two from: 2
Displays web pages
… by rendering HTML
10(d) Any three from: e.g 3
• Storing bookmarks/favourites
• Recording user history
• Allowing use of multiple tabs
• Providing navigation tools // by example
• Providing an address bar
• Managing protocols // by example // checking digital certificate Send URL
to DNS
• Sends a request to the IP address/web server (to obtain the contents of a
webpage)
• Runs active script/JavaScript/client-side script
• Allows files to be downloaded from website/internet
10(e) Any four from: 4
• Session cookies are stored in memory/RAM
• … whereas persistent cookies are stored on the hard drive/secondary storage
• When the browser is closed a session cookie is lost
• … whereas a persistent cookie is not lost
• … until deleted by the user/they expire
(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.
1............................................................................................................................................................................
..............................................................................................................................................................................
2 ............................................................................................................................................................................
…………………….................................................................................................................................................... [2]
Page | 24
7(a) One mark for each part of the diagram (MAX six). 6
The diagram demonstrates:
• Malware downloaded to several computers
• … turning it into a bot/zombie
• … creating a network of bots/zombies
• Third party/hacker initiating the attack
• Bots send requests to a web server at the same time
• The web server fails due to the requests
• Legitimate requests cannot reach the web server
C Router
D Web server
8(a) C 1
(b) Identify one other example of malware than those given in part 1(a).
............................................................................................................................................. [1]
(c) Identify the type of software that is used to find and remove malware from a computer.
............................................................................................................................................. [1]
1(a) − A 1
1(b) Any 1
one from:
− Spyware // Keylogger
− Adware
− Trojan horse
1(c) − Anti-malware 1
(b) Identify one security solution that will help keep data safe from data interception and state why it will help
keep the data safe.
...................................................................................................................................................................................
...................................................................................................................................................................................
............................................................................................................................................................................. [2]
Page | 27
8(a) The diagram demonstrates (One mark for each part of the diagram): 4
− Data is being sent from one device to another
− The data is being examined during transmission
Packet sniffer is used
−
Intercepted data is reported to a third-party during transmission …
− … and analysed for anything useful
− Connection hacked to spoof destination address
−
e.g.
8(b) − 2
Encryption …
− … if the data is intercepted it will be meaningless (because they do not
have the decryption key)
Page | 28
3b w23 p12 -Q9 Internet
9 The table contains terms and descriptions about the internet. [6]
Complete the table with the missing terms and descriptions.
Term Description
a small text file, stored by the web browser, that can store a
.................................................. user’s personal data
...........................................................................................
uniform resource locator (URL)
...........................................................................................
...........................................................................................
...........................................................................................
web server
...........................................................................................
...........................................................................................
9 www
Cookie
the text-based address for a website // It is made up of the protocol, domain name and
filename/folder name
Stores web pages // receives requests from clients and returns requested web page
html
https // https
Page | 29
3b w23 p12 -Q12 Digital Currency
12 Digital currency can be used to pay for products and services.
Digital currencies are often tracked using digital ledgers.
(a) Give two other features of digital currency.
1.................................................................................................................................................................................
..................................................................................................................
2.................................................................................................................................................................................
.................................................................................................................. [2]
(b) Identify the process that uses a digital ledger to track the use of digital currency.
............................................................................................................................................. [1]
A digital currency does not exist ..........................................................., it can only be accessed electronically.
Page | 34
Some digital currencies have digital ledgers called ............................................................
These are decentralised databases where each transaction is stored as a new set of data with a
........................................................... and is linked to the previous set of data. This means that
transactions cannot be altered, only new transactions added, which allows the location of the data to be
............................................................ [4]
Page | 35
− Virus
− Worm
− Trojan horse
− Spyware
− Adware
− Ransomware
Page | 36
5b S24 P12 Q8) Cyber Security
8 A company has a website that is suffering a distributed denial of service (DDoS) attack.
(a) Draw and annotate a diagram to show the process of the DDoS. [5]
(b) Identify a solution that can be used to help prevent the DDoS attack being successful.
............................................................................................................................................. [1]
8(a) One mark for each part of the diagram that shows: 5
− A perpetrator
− A webserver
− Malware sent to multiple computers
− Computer is turned into a bot
− Many bots are created to form a botnet
− All the bots send a request at once to the webserver
11(b) − Protocol 3
− Domain name
− File name / web page name
− DDoS // DoS
− Hacking
− Malware // By example
− Brute-force attack
− It can limit the number of requests sent to the web server at a time
− It can act as a firewall
− It can examine incoming data to the webserver
− It can have set rules/criteria for traffic to meet
− It can have a blacklist of IP addresses to block
− The users type the URL into the address bar/web browser
− The web browser sends the URL to the DNS
− The DNS searches for the match IP address
− The DNS returns the IP address to the web browser
− The web browser sends a request to the IP address
− The web server sends the data for the web page to the web browser
− The web browser renders the HTML data to display the web page
Page | 39
6b W24 P12) Q -7 Internet
7 A student enters the uniform resource locator (URL) for a web page into their tablet computer.
(a) State what is meant by a URL.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Identify two different parts of a URL.
1................................................................................................................................................
2............................................................................................................................................... [2]
(c) The student enters the URL into a piece of software that then displays the web page.
Identify the name of this software.
............................................................................................................................................. [1]
(d) Draw and annotate a diagram to show how the web page is located and retrieved to be displayed on the
student’s tablet computer. [5]
(e) The data for the web page is transmitted using the secure socket layer (SSL) protocol.
Complete the paragraph about the SSL protocol. Use only terms from the list.
Not all terms need to be used. Some terms may be used more than once.
encrypted file server hypertext markup language (HTML)
hypertext transfer protocol (HTTP) operating system search engine
unencrypted URL web browser web server
The .............................................................. asks the .............................................................. to identify itself.
The .................................................................. sends back its digital certificate. The
............................................... authenticates the digital certificate. If it is authentic,
.......................................................... data transmission begins. [5]
Page | 40
6(a) 7
One mark for each correct term in the correct order:
• web browser
• session
• temporary
• web browser // session
• persistent
• permanent
• expire
For example:
(ii) Identify the device in a network that can automatically assign an IP address to a computer, each time the
computer connects to the network.
........................................................................................................................................................................ [1]
(c) A user accesses the world wide web using a web browser.
(i) Define the term world wide web.
...................................................................................................................................................................................
.............................................................................................................................................................................. [1]
(ii) The uniform resource locator (URL) for a website includes the protocol hypertext transfer protocol secure
(HTTPS). Explain how HTTPS makes the transmission of data secure.
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
............................................................................................................................................................................. [4]
(iii) The protocol is one part of a URL.
Give the other two parts of a URL.
1…………………………………………………….........................................................................................................................
............................................................................................................................................................
2.................................................................................................................................................................................
.......................................................................................................................................................................... [2]
Page | 43
5(a)(i) 1 mark each to max 2 2
• Receive data from the network…
• … and convert it to be understood by the computer
• Convert data from the computer to a form to be transmitted over the network
• To allow a physical connection between a computer and a network
5(b)(i) C 1
5(b)(ii) Router 1