The Internet
The Internet
The Internet
The Internet
• The internet refers to the global network of computers and other electronic
devices connected together through a system of routers and servers
• It is the infrastructure that allows us to send and receive information,
including email, instant messaging, and file transfers
• The internet also provides access to other services such as online gaming,
video streaming, and cloud computing
URL
URL
What is a URL?
• The URL is a text-based address that identifies the location of a
resource on the internet
• It is the address of a web page, image, video, or any other resource available
on the internet
Components of a URL
• A URL can contain three main components:
o Protocol
o Domain name
o Web page / file name
• The protocol is the communication protocol used to transfer data between the
client and the server
o E.g. HTTP, HTTPS, FTP, and others
• The domain name is the name of the server where the resource is located
o It can be a name or an IP address
• The web page / file name is the location of the file or resource on the
server
o It can contain the name of the file or directory where the resource is
located
• A URL looks like this:
o protocol://domain/path
o E.g. https://www.example.com/index.html is a URL that consists of
the HTTPS protocol, the domain name "www.example.com", and the
file name is "/index.html".
Protocols
Protocols
Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure
(HTTPS) are the two most common protocols used for transferring data
between clients and servers on the internet.
•
o Handshake Layer
▪ This is used to establish a secure connection between two
endpoints
•
o Record Layer
Exam Tip
Web Browser
Web Browser
A web browser is a piece of software used to access and display information on
the internet.
Web browsers provide an address bar, which allows users to enter a URL or search
term and navigate to a website or search for information
• Homepage
o This is the initial page that appears when the browser is launched
o The homepage can be customised to display frequently visited
websites or specific content
• Runs Active Scripts
o These are small programs embedded in web pages that allow
interactive content such as animations, videos, and pop-up windows to
be displayed
• Download Files
o A web browser allows files to be downloaded from the internet, such as
documents, images, and software
• Request Web Pages
o When you enter a web address in the address bar, the web browser
sends a request to the web server to obtain the contents of the web
page
o The server responds by sending the web page to the browser, which
displays it on the screen
• DNS
o The web browser sends the URL to the DNS, which translates the URL
into an IP address, which is used to locate the web server
• Manages Protocols
o Web browsers manage the HTTP and HTTPS protocols, which are
used to transfer data between web servers and browsers
o HTTP is used for regular web pages, while HTTPS is used for secure
pages that require encryption, such as online banking or shopping sites
Web Pages
Web Pages
• When you type in a URL / click on a link the browser sends the URL to the
DNS using HTTP
• The DNS finds the matching IP addresses for the URL and sends the IP
address to the web browser
• The web browser sends a request to the web server for web pages
• The web pages are sent from the web server to the browser
• The browser renders HTML to display web pages
• Any security certificates are exchanged
• SSL/HTTPS is used to secure the data which will encrypt any data that is sent
Worked example
Describe how the web pages for the website are requested and displayed on a
user’s computer
[4]
HTML is:
E.g.
E.g.
• Font size
• Font colour
• Background colour
• The presentation of the page can be changed without needing to alter the
structure so regular updates can be made without needing to check the
structure
• The formatting document (written in CSS) can be used again for a different
website
• If further content and web pages are added to the website, the necessary
formatting can be easily applied so this can save time when developing a
website
• CSS to standardise formatting so CSS only needs to be created once and be
applied to each webpage
• One person can develop the structure and one can develop the presentation
so this can save time when developing and updating a website
Exam Tip
• Make sure you know the definition for structure and presentation and know at
least one example of each
• You also need to have a greater understanding of the reasons for the
separation of structure and presentation
Cookies
Cookies
What are cookies?
Cookies are small files that are stored on a user's device by a website. They are
used for various functions, including:
There are two types of cookies: session cookies and persistent cookies.
• Session Cookies
o These are temporary and are stored only during a user's browsing
session
o They are used to maintain a user's state or activity during a single
session, such as when filling out a form or navigating through a website
• Persistent Cookies
o These are stored on a user's device for a longer period, usually for a
few weeks to several years
o They are used to remember user preferences and settings, such as
language preferences, login details, and shopping cart items
Cookies enhance the user experience and make it more convenient for users to
interact with websites. However, cookies can also raise privacy concerns and should
be used responsibly by website owners.
Digital Currency
Digital Currency
A digital currency is a type of currency that exists only in electronic form and is not
backed by any physical commodity or government.
• Decentralised
o Many digital currencies operate on a decentralised network; meaning
that they are not controlled by any central authority like a government
or financial institution
o Instead, transactions are verified and recorded on a public ledger
known as a blockchain
• Used for Transactions
o Digital currencies can be used for various transactions, including
purchasing goods and services online or transferring money
internationally
o They can also be used for investments or as a store of value
• Volatile
o Digital currencies can be highly volatile; meaning their value can
fluctuate rapidly over short periods of time
o This can make them risky investments and can also make it difficult to
use them as a stable store of value
• Examples include Bitcoin, Ethereum, Litecoin, and Ripple
Blockchain
• Blockchain is a digital ledger that records every transaction made with a
particular digital currency
o Each transaction is time-stamped and added to the blockchain in a
permanent and unalterable way
• Blockchain is a decentralised technology, meaning that it is not controlled by a
single entity or authority
o Instead, every participant in the network has a copy of the
ledger and can verify the transactions independently
• The blockchain is made up of "blocks" of transactions that are linked together
in a "chain" using cryptographic algorithms
o This creates a secure and tamper-proof record of every
transaction made with the digital currency
• Each transaction in the blockchain must be verified by multiple
participants in the network
o This verification process ensures that the transaction is legitimate
and prevents any fraudulent activity
Data Interception
• Data interception involves eavesdropping on communication channels to
intercept and steal sensitive information, such as passwords, credit card
numbers, or personal data
• The aim of data interception is to steal sensitive information for personal gain
or to use it for further cyber attacks
Hacking
• Hacking involves gaining unauthorised access to a system or network to
steal or manipulate data, disrupt services, or cause damage
• The aim of hacking can vary from personal gain to activism or cyber
espionage
Malware
Malware is malicious software designed to harm or gain unauthorised access to a
system or network. Types of malware include:
The aim of malware attacks can range from data theft to extortion or disruption of
services
Phishing
• Phishing involves the user is sent an email which looks legitimate
• This contains a link to a fake website where the user is encouraged to enter
their details
• The aim of phishing is to steal sensitive information for personal gain or to
use it for further cyber attacks
Pharming
• Pharming involves malware being downloaded without the user’s
knowledge
• This redirects the user to a fake website where they’re encouraged to enter
their personal details
• The aim of pharming is to steal sensitive information for personal gain or to
use it for further cyber attacks
Exam Tip
• A user needs to click on a link or an attachment to open the fake web page or
trigger a download of malicious code, and not just open the email
Social Engineering
• Social engineering involves manipulating individuals to gain access to
confidential information or to perform an action that benefits the attacker
• This can include techniques such as:
o This involves posing as someone else to gain trust or access to
sensitive information
o Attackers might pretend to be a co-worker, IT support personnel, or a
law enforcement officer to get people to divulge sensitive information or
perform an action they wouldn't otherwise do
o Baiting is a social engineering technique that involves enticing a victim
with a desirable item or promise to extract sensitive information or gain
access to a system
o Attackers might leave a USB drive with a tempting label, like "salary
information," in a public place and wait for someone to pick it up and
plug it into a computer
o Once the drive is connected to the computer, the attacker can access
sensitive information or install malware
o Pretexting involves creating a fake scenario to extract sensitive
information
o The attacker might pose as a bank representative and ask for personal
information to "verify your account”
o Impersonation
o Baiting
o Pretexting
Accidental Damage
Data could also be accidentally damaged in many ways:
Example Prevention
Loss of power Use a UPS
Liquids being spilt Don’t have water near the device
Flooding Keep device in a waterproof box when not is use
Use electrics safety and keep device in a fireproof
Fire
box when not is use
Hardware failure Correct care and maintenance of hardware
Software failure Making sure it is always up to date
Human error:
Add verification method for data deletion
•
Pressing delete by mistake
• Not saving data Set access levels for data to limit who can delete
• Not shutting down the computer correctly the data
Incorrect use of storage device Making sure device is ejected before removing
Exam Tip
• If you are given context in a question, you should apply your answer to the
scenario
• Back-up of data is not a method to help prevent the data being damaged. It
can replace the data if it is damaged, but it does not stop the data being
damaged
Anti-Malware
• Anti-malware solutions are used to prevent and remove malware, which is a
common type of security threat to data
• Anti-malware software includes anti-virus and anti-spyware programs,
which help to detect and remove malicious software from a computer system
• This software works by scanning the computer’s files and any files being
downloaded and comparing them to a list of known malware
• If any malware is found, it is quarantined to prevent the spread
• The malware is then deleted
Authentication
• Authentication is used to ensure that only authorised users can access data
• There are several methods of authentication:
o Passwords are used to protect sensitive data by preventing
unauthorised access. A strong password should be complex, unique,
and not easily guessed. Passwords should be changed regularly, and
users should avoid reusing passwords across multiple accounts.
o Biometrics uses biological data for authentication by identifying unique
physical characteristics of a human such as fingerprints, facial
recognition, or iris scans. Biometric authentication is more secure than
using passwords as:
▪ A biometric password cannot be guessed
▪ It is very difficult to fake a biometric password
▪ A biometric password cannot be recorded by spyware
▪ A perpetrator cannot shoulder surf to see a biometric password
o Two-factor authentication (2FA) requires users to provide two forms
of authentication before accessing data, such as a password and a
verification code sent to a mobile device. This provides an extra layer
of security and reduces the risk of unauthorised access. 2FA is widely
used to protect online accounts, such as email or banking.
• These methods help to prevent unauthorised access and protect sensitive
data
Automating Software Updates
• Automating software updates ensures that software systems are up-to-
date with the latest security patches, which helps to prevent security threats
• This is especially important for operating systems and software that are
frequently targeted by hackers
• It does this by scanning the Internet for known updates to software which
are installed on the computer
• If any updates are found, these can either install automatically or notify the
user to install them
Communications
• Checking the spelling and tone of communications is important to prevent
phishing attacks
URL
• Checking the URL attached to a link is another way to prevent phishing
attacks.
• Hackers often use fake URLs to trick users into visiting fraudulent websites
o e.g. http://amaz.on.co.uk/ rather than http://amazon.co.uk/
Firewalls
• A firewall can be software or hardware based
• It monitors incoming and outgoing traffic between the computer and the
network and keeps a log of the traffic
• The user sets criteria for the traffic (this is called the whitelist/blacklist) and
the traffic is compared with this
• The firewall will accept or reject the traffic based on this and an alert can be
sent to the user
• It can help prevent hacking and malicious software that could be a threat to
the security of the data
Privacy Settings
• Privacy settings are used to control the amount of personal
information that is shared online
• They are an important measure to prevent identity theft and other forms of
online fraud
• Users should regularly review their privacy settings and adjust them as
needed
Proxy-Servers
• Proxy-servers are used to hide a user's IP address and location, making it
more difficult for hackers to track them
• They act as a firewall and can also be used to filter web traffic by setting
criteria for traffic
• Malicious content is blocked and a warning message can be sent to the user
• Proxy-servers are a useful security measure for protecting against external
security threats as it can direct traffic away from the server
Physical Methods
o Physical methods are used to physically protect hardware that stores
sensitive data
o This can include:
▪ Locked rooms needing a key or card access
•
o
▪ CCTV
•
o
▪ Bodyguards
Backup
• This is the process of making a copy of files in case something happens to
the original ones
• Backing up data is important to protect against data loss due to hardware
failure, cyber-attacks, or other disasters
• Backups should be stored in a secure location, and multiple copies should
be made
• Regular backups ensure that data can be recovered in the event of a
security breach or data loss
Ethics
There are a number of ethical concerns when using the Internet:
• Addiction
o Aspects of the internet e.g. social media can cause this
• Breaching copyright
o Breaking the law by copying someone’s work
• Cyber bullying
o Using the internet to bully people
• Data protection
o A person’s data is not used according to the law
• Environmental effects
o Increased use of the internet increases the use of electrical power
• Fake news
o News stories that could be very misleading or harmful
• Inappropriate materials
o Materials that could cause harm/offence to people e.g. children
• Intellectual property theft
o Stealing other people's work
• Piracy
o Using piracy websites to gain content for free that should have been
paid for
• Plagiarism
o The copying of other people’s work without their permission
o Claiming someone else’s work as your own
• Privacy
o A person’s data could be leaked