Chapter 5
Chapter 5
Allows for online chatting HTTP protocols are written using HTML
Makes use of TCP and IP protocols URLs are used to specify the location
Web Browser- software that allows users to connect and display web pages on the screen.
Example
https://www.hoddereducation.com/ict
https= protocol
www= domain host
hoddereducation=Web address
com=domain type
Cookies
● A website stores small text files on a user's device called cookies. They are used
to remember user preferences and browsing history, as well as to track user
behavior on the website.
There are two types of cookies ;
1. Session Cookies
2. Persistent cookies
Session Cookies-Session cookies are temporary cookies that expire when the user
closes their web browser. An example of the use of session cookies would be when a
user adds products to his/her shopping cart.This is stored in the RAM
Persistent cookies- Persistent cookies are the cookies that are stored Permanently and
do not delete when the user closes the web browser. An example for the use of
Persistent cookies would be typing the user's login details.This is stored in the Hard
Drive of the user’s computer.
💳
4. Used in financial transaction
Digital Currency
● The term digital currency refers to a form of currency that is stored and
exchanged electronically. It does not exist as a physical currency like cash or
coins, but rather as a digital one.
💹
● Central banks are responsible for digital currencies
Crypto Currency
● Transactions in cryptocurrency are tracked using cryptography
● Crypto currency has no state control but rather set by the cryptocurrency
community itself
● There is public access to cryptocurrency transactions, and all transactions can
be tracked and the amount of money in the system can be monitored
● Cryptocurrency system works by being within a blockchain network, which
means it is much more secure
Differences between digital and crypto currency :
1. Digital currency is a type of currency that exists solely in digital form, while
cryptocurrency is a specific type of digital currency that uses cryptography for
security and operates independently of a central bank.
2. Digital currency can be issued by a central authority, such as a government or
central bank, while cryptocurrency is created through a process called mining,
which involves solving complex mathematical problems.
3. Digital currency is subject to government regulations, while cryptocurrency is
decentralized and operates independently of government oversight. This means
that the use and trading of cryptocurrency may not be subject to the same laws
and regulations as traditional digital currency.
4. Digital currency transactions are often traceable and linked to individuals, while
many cryptocurrencies are anonymous and cannot be traced
Cyber Security
Brute force attacks -a trial and error method used by hackers to crack the password by finding
all the possible combinations to the password.
Word list - collection of words used in brute force attacks
Cybercriminals attempts to crack a password:
1. They check if password is the most common ones such as 123456
2. If they can't crack it , they will use the word list and try to crack the
password
DDOS attack - attempt to prevent users from accessing part of the network. For eg: hacker
prevents users from accessing emails.
● Data interception can be carried out using a packet sniffer, which examines data
packets sent over a network. The intercepted data is sent back to the hacker.
Hacking-An act of hacking is gaining illegal access to a computer system without the
user's permission. Data can be changed , passed on or even corrupted.
● Encryption does not stop hacking, it just makes data meaningless
Malware- a malicious code with the intention of causing damage and stealing data
Types of malware-
1. Virus
2. Trojan horse
3. Worms
4. Spyware
5. Adware
6. Ransomware
Virus- programs or program codes that self replicate with the intention of deleting or
corrupting files. Viruses require an active host to the target computer in order to actually
run.
● Viruses are usually sent in email attachments
Trojan horse- malware hidden away from the code of the software and which appears to
be harmless but isn't. However, the file has to be executed by the user in order to run.
Once installed, trojan horses will give cyber criminals the personal information of the
user , such as passwords.
Worms- A type of standalone malware that can self-replicate. However unlike viruses,
worms do not need an active host program to be opened in order to do any damage.
● Worms replicate themselves until it has taken the maximum capacity and no
further processing can take place
● They have the ability to spread through a network
Spyware- software that gathers information by monitoring a user’s activities carried out
on their computer
● Spyware can be removed from a software known as anti spyware
Adware- software that will attempt to flood users with unwanted advertising.
Ransomware- programs that encrypt data on a user’s computer and hold data hostage
until payment is received and sometimes the decryption key may, and may not be sent .
Phishing- sending out legitimate looking emails which are designed to trick the user in
giving their personal information. These links are considered as fake websites created
by the cyber criminal.
Pharming- Redirects users from a genuine website to a fake website, with the hope that
this change goes unnoticed.
● The change from the genuine site to the fake site is known as DNS cache
poisoning (altering IP addresses on a domain name server with the intention of
redirecting user to a fake website)
● User would then be prompted to provide login details and thus be stolen from the
cybercriminal
Pharming could be prevented :
● Use of antivirus
● Check spelling of website
● Check for the ‘s’ in the https protocol
Social engineering- users are manipulated into behaving in a way that they would not
normally do.
The threats:
1. Instant messaging- malicious links embedded into instant messages, for eg:
important software upgrade( based on user’s curiousity)
2. Scareware- pop up message that claims that the computer is infected with a
virus ( based on fear)
3. Emails- user is tricked by the apparent genuineness of an email and opens a link
that is not safe (based on trust)
4. Baiting- the cybercriminal leave a usb stick somewhere the user can find it, once
it is inserted into the pc it infects pc with virus (based on curiosity)
5. Phone calls- cybercriminal calls the user claiming that their device is
compromised in some way and user is advised to download special software
that would allow cybercriminal take over the user’s device (relies on fear)
Access levels- users in companies will be assigned different levels of access depending
on the role they have .
The different levels of access-
1. Public access
2. Friends
3. Custom
4. Data owner
Anti malware-
The two most common anti malware softwares are:
1. Antivirus
2. Antispyware
Antivirus- a software that constantly scans documents, files and incoming data from the
internet .
● If a file is detected as harmful, the anti-virus will quarantine the file away from the
network, this will preventing it from multiplying and land on other parts of
network or hard drive
Anti Spyware- software that detects and removes spyware programs stored in the PC
Steps taken when user wants to access a secure website and receive and send
data to it:
1. User’s browser sends a message so that it can connect with the required
website which is secured by SSL.
2. The browser requests that the web server identifies itself
3. The web server responds by sending a copy of its ssl certificate to the
user’s browser
4. If browser can authenticate this certificate , it send message back to web
server to allow communication to begin
5. Once the message is received the web server acknowledges the web
browser and the ssl encrypted 2 way data transfer begins.