The Internet and Its Uses
The Internet and Its Uses
URL
What is a URL?
The URL is a text-based address that identifies the location of a resource on the internet
It is the address of a web page, image, video, or any other resource available on the
internet
Components of a URL
A URL can contain three main components:
o Protocol
o Domain name
o Web page / file name
The protocol is the communication protocol used to transfer data between the client and
the server
o E.g. HTTP, HTTPS, FTP, and others
The domain name is the name of the server where the resource is located
o It can be a name or an IP address
The web page / file name is the location of the file or resource on the server
o It can contain the name of the file or directory where the resource is located
A URL looks like this:
o protocol://domain/path
o E.g. https://www.example.com/index.html is a URL that consists of
the HTTPS protocol, the domain name "www.example.com", and the file name is
"/index.html".
Computer Science 2210 By Sajid Ali Imam
Protocols
Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS) are
the two most common protocols used for transferring data between clients and servers on
the internet.
Hypertext Transfer Protocol (HTTP)
HTTP is the protocol used for transferring data between a client and a server on the
internet
It is a stateless protocol, meaning it does not store any information about previous requests
or responses
HTTP operates on port 80 by default and sends data in plain text format, making
it vulnerable to interception and manipulation
Hypertext Transfer Protocol Secure (HTTPS)
HTTPS is a secure version of HTTP that uses encryption to protect data transferred between
a client and a server
It operates on port 443 by default and uses Transport Layer Security (TLS) or Secure Socket
Layer (SSL) to encrypt data
HTTPS ensures that data transferred between the client and server is secure, making
it harder for unauthorised users to intercept or manipulate data
Computer Science 2210 By Sajid Ali Imam
Web Browser
A web browser is a piece of software used to access and display information on the internet.
The main purpose of a web browser is to render hypertext markup language (HTML) and
display web pages
Web browsers interpret the code in HTML documents and translate it into a visual display
for the user
Render HTML
o This will display the webpage
Storing bookmarks and favourites
o Web browsers allow users to save links to frequently visited websites and access them
easily using bookmarks or favourites
Recording user history
o Web browsers record the user's browsing history, allowing them to quickly revisit
recently viewed pages
Allowing use of multiple tabs
o Web browsers allow users to open multiple tabs and switch between them quickly and
easily
Storing cookies
o Web browsers store cookies, which are small files that contain user preferences and
login information for websites
Providing navigation tools
o Web browsers provide navigation tools, such as back and forward buttons and a home
button, to help users move between pages
Homepage
o This is the initial page that appears when the browser is launched
o The homepage can be customised to display frequently visited websites or specific
content
Computer Science 2210 By Sajid Ali Imam
Web Pages
When you type in a URL / click on a link the browser sends the URL to the DNS using HTTP
The DNS finds the matching IP addresses for the URL and sends the IP address to the web
browser
The web browser sends a request to the web server for web pages
The web pages are sent from the web server to the browser
The browser renders HTML to display web pages
Any security certificates are exchanged
SSL/HTTPS is used to secure the data which will encrypt any data that is sent
Worked example
Describe how the web pages for the website are requested and displayed on a user’s
computer. [4]
HTML is:
E.g.
CSS is:
E.g.
Font size
Font colour
Background colour
Computer Science 2210 By Sajid Ali Imam
The presentation of the page can be changed without needing to alter the structure so
regular updates can be made without needing to check the structure
The formatting document (written in CSS) can be used again for a different website
If further content and web pages are added to the website, the necessary formatting can be
easily applied so this can save time when developing a website
CSS to standardise formatting so CSS only needs to be created once and be applied to each
webpage
One person can develop the structure and one can develop the presentation so this can
save time when developing and updating a website
Exam Tip
Make sure you know the definition for structure and presentation and know at least one
example of each
You also need to have a greater understanding of the reasons for the separation of
structure and presentation
Cookies
Cookies are small files that are stored on a user's device by a website. They are used for
various functions, including:
There are two types of cookies: session cookies and persistent cookies.
Session Cookies
o These are temporary and are stored only during a user's browsing session
o They are used to maintain a user's state or activity during a single session, such as when
filling out a form or navigating through a website
Persistent Cookies
o These are stored on a user's device for a longer period, usually for a few weeks to
several years
o They are used to remember user preferences and settings, such as language
preferences, login details, and shopping cart items
Cookies enhance the user experience and make it more convenient for users to interact with
websites. However, cookies can also raise privacy concerns and should be used responsibly by
website owners.
Digital Currency
A digital currency is a type of currency that exists only in electronic form and is not backed
by any physical commodity or government.
Decentralised
o Many digital currencies operate on a decentralised network; meaning that they are not
controlled by any central authority like a government or financial institution
o Instead, transactions are verified and recorded on a public ledger known as a blockchain
Computer Science 2210 By Sajid Ali Imam
Volatile
o Digital currencies can be highly volatile; meaning their value can fluctuate rapidly over
short periods of time
o This can make them risky investments and can also make it difficult to use them as a
stable store of value
Examples include Bitcoin, Ethereum, Litecoin, and Ripple
Blockchain
Blockchain is a digital ledger that records every transaction made with a particular digital
currency
o Each transaction is time-stamped and added to the blockchain in a permanent and
unalterable way
Blockchain is a decentralised technology, meaning that it is not controlled by a single entity
or authority
o Instead, every participant in the network has a copy of the ledger and can verify the
transactions independently
The blockchain is made up of "blocks" of transactions that are linked together in a "chain"
using cryptographic algorithms
o This creates a secure and tamper-proof record of every transaction made with the
digital currency
Each transaction in the blockchain must be verified by multiple participants in the
network
o This verification process ensures that the transaction is legitimate and prevents any
fraudulent activity
Computer Science 2210 By Sajid Ali Imam
Cybersecurity threats pose a major challenge for individuals and organisations that rely on
digital technology to store and transmit sensitive information.
Brute-Force Attack
Data Interception
Hacking
Malware
A virus is a piece of code that attaches itself to a legitimate program or file and then
replicates itself to spread to other programs or files on the computer. It can cause damage
to the system, including deleting data or damaging hardware
A worm is similar to a virus but is a standalone program that can spread and replicate itself
over computer networks. It can take up storage space or bandwidth
A Trojan horse is a program that disguises itself as a legitimate program or file, but when
installed, it can delete data or damage hardware
Spyware is software that records all key presses and transmits these to a third party
Adware is a type of software that displays unwanted advertisements on the computer
without the user's consent. Some of these may contain spyware and some may link to
viruses when clicked
Ransomware is a type of malware that encrypts the user's files and demands a ransom
payment to decrypt them. It can cause data loss, and financial damage and disrupt business
operations
The aim of malware attacks can range from data theft to extortion or disruption of services
Phishing
Pharming
Exam Tip
A user needs to click on a link or an attachment to open the fake web page or trigger a
download of malicious code, and not just open the email
Social Engineering
Accidental Damage
Example Prevention
Exam Tip
If you are given context in a question, you should apply your answer to the scenario
Back-up of data is not a method to help prevent the data being damaged. It can replace the
data if it is damaged, but it does not stop the data being damaged
Computer Science 2210 By Sajid Ali Imam
o This allows the user to open, create, edit & delete files
o This only allows the user to open files without editing or deleting
o This hides the file from the user
o Full access
o Read-only access
o No access
Anti-Malware
Anti-malware solutions are used to prevent and remove malware, which is a common type
of security threat to data
Anti-malware software includes anti-virus and anti-spyware programs, which help to
detect and remove malicious software from a computer system
This software works by scanning the computer’s files and any files being downloaded and
comparing them to a list of known malware
If any malware is found, it is quarantined to prevent the spread
The malware is then deleted
Computer Science 2210 By Sajid Ali Imam
Authentication
Authentication is used to ensure that only authorised users can access data
There are several methods of authentication:
o Passwords are used to protect sensitive data by preventing unauthorised access. A
strong password should be complex, unique, and not easily guessed. Passwords should
be changed regularly, and users should avoid reusing passwords across multiple
accounts.
o Biometrics uses biological data for authentication by identifying unique physical
characteristics of a human such as fingerprints, facial recognition, or iris scans. Biometric
authentication is more secure than using passwords as:
A biometric password cannot be guessed
It is very difficult to fake a biometric password
A biometric password cannot be recorded by spyware
A perpetrator cannot shoulder surf to see a biometric password
o Two-factor authentication (2FA) requires users to provide two forms of authentication
before accessing data, such as a password and a verification code sent to a mobile
device. This provides an extra layer of security and reduces the risk of unauthorised
access. 2FA is widely used to protect online accounts, such as email or banking.
These methods help to prevent unauthorised access and protect sensitive data
Automating software updates ensures that software systems are up-to-date with the latest
security patches, which helps to prevent security threats
This is especially important for operating systems and software that are frequently
targeted by hackers
It does this by scanning the Internet for known updates to software which are installed on
the computer
If any updates are found, these can either install automatically or notify the user to install
them
Communications
Checking the spelling and tone of communications is important to prevent phishing attacks
Computer Science 2210 By Sajid Ali Imam
URL
Checking the URL attached to a link is another way to prevent phishing attacks.
Hackers often use fake URLs to trick users into visiting fraudulent websites
o e.g. http://amaz.on.co.uk/ rather than http://amazon.co.uk/
Firewalls
Privacy Settings
Privacy settings are used to control the amount of personal information that is shared
online
They are an important measure to prevent identity theft and other forms of online fraud
Users should regularly review their privacy settings and adjust them as needed
Proxy-Servers
Proxy-servers are used to hide a user's IP address and location, making it more difficult for
hackers to track them
They act as a firewall and can also be used to filter web traffic by setting criteria for traffic
Malicious content is blocked and a warning message can be sent to the user
Proxy-servers are a useful security measure for protecting against external security threats
as it can direct traffic away from the server
Computer Science 2210 By Sajid Ali Imam
SSL is a security protocol which is used to encrypt data transmitted over the internet
This helps to prevent eavesdropping and other forms of interception
SSL is widely used to protect online transactions, such as those involving credit card
information or other sensitive data
It works by sending a digital certificate to the user’s browser
This contains the public key which can be used for authentication
Once the certificate is authenticated, the transaction will begin
Physical Methods
o Physical methods are used to physically protect hardware that stores sensitive data
o This can include:
Locked rooms needing a key or card access
CCTV
Bodyguards
Backup
This is the process of making a copy of files in case something happens to the original ones
Backing up data is important to protect against data loss due to hardware failure, cyber-
attacks, or other disasters
Backups should be stored in a secure location, and multiple copies should be made
Regular backups ensure that data can be recovered in the event of a security breach or
data loss
Computer Science 2210 By Sajid Ali Imam
Ethics
Addiction
o Aspects of the internet e.g. social media can cause this
Breaching copyright
o Breaking the law by copying someone’s work
Cyber bullying
o Using the internet to bully people
Data protection
o A person’s data is not used according to the law
Environmental effects
o Increased use of the internet increases the use of electrical power
Fake news
o News stories that could be very misleading or harmful
Inappropriate materials
o Materials that could cause harm/offence to people e.g. children
Intellectual property theft
o Stealing other people's work
Piracy
o Using piracy websites to gain content for free that should have been paid for
Plagiarism
o The copying of other people’s work without their permission
o Claiming someone else’s work as your own
Privacy
o A person’s data could be leaked