chapter 5 internet and its uses
chapter 5 internet and its uses
The word "internet" comes from "INTERconnected Network." It's a huge global system
of linked networks. It uses real infrastructure to connect networks and devices around
the world.
World Wide Web
The World Wide Web (WWW) is a part of the internet you can reach with a web browser.
It's like a big collection of connected web pages. It works using something called HTTP,
which helps show information on the web. So, the WWW lets you find and view
information on web pages through the internet. In short, the Internet is a big network of
networks, while the World Wide Web is a part of the Internet that helps you look at web
pages. The internet is broader, including more than just the web. The World Wide Web
focuses on getting and showing information using web browsers.
Web browser
Web browser are software applications that enable users to access and view web
pages on their devices. When a user requests a web page, the browser receives the
hypertext markup language (HTML) code from the website and interprets it to display
Page 1 of 31
the content on the user’s screen. To access a specific website, users enter a Uniform
Resource Locator (URL) into the browser's address bar. A URL follows a specific
format:
The protocol is typically either "http" or "https," which stands for Hypertext Transfer
Protocol and Hypertext Transfer Protocol Secure, respectively. It determines how data
is transmitted between the browser and the website.
• Domain host (often "www"): This indicates the specific server where the website
is hosted.
• Domain type: It represents the top-level domain (TLD), which can be ".com,"
".org," ".net," ".gov," or others, indicating the nature or purpose of the website.
• Country code (optional): Some websites include a country code as part of their
domain, like ".uk" for the United Kingdom, ".de" for Germany, or ".cy" for Cyprus.
The path refers to the specific location or directory within the website where the desired
web page is located. If the path is omitted, the browser assumes it as the root directory
of the website. The file name is the specific item or resource within the web page that the
user wants to access. In the provided example,
https://www.hoddereducation.co.uk/ict
The "ict" at the end represents a file or a section within the web page related to information
and communication technology. By understanding the structure of a URL, users can
navigate and access different websites and specific web pages using web browsers.
Page 2 of 31
Web Browsers
Web browsers are programs that show web pages on your device. They read website
code and show the result with videos, pictures, words, and sound. Browsers usually have:
• Home page: A page that opens when the browser starts or a new tab is made.
• History: Browsers remember websites you've visited, so you can go back to them.
• Moving around: You can go backward and forward on websites you opened.
• Tabs: You can open many pages at once and switch between them.
• Cookies: Browsers use cookies, small files on your device, to remember things or watch
what you do on websites.
• Links: Browsers use links to go to different websites. You can open links in a new
tab by pressing "Ctrl" and clicking, or in the same tab by clicking.
HTML (Hyper Text Markup Language) is a way to show things on web browsers. Websites
use HTML and are on web servers, each with its special IP address. When your browser
wants a web page, it needs the website's IP address. The Domain Name Server (DNS)
helps here. It turns the website's name into its IP address. DNS uses lots of servers.
These servers keep lists of URLs and their matching IP addresses. Here's how DNS
works:
Here, DNS server 2 found the IP address in the DNS process. This makes it easy to visit
websites using names, without memorizing numbers.
Page 3 of 31
Cookies
Cookies are small files or snippets of code that are stored on a user's computer. They are
sent from a web server to the user's browser. When a user visits a website, the site checks
if it has previously set cookies on their browser. If cookies are found, the browser reads
them to retrieve key information about the user's preferences, language, currency, and
past browsing activity.
Cookies serve several purposes. They enable user tracking, allowing websites to
recognize and remember individual users. Cookies can store data related to a user's
preferences, enabling personalized experiences. For example, if a user purchases a book
online, cookies can remember the type of book selected. Subsequently, the website can
display recommendations like "Customers who bought Hodder IGCSE ICT also bought
Hodder IGCSE Computer Science."
Session Cookies
Session cookies are like temporary helpers. They're here just while you're on a website.
Once you close your browser or leave the site, these cookies usually disappear. They're
handy to keep things smooth and special for your visit. Imagine them as the virtual
shopping basket during online shopping. They're temporary and don't get your personal
information. They stay in your computer's temporary memory and vanish when you close
your browser or leave the site.
Persistent Cookies
Persistent cookies, also called permanent cookies, stay longer. The website sets a date
for them to say goodbye. They stay even if you close your browser. They remember stuff
across different visits, so sites know what you like. They help keep things the same every
time the website is visited. Both session and persistent cookies make your online
experience better. In short, session cookies are short-term helpers, and persistent
cookies stay around for longer. Both make your online experience better, but they also
track what you do online.
Both session and persistent cookies play a role in enhancing user experience, enabling
personalization, and facilitating website functionality. However, it's important to note that
cookies also raise privacy concerns as they track user data. Privacy regulations and
browser settings often allow users to control cookie acceptance and deletion to safeguard
their privacy.
Page 4 of 31
countries have implemented laws to protect users, and these cookies are generally
designed to expire after six months, even if the specified expiration date has not yet been
reached.
• Acting as a form of memory for websites, enabling them to recognize and identify users
each time they visit.
• Storing users' items in a virtual shopping basket or cart for seamless shopping
experiences.
• Personalizing advertising by targeting users with ads that align with their past browsing
and purchasing behaviors.
• Assisting social networking sites in recognizing user preferences and browsing histories.
• Enabling automatic language selection on web pages based on users' login information.
Digital currency
Cryptocurrency is a kind of digital money that solves problems linked to central control.
Unlike regular digital money managed by banks and governments, cryptocurrency works
without a central authority. It uses special codes to track transactions.
• People in the community, not big organizations, decide how transactions happen and
worth of the money.
• Cryptocurrency uses something called a blockchain. This makes things more secure
and cuts the chance of cheating.
Page 5 of 31
Blockchain
Blockchain is like a big, shared database. It stores transactions from lots of people in a
network. Many computers are part of this network, and there's no boss computer. All the
transaction details are on each computer. Changes can only happen when everyone in
the network agrees. This makes things really secure and stops hacking.
When a new transaction occurs in a blockchain, a new block is created. Each block
contains the following components:
Data: Information about the transaction, such as the names of the sender and recipient,
the amount of money transferred, and other relevant details.
Hash Value: A unique value generated by a cryptographic algorithm (typically SHA 256)
that acts as a digital fingerprint for the block. The hash value ensures the integrity of the
block's data.
Previous Hash Value: This references the hash value of the previous block in the chain,
creating a link between blocks and forming a sequential chain.
The creation of a new block triggers the generation of a new hash value, which includes
a timestamp indicating the time of the event. As blocks are connected, they form a chain
structure. To maintain the security and integrity of the blockchain, any changes to a block
will alter its hash value. If a modification occurs in block '2', for example, the hash value
will change, rendering subsequent blocks (e.g., '3' and beyond) invalid due to the broken
chain.
Proof-of-work slows down the block creation process, making it difficult for hackers to
recreate the chain quickly. It also ensures that the currency within the blockchain is
regulated by all network computers. Consequently, attempting to hack the blockchain
would require attacking every block simultaneously, making it highly impractical.
When a new block is created, it is propagated to all computers in the blockchain network.
Before being added to the blockchain, the block is checked for correctness. Additionally,
Page 6 of 31
new network participants receive a copy of the entire blockchain system to maintain
consistency and transparency across the network.
Cybersecurity overview
Cybersecurity threats pose risks to the security and integrity of data. Whether it's personal
or commercial information, protecting data is crucial. Various cyber threats exist,
including:
Brute force attacks are a simple trick where hackers try all possible combinations of
letters, numbers, and symbols to figure out a password. But there are ways to make it
harder for them:
1. Checking Common Passwords: Hackers start by trying really common passwords like
"123456," "password," "qwerty," and others. These are easy to guess because lots of
people use them.
2. Using Word Lists: If a password isn't common, hackers use a word list. This is a list of
words they try one after the other. Some lists have millions of words. It's faster than
guessing randomly.
But here's the thing: longer and tougher passwords are much harder to crack. If you use
big and small letters, numbers, and symbols together, and if your password is long, it's
way trickier for hackers to guess.
Page 7 of 31
Also, remember to use different strong passwords for different accounts. Extra safety stuff
like two-factor authentication helps too. Changing your passwords regularly and avoiding
easy-to-guess things is also important. In short, strong and unique passwords plus smart
security steps stop brute force attacks in their tracks.
Data interception
Data interception means sneaking into data when it's moving through wired or wireless
connections without permission. The goal is to steal private or secret stuff. There are
different ways to do this:
· Packet Sniffing: This uses a tool to catch and look at data packets going on a network.
Hackers can find important things in these packets.
· Wardriving: This involves driving around with a laptop, smartphone, antenna, and
GPS to find Wi-Fi signals. Hackers use this to grab Wi-Fi data and find out personal things
without you knowing.
· Encryption: is like a shield against data interception. It can't stop data from being
caught, but it makes the data unreadable without the right key. To beat wardriving, use
encryption like wired equivalency privacy (WEP) and firewalls. And use strong passwords
for Wi-Fi routers.
Remember, public Wi-Fi networks, like ones in airports, might not be safe. They often
don't use strong protection. Connecting to unsecured public networks lets anyone nearby
grab your data. To stay safe, use secure networks and keep an eye out for sneaky tricks.
• User can't check emails: Hackers send lots of spam emails to an account. This fills it
up and stops real emails from coming in.
• User can't visit websites: Hackers send so many requests to a website that it can't work
properly. This makes it impossible to use the site.
• User can't use online services (like banking): Hackers mess up online services so users
can't use them.
Page 8 of 31
One way to do a DoS attack is by flooding the network with too much traffic, called spam
traffic. This makes it hard for the server to handle real requests, causing a service denial.
In Distributed Denial of Service (DDoS) attacks, many computers send spam traffic,
making it tough to stop.
• Use good malware checkers: Keep these updated to stop bad stuff that leads to DoS
attacks.
• Set up firewalls: Use firewalls to control traffic to and from servers or computers,
stopping bad requests.
• Apply email filters: Filters stop unwanted traffic, like spam emails, which helps avoid
email accounts getting overwhelmed.
• Network gets slow: Files and websites take longer to open due to too much traffic.
• Certain websites are down: Some sites won't work because of a DoS attack.
• Lots of spam: Suddenly, you get a lot of spam emails, which might mean a DoS attack
is happening.
Hacking
Hacking is when someone gets into a computer system or network without permission.
They might want to steal info, pretend to be someone else, mess up data, or send info to
the wrong people. Encryption can't fully stop hacking. It makes data confusing for
hackers, but it doesn't prevent them from doing other bad things, like deleting or ruining
data.
• Strong passwords: Use unique usernames and change strong passwords often. This
prevents unauthorized access.
• Anti-hacking software: This helps spot and stop hacking tries by finding and blocking
weird stuff.
Page 9 of 31
• Intrusion detection software: This watches network traffic and finds possible hacks or
security problems.
Also, ethical hacking is a real thing. Authorized hackers, hired by companies, test
computer systems to find weak points. It's a good way to check and improve security. But
remember, there's a big difference between authorized ethical hacking and harmful
hacking. One is legal and helpful, while the other is illegal and dangerous.
Malware
Malware is one of the biggest risks to the integrity and security of data on a computer
system. There are many forms of malware like:
Virus
Viruses are malicious programs or segments of code designed to replicate themselves
and cause harm to computer systems. Their primary goal is to delete or corrupt files,
disrupt normal system functioning, or perform unauthorized actions. In order to execute
and cause damage, viruses require an active host program or an already infected
operating system.
Viruses are commonly spread through email attachments, infected websites, or bundled
with pirated or compromised software downloads.
a) Exercise caution with email attachments: Avoid opening email attachments from
unknown or suspicious sources, as they can contain virus-infected files.
c) Use original software: Avoid using pirated or unauthorized software, as they are more
likely to be infected with viruses. Obtain software from trusted sources and verify its
authenticity.
d) Employ up-to-date virus scanners: Install reputable antivirus software and keep it up
to date. Regularly scan your computer for viruses and ensure that the antivirus software
has the latest virus definitions.
By following these guidelines and maintaining an up-to-date virus scanner, you can
reduce the risk of virus infections and protect your computer system from potential harm.
Page 10 of 31
Worms
Worms are a type of malware that can self-replicate and spread across computer
networks. Unlike viruses, worms do not require an active host program to initiate their
replication process or cause damage. They can move throughout networks by exploiting
security vulnerabilities.
Worms do not target specific files on a computer but rely on network vulnerabilities to
spread. They can arrive as email attachments and, if opened by a single user, can quickly
infect an entire network. Therefore, similar precautions should be taken as with viruses,
such as being cautious with email attachments and using up-to-date antivirus software.
Worms pose a distinct threat due to their capacity for autonomous propagation, unlike
viruses that rely on user engagement to trigger replication. This renders worms
particularly hazardous as they swiftly infiltrate and disturb expansive networks. The
infamous 'I Love You' worm serves as a prominent illustration, impacting numerous email
recipients globally and causing extensive turmoil, including communication system
congestion and television network outages. Defending against worms necessitates the
adoption of protective measures like consistent software patches, robust network security
settings, and current antivirus software. By remaining watchful and implementing these
precautions, the susceptibility to worm infiltrations can be mitigated.
Trojan Horse
A Trojan horse is a type of malware that disguises itself as legitimate software but
contains malicious instructions. It replaces or embeds itself within legitimate software,
aiming to cause harm to the user's computer system.
Page 11 of 31
Since Trojan horses rely on tricking end-users into executing them, traditional security
measures like firewalls and other security systems may be ineffective. The user has the
ability to override these safeguards and initiate the execution of the malware. Therefore,
user awareness and caution are crucial in preventing Trojan horse infections. It is
important to exercise caution when opening email attachments, downloading software
from untrusted sources, and being vigilant against deceptive tactics used by
cybercriminals. Additionally, maintaining up-to-date antivirus software can help detect
and mitigate Trojan horse infections.
Spyware
Spyware is malicious software that secretly monitors a user's activities on their computer
and gathers information without their knowledge or consent. It is designed to capture
sensitive information, such as web browsing habits, keystrokes, login credentials, and
personal data like bank account numbers and credit/debit card details. The gathered
information is then sent back to the cybercriminal who deployed the spyware. It typically
enters a user's system through deceptive means, such as being bundled with legitimate
software, distributed through malicious email attachments or infected websites, or
exploiting security vulnerabilities. It can also be installed through social engineering
tactics, where users are tricked into downloading or executing the spyware unknowingly.
The danger of spyware lies in its ability to infiltrate a system undetected and exploit
security vulnerabilities. It compromises user privacy and can lead to identity theft, financial
fraud, and unauthorized access to sensitive information.
To detect and remove spyware, users can utilize anti-spyware software specifically
designed to identify and eliminate such threats. Regular scans with up-to-date anti-
spyware tools can help identify and remove spyware infections.
Page 12 of 31
Adware
Adware is malware designed to display unwanted ads to users. While less dangerous
than other malware, it disrupts user experience and security. Its purpose is to generate
revenue by showing targeted ads or redirecting to promotional sites. It appears as pop-
ups, redirects, or browser toolbars. Adware can weaken security, be hard to remove, and
hijack browsers. To mitigate its impact:
Ransomware
Ransomware is a malicious software that encrypts a user's files and demands payment
for decryption. It causes financial losses and data breaches. Victims find their files locked
and receive ransom demands, often in cryptocurrency, to regain access. Ransomware
spreads through email attachments, malicious downloads, or software vulnerabilities.
Prevention involves:
In case of an attack, avoid paying the ransom and focus on restoring systems from
backups and reporting the incident to authorities.
Phishing
Page 13 of 31
Methods to prevent phishing attacks
· Staying consistently informed about the latest phishing schemes and tactics is
paramount.
· Prudent caution is advised when interacting with email links. Users must refrain from
clicking on any links unless the legitimacy is clear.
· Phishing emails often employ generic greetings such as "Dear Customer" or address
recipients solely by their email address — revealing signs of potential deception.
· Employing anti-phishing toolbars within web browsers, including mobile ones, to provide
an added layer of defense by alerting users to potentially hazardous websites.
· Scrutinizing the browser's address bar for "https" and a green padlock symbol, indicative
of a secure connection.
· Keeping web browsers and firewalls up to date with the latest security enhancements.
· Handling pop-up windows with caution and utilizing browser settings to block them.
· Dismissing pop-ups appropriately using the provided "x" in the top-right corner, as
clicking "cancel" might redirect to phishing or pharming sites.
Page 14 of 31
By diligently adhering to these guidelines and staying proactive in recognizing and
avoiding phishing endeavors, individuals can drastically reduce their susceptibility to such
malicious activities and safeguard their personal and sensitive information.
Pharming
The redirection in pharming can be executed using methods like DNS cache poisoning,
wherein the IP address of a legitimate website is altered, forcing the user's computer to
visit the forged site. This manipulation allows cybercriminals to trick users into providing
confidential information that can be exploited for malicious purposes.
b) Address DNS Server Infections: In the event of a DNS server infection, seeking
professional assistance and implementing strict security measures become crucial.
c) Use Browser Alerts: Modern browsers often feature built-in alerts that warn users about
pharming and phishing attacks, adding an extra layer of protection.
d) Verify Website Spelling: Thoroughly check the spelling of website addresses to ensure
correctness. Typographical errors or variations in the URL can unintentionally lead to
redirection to fraudulent websites.
e) Validate HTTPS and the Green Padlock Symbol: The presence of "https" in the website
address and the appearance of a green padlock symbol in the browser's address bar
signify a secure connection. Verifying these indicators enhances confidence in the
authenticity of the website.
Page 15 of 31
By proactively adopting these preventive measures, users can significantly lower the risk
of falling victim to pharming attacks. Such actions aid in safeguarding sensitive data from
unauthorized access and potential exploitation.
Social Engineering
Social engineering doesn't involve traditional hacking; instead, it manipulates users into
compromising their own security. It preys on impulsive decisions driven by human
psychology.
a) Educate: Regularly learn about techniques to spot and avoid social engineering
threats.
e) Take Time: Evaluate unusual requests or situations carefully. Don't rush due to fear or
curiosity.
By understanding social engineering and using critical thinking, individuals can shield
themselves and their data from manipulation by cybercriminals.
Page 16 of 31
Keeping data safe from security threats
Access Levels
In many computer systems, user accounts play a pivotal role in managing access rights.
This involves assigning different levels of access to different individuals based on their
roles. For instance, in a hospital setting, granting a cleaner access to medical patient data
would be inappropriate, whereas a consultant would require such access. To achieve this,
systems typically implement a hierarchy of access levels using usernames and
passwords. Access levels are especially critical in databases, where determining read,
write, and delete privileges is vital. By offering varying views of data tables, specific users
can be restricted to accessing only certain data.
Access levels are also significant in social networks, like Facebook, which usually feature
four access tiers:
a) Public Access: This pertains to data accessible by the general public. It encompasses
information users willingly share publicly, such as profile pictures, cover photos and public
posts.
b) Friends: Only individuals identified as "friends" by the data owner can access specific
information. This level enables users to share more personal details with a chosen group
of trusted connections.
c) Custom: This permits users to further tailor data visibility for "friends," enabling them to
exclude specific content from selected individuals. Custom access provides enhanced
control over who can view the data.
d) Data Owner: Reserved exclusively for the data owner, this level encompasses private
messages, confidential settings, and personal account details. It's meant solely for the
user's eyes.
In this context, privacy settings are utilized to determine access levels, rather than relying
solely on passwords. Users can personalize their privacy preferences, selecting the
appropriate access level for various data types and specifying who can view their posts,
photos, and other content. These privacy settings empower users to maintain authority
over their personal information and manage who can access it.
Page 17 of 31
It's imperative for social network users to be vigilant about their privacy settings and
routinely update them based on their preferences. By utilizing provided access levels and
privacy controls, individuals can ensure that their data is shared appropriately and with
the intended audience, thus safeguarding their online privacy and digital presence.
Anti-malware
b) File Structures: Certain file structures are commonly linked with spyware. Anti-spyware
software recognizes these structures and uses them as indicators to spot potential
spyware.
In many instances, anti-spyware is bundled with other security components like anti-virus
and personal firewalls, providing comprehensive malware protection.
· Detection and Removal: The software scans and removes existing spyware from the
system.
· File Encryption: Anti-spyware can encrypt files to enhance their security against
spyware targeting sensitive data.
· Stolen Information Detection: The software scans for signs of stolen personal
information and alerts the user if detected.
Page 18 of 31
By employing anti-spyware software, users strengthen their defenses against spyware,
safeguard their privacy, and reduce the risk of data compromise. Regular scans and
updates are vital for ongoing protection against evolving threats.
Authentication
Passwords and usernames are commonly used for authentication. Passwords must be
strong and changed regularly. Biometric elements are increasingly integrated, especially
on mobile devices.
For internet access (e.g., email, online banking), password protection is key.
Precautions
· Password entry is often masked on-screen. Access is denied if passwords don't match.
Systems may lock after multiple failed attempts, requiring a reset.
· Password reset emails contain links to secure webpages. This safeguards against
unauthorized access or changes.
Biometric
Page 19 of 31
and voice to verify identity. Biometric technology finds applications in diverse security
contexts, from fingerprint-based phone unlocking to biometric access control in
pharmaceutical companies.
Fingerprint scans and retina scans are two specific biometric methods worth exploring:
Fingerprint
Retina scans
Retina scans utilize infrared light to capture the distinctive blood vessel pattern in the
retina, located at the back of the eye. This method entails around 10 to 15 seconds of
sitting still during scanning. Retina scans offer high security due to their non-reproducible
nature.
Biometrics, including fingerprint and retina scans, provide secure user identification based
on unique human traits. While fingerprint scanning is cost-effective and widely accepted,
retina scans offer superior accuracy but may be deemed more intrusive due to the need
for extended stillness during scanning.
Two-step verification
Page 20 of 31
authentication to confirm a user's identity. It finds common use in online transactions,
particularly when using credit or debit cards for payment. Illustrating its functioning
through an example can clarify how two-step verification operates. Let's consider Kate,
who intends to purchase a new camera from an online store.
· User name and password: Kate logs into the online platform using her computer, where
she must input her user name and password. This marks the initial stage of
authentication, confirming her identity.
Upon successful completion of both steps, Kate is granted authorization to proceed with
her camera purchase. The two-step verification mechanism bolsters security as it
mandates the provision of not only something she knows (her password) but also
something she possesses (the OTP transmitted to her mobile phone).
Automatic software updates play a pivotal role in maintaining the up-to-date status of
software across computers, mobile phones, and tablets. These updates are often
scheduled during off-peak hours, such as overnight or when the user logs off the device.
Page 21 of 31
Checking the spelling and tone of communication and URL links
· Evaluate Tone and Language: Thoughtfully assess the tone conveyed in the email's
message. Approach with caution if the email exerts pressure for immediate action or
employs language that appears unusual or inappropriate. Such indications might point
towards a potential phishing scheme or scam.
· Inspect Email Addresses and Links: Examine the legitimacy of the sender's email
address itself. Reputable companies typically utilize professional email addresses linked
to their established domains. Exercise caution when the email address doesn't align with
the company's name or employs generic email providers. Moreover, be wary of links that
lead to domains with typographical errors. Scammers often employ a tactic known as typo
squatting to create domains resembling authentic ones in order to deceive recipients.
In addition to these three fundamental actions, it is important to heed the following warning
signs:
· Suspicious Links: Verify that the destinations of links within the email correspond to
the overall context of the email. Approach emails with skepticism if they claim to originate
from reputable sources but provide links leading to unrelated or questionable websites.
· Spelling Errors: Be alert to blatant spelling errors in email addresses and URLs.
Scammers may deliberately misspell company names or employ incorrect domain
extensions to deceive recipients.
Page 22 of 31
By maintaining vigilance and adhering to these precautionary measures, individuals can
effectively shield themselves against phishing endeavors and potentially fraudulent
activities that may materialize through email communications.
Firewall
1. Examining network traffic: The firewall analyzes the data exchanged between the
user's computer or internal network and the public network, such as the internet.
2. Applying criteria to data: The firewall checks whether the incoming or outgoing data
meets a specified set of criteria. If the data fails to meet the criteria, the firewall blocks the
traffic and notifies the user or network manager about a potential security issue.
3. Logging traffic: Firewalls can log all incoming and outgoing network traffic, allowing
users or network managers to review and analyze the activity at a later time.
5. Protecting against viruses and hackers: Firewalls are designed to help prevent viruses
and unauthorized access attempts from reaching the user's computer or internal network.
6. Alerting users to software accessing external sources: If any software on the user's
system attempts to access an external data source, such as an automatic software
upgrade, the firewall notifies the user and provides the option to allow or deny the access.
Page 23 of 31
Limitations of firewall
3. Users disabling the firewall: In standalone computer setups, users have the option to
disable the firewall, which leaves their computer vulnerable to potentially harmful network
traffic from the internet.
Proxy server
Proxy servers function as intermediaries between users and web servers, offering various
features and advantages:
· Internet Traffic Filtering: Proxy servers enable administrators to filter internet traffic,
allowing them to block specific websites when necessary. This capability facilitates
content filtering and enhances overall security.
· Valid and Invalid Traffic Handling: Proxy servers validate internet traffic, granting
access to valid requests while denying suspicious or invalid traffic. This safeguards
against unauthorized access and potential attacks.
· Indirect Web Server Access: Proxy servers sit between users and web servers,
creating a barrier that shields the web server from direct access. This fortification helps
safeguard against hacking and denial-of-service (DoS) attacks.
Page 24 of 31
· Redirection of Harmful Traffic: Proxy servers can reroute harmful or invalid traffic away
from web servers, mitigating risks and preserving web server availability and
performance.
· Caching for Speed: Utilizing caching, proxy servers store frequently accessed web
content. When a user requests a website, the proxy server can deliver the cached version
instead of fetching it from the web server. This speeds up access and lessens network
load.
· Firewall Functionality: Proxy servers can also function as firewalls, offering an extra
layer of security. They inspect and regulate network traffic, thwart unauthorized access
attempts, and enforce security policies.
Privacy settings
Privacy settings are controls that are available on web browsers, social networks, and
other websites to manage and limit the access and visibility of a user's personal profile
and information. These settings are designed to enhance privacy and security. Here are
some examples of privacy settings:
1. 'Do Not Track' setting: This setting informs websites not to collect and use browsing
data for tracking purposes. Enabling this setting can help protect privacy and prevent the
collection of personal information.
2. Payment method security: Many websites allow users to save their payment methods
for convenience. Privacy settings can include options to manage and secure saved
payment details, reducing the risk of data interception or unauthorized access.
3. Safer browsing alerts: Privacy settings can include features that warn users when
they encounter potentially dangerous or malicious websites. These alerts help protect
users from visiting harmful sites that may pose security risks.
4. Web browser privacy options: Web browsers often offer privacy settings to control the
storage of browsing history, cookies, and other browsing data. Users can choose to clear
their history regularly, block third-party cookies, or enable private browsing modes to
enhance privacy.
5. Website advertising opt-outs: Many websites track user behavior for targeted
advertising. Privacy settings may provide options to opt out of this tracking, limiting the
collection and use of personal data for advertising purposes.
Page 25 of 31
6. App privacy settings: Mobile apps, especially those involving location data, may have
privacy settings to manage the sharing of personal information. Users can choose to
enable or disable location sharing, access permissions, and other data-sharing features
based on their privacy preferences.
By utilizing privacy settings, users can have more control over their personal information,
limit access to their profiles, and protect themselves from privacy breaches and unwanted
tracking. It is important for individuals to review and adjust these settings regularly to align
with their privacy preferences.
Secure Sockets Layer (SSL) is a protocol that facilitates secure communication between
computers across a network, often the internet. It employs encryption to ensure that data
transmitted between a user's computer and a web server remains confidential and
inaccessible to unauthorized entities.
When SSL is implemented on a website, the data exchanged between the user's
computer and the server is encrypted, guaranteeing both confidentiality and data integrity.
Users can identify the use of SSL by observing the "https" protocol in the website's
address, as opposed to the standard "http." Furthermore, contemporary web browsers
frequently display a small padlock icon in the address bar to signify a secure connection
SSL certificates play a pivotal role in establishing a website's authenticity and reliability.
These digital certificates, issued by trusted third-party certification authorities, validate the
website's identity. When a browser encounters an SSL certificate, it verifies the
certificate's authenticity, ensuring a secure communication channel with the website.
· E-commerce and Online Shopping: SSL protects users' personal and payment details
during online purchases, enhancing security.
Page 26 of 31
· Cloud Storage: SSL secures data transmission between users' devices and cloud
storage platforms, upholding file privacy.
· Private Networks and Internet Connections: SSL is used to secure communication within
private networks (intranets, extranets) as well as over public internet connections.
· Voice over Internet Protocols (VoIP): SSL enhances the security of voice and video
communication through VoIP services.
· Social Networking Sites: SSL secures communication and shields user information on
social networking platforms.
Page 27 of 31
Key Terms:
internet – the world-wide interconnection of networks; the internet makes use of TCP
and IP protocols
World Wide Web – a massive collection of web pages and is based on hypertext transfer
protocols (http and https)
(web) browser – software that connects to a domain name server (DNS) to locate IP
addresses; a browser interprets HTML web pages sent to a user’s computer so that the
user can read documents and watch multimedia
hypertext mark-up language (HTML) – the language used to design, display and format
web pages, and to write http(s) protocols
uniform resource locator (URL) – a text-based address for a web page hypertext
transfer protocol secure (https) – http with extra security (such as SSL) applied
hyperlink – highlighted text or an image that is activated by clicking and links to further
text, images, a web page or a website
domain name server (DNS) – a server that looks up domain names for websites (for
example, www.hoddereducation.com) in order to find the IP addresses that a computer
needs to locate the web servers (for example, 107.162.140.19)
cookie – a text file sent from a website to a user’s browser; it is used to remember user
preferences each time they visit the website
user preferences – settings or options stored in cookies that can remember customized
web pages or indicate browsing history to target adverts
persistent cookies – a cookie that is stored on the user’s hard drive and only deleted
when the expiry date is reached or the cookie is deleted by the user
virtual shopping basket – an area of memory in a website where items a user wishes
to purchase are temporarily stored; items remain in the basket until payment is made or
the session has ended
digital currency – currency (a system of money) that exists in electronic form only; it has
no physical form and is essentially data on a database
Page 28 of 31
cryptocurrency – a form of digital currency that uses a chain of decentralized computers
to control and monitor transactions
timestamp – a digital record of the date and time that a data block is created in blockchain
networks
brute force attack – a ‘trial and error’ method used by cybercriminals to crack passwords
by finding all possible combinations of letters, numbers and symbols until the password
is found
word list – a text file containing a collection of words used in a brute force attack
packet sniffing – a method used by a cybercriminal to examine data packets being sent
over a network and to find the contents of a data packet, which are sent back to the
cybercriminal
wardriving – using a laptop, antenna, GPS device and software to intercept Wi-Fi signals
and illegally obtain data; sometimes called Access Point Mapping wired equivalency
privacy (WEP) encryption protocol
security – an algorithm for wireless networks to protect them against data interception
distributed denial of service (DDoS) attack – a denial of service (DoS) attack in which
the fake requests come from many different computers, which makes it harder to stop
spam – unsolicited emails sent to a user’s mailbox
Page 29 of 31
hacking – the act of gaining illegal access to a computer system without the owner’s
permission
malware – programs (such as viruses, worms and Trojan horses) installed on a user’s
computer with the aim of deleting, corrupting or manipulating data illegally
virus – a program or program code that replicates itself with the intention of deleting or
corrupting files or by causing the computer system to malfunction
active host – functioning software that a virus can affect by attaching itself to the code
or by altering the code to allow the virus to carry out its attack
worm – a stand-alone type of malware that can self-replicate; unlike viruses, worms don’t
need an active host; they can spread throughout a network without the need for any action
by an end-user
Trojan horse – a type of malware that is designed to look like legitimate software but
contains malicious code that can cause damage to a computer system
adware – a type of malware that attempts to flood the end-user with unwanted advertising
ransomware – a type of malware that encrypts data on a user’s computer and ‘holds the
data hostage’ until a ransom is paid
phishing – sending out legitimate-looking emails designed to trick the recipients into
giving their personal details to the sender of the email
spear phishing – similar to phishing but targeting specific people or organizations rather
than carrying out a blanket attack
pharming – redirecting a user to a fake website in order to illegally obtain personal data
about the user without their knowledge; unlike phishing, pharming is initiated without
needing any action by the user
DNS cache poisoning – altering IP addresses on a domain name server (DNS) with the
intention of redirecting a user’s browser to a fake website; carried out by a pharmer (see
pharming) or hacker (see hacking)
Page 30 of 31
social engineering – manipulating people into breaking normal security procedures
(such as giving away their password) in order to gain illegal access to computer systems
or to place malware on their computer
authentication – the process of proving a user’s identity by using something they know,
something they have or something unique to them
patch – an update for software that is developed to improve the software and/or to
remove any bugs
typo squatting – the use by cybercriminals of subtle spelling errors in website addresses
used to trick users into visiting their fake websites
firewall – software or hardware that sits between a computer and an external network
(for example, the internet); the firewall monitors and filters all incoming and outgoing traffic
proxy server – a server that acts as an intermediary server through which internet
requests are processed; it often makes use of cache memory to speed up web page
access
privacy settings – controls available on social networking and other websites which
allow users to limit who can access their profile or what they are allowed to see
secure sockets layer (SSL) – a security protocol used when sending data over a network
(such as the internet)
Page 31 of 31