Internet and Its Uses - Summary
Internet and Its Uses - Summary
Allows the user to communicate with Uses HTTP(S) protocols that are
other users via chat, email, calling and written using Hypertext Mark-up
more Language (HTML)
• URLs are used to locate and access web pages. The typical format of URLs is -
o domain type (.com, .org, .net, .gov) or sometimes country codes (.uk,
.in, .cy)
• The path would usually become the file directory roots. for
example, https://www.znotes.com/computer-science
• HTTP stands for Hypertext Transfer Protocol, and HTTPS stands for Hypertext
Web Browsers
• The browser sends the URL to the domain name server (DNS)
Cookies
• They are used to track data about the users and autofill forms or give
suggestions accordingly
• Types of Cookies -
Temporary cookies are stored in Remembers the user’s login details so the
the RAM till the browser is closed. user doesn’t have to log in every time they
visit a website
Doesn’t collect any information on Stored on the hard disk on the computer until
the user their expiry date or the user deletes them
• A few examples are Debit/Credit Cards, Apps (Paypal, Apple Pay, Bank
banking systems.
Blockchain Network
• Hacking isn’t possible here as transaction details would be sent to all the
computers, and the data can’t be changed without the consent of all the
network members
Every time a transaction takes place, A block is created. The block would contain -
• Data - Name of the sender and the receiver, amount of money and more
• Previous Hash Value - Hash Value of the previous block in the chain
The first block is
called the genesis block as it doesn’t point to any previous block (Previous Hash
Value - 0000)
Cyber Security
Brute Force Attack:
• Hackers try to guess your password by trying all the different combinations
• Effect:
and more)
• To remove risk:
Data Interception:
• This involves stealing data by tapping into a wired or a wireless transmission
line
connections illegally
• Effect:
• To remove risk:
o Accessing websites
• Effect:
• To remove risk:
o Firewalls
Malware
o Virus - A program that can replicate itself with the intention of deleting
of money is paid
Phishing
• Attackers send legitimate-looking emails to bait the user into giving out their
information.
• To remove risk:
Pharming
• The attacker installs a malicious code on the computer, which redirects the
• Effect:
o The user gives out login details and other personal details
• To remove risk:
o Make sure that the green padlock is present in the URL bar
Social Engineering
• Attackers create a social situation which leads to victims giving out their
details (For example - Spam calls informing them that their account has been
hacked)
• Access Levels - Having Different levels of access for different people (for
• Authentication - User proving who they are. The most common methods are
biometric damaged
data. (e.g. cuts)
person’s
voice,
making
identification
impossible.
the user is
device security
• Spelling and Tone - Fake emails tend to have wrong spelling and grammar
(amazonn instead of amazon), and the tone would also seem urgent
• Proxy Servers - Acts as an intermediate between the user’s computer and the
o Attacks like DDoS and Hacking attack the proxy server, keeping the
• Privacy Settings - Used to limit who can access and see a user’s profile
• SSL (Secure Socket Layer) - Set of rules used while communicating with other