Chapter 5 The Internet and Its Uses
Chapter 5 The Internet and Its Uses
Sanjay
The differences between the internet and the World Wide Web (WWW)
The internet is a collection of interconnected networks all over the world
The world wide web is a massive collection of web pages which you access through browsers using the internet
World Wide Web (WWW) Internet
Definition A system of interconnected hypertext A global network of interconnected computer
documents and multimedia content networks that facilitates data exchange and
accessible via the Internet. communication.
Access Accessed through web browsers like Accessed through various means, including web
Method Chrome, Firefox, and Safari using URLs browsing, email, file sharing, online gaming, and
(Uniform Resource Locators). more.
Content and Primarily deals with the presentation and Serves as a vast infrastructure for data transmission,
Purpose retrieval of web pages, documents, and enabling various online services and applications, not
multimedia content. limited to web browsing.
The protocol is usually either http or https. The website address is:
The path is the web page, but is often omitted and it then becomes the root directory of the website (see example
below). The file name is the item on the web page.
+919596393635
Page 1
By: Mr. Sanjay
SSL (Secure Sockets Layer): SSL is an older protocol designed to ensure data security during transmission.
TLS (Transport Layer Security): TLS is the successor to SSL and is widely used to secure data transmission over the
Internet.
Over time, various vulnerabilities and security flaws were discovered in SSL, making it less secure. SSL is considered
deprecated and insecure for most purposes today. TLS was developed to address the security shortcomings of SSL.
The DNS process involves converting a URL (such as www.hotsedu.id) into an IP address the computer can understand
(such as 192.162.140.19).
Cookies
Cookies are small files or code stored on a user’s computer. They are sent by a web server to a browser on a user’s
computer. Cookies allow user tracking and maintain user preferences. Collected data can also be used to customise the
web page for each individual user.
Session cookies
Session cookies, also known as session-specific or temporary cookies, are a type of web cookie that are stored on a
user's device only for the duration of their web session.
Persistent cookies
These cookies remain in operation on the user’s computer even after the browser is closed or the website session is
terminated. Unlike session cookies, persistent cookies have expiration dates and can remain on the user's device for
extended periods or until manually deleted.
+919596393635
Page 2
By: Mr. Sanjay
+919596393635
Page 3
By: Mr. Sanjay
+919596393635
Page 4
By: Mr. Sanjay
3.
1. Internet
2. WWW
3. WWW
4. WWW
5. Internet
4. Persistent cookies are referred to as tracking cookies because they:
a. Collect data over an extended period, enabling long-term tracking of user behavior.
b. Enable targeted advertising by tracking user activity and delivering ads based on their interests and behavior.
Digital currency exists purely in a digital format. It has no physical form unlike conventional currency (for example,
$, £, €, and ¥).
It has made it possible to bank online (for example, using PayPal) or via a smartphone app (for example, google
pay). This is all possible because money only exists as data on a computer system, but it can be transferred into
physical cash if we need it.
Cryptocurrency
Cryptocurrency uses cryptography to track transactions; it was created to address the problems associated with
the centralisation of digital currency.
Traditional digital currencies are regulated by central banks and governments. This means all transactions and
exchange rates are determined by these two bodies. Cryptocurrency has no state control and all the rules are set
by the cryptocurrency community itself.
Unlike existing digital currencies, cryptocurrency transactions are publicly available and therefore all transactions
can be tracked and the amount of money in the system is monitored.
The cryptocurrency system works by being within a blockchain network which means it is much more secure.
+919596393635
Page 5
By: Mr. Sanjay
Blockchaining
Blockchain consists of a number of interconnected computers but they are not connected to a central server. All
transaction data is stored on all computers in the blockchain network.
Whenever a new transaction takes place, all the networked computers get a copy of the transaction therefore, it
cannot be changed without the consent of all the network members. This effectively removes the risk of security
issues such as hacking.
It works as follows
1. Checks if the password is one of the most common ones used (the five most common are: 123456,
password, qwerty, 111111 and abc123).
2. A strong word list is used to compare with the password.
+919596393635
Page 6
By: Mr. Sanjay
Data interception
Data interception is a form of stealing data by tapping into a wired or wireless communication link. The intent is to
compromise privacy or to obtain confidential information.
Packet sniffer
A packet sniffer is a tool that captures and analyzes data packets on a wired network. It's used for network monitoring,
troubleshooting, security, and protocol analysis.
When used ethically, it helps manage networks effectively. However, unauthorized or malicious use can lead to privacy
violations and legal issues.
Hacking
Hacking is the act of gaining illegal access to a computer system without the user’s permission. This can lead to identity
theft or the gaining of personal information; data can be deleted, passed on, changed or corrupted.
Malicious hacking, takes place without the user’s permission, and is always an illegal act.
Ethical hacking occurs when companies authorise paid hackers to check out their security measures and test how robust
their computer systems are to hacking attacks.
+919596393635
Page 7
By: Mr. Sanjay
Malware
Malware is harmful software designed to damage, disrupt, or gain unauthorized access to computer systems and devices.
Viruses
Viruses are programs or program code that copies themselves with the intention of deleting or corrupting files, or causing
a computer to malfunction for example, by deleting .exe files, filling up the hard drive with ‘useless’ data, and so on.
Viruses need an active host program on the target computer or an operating system that has already been infected, before
they can actually run and cause harm.
Worms
Worms are a type of stand-alone malware that can self-replicate. Their intention is to spread to other computers and
corrupt whole networks. Worms may carry a payload, which can be a malicious function or code that is executed on
infected systems. This can include activities such as data theft, unauthorized access, or other types of damage.
Trojan horse
A Trojan horse is a program which is often disguised as legitimate software but with malicious instructions embedded
within it. They need to be executed by the end-user and therefore usually arrive as an email attachment or are downloaded
from an infected website. Once installed on the user’s computer, the Trojan horse will give cyber criminals access to
personal information on your computers, such as IP addresses, passwords and other personal data.
+919596393635
Page 8
By: Mr. Sanjay
Spyware
Spyware is software that gathers information by monitoring a user’s activities carried out on their computer. Spyware
collects a wide range of information, such as keystrokes, web browsing habits, login credentials, personal files.
Adware
Adware is a type of malware which:
Ransomware
Ransomware are programs that encrypt data on a user’s computer and ‘hold the data hostage’. The cybercriminal waits
until the ransom money is paid and, sometimes, the decryption key is then sent to the user. It has caused considerable
damage to some companies and individuals.
Phishing
Phishing occurs when a cybercriminal sends out legitimate-looking emails to users. The emails may contain links or
attachments that, when initiated, take the user to a fake website; or they may trick the user into responding with personal
data (for example, bank account details or credit/debit card details).
+919596393635
Page 9
By: Mr. Sanjay
Smishing
Smishing is a type of cyberattack or scam that involves the use of text messages (SMS) or other messaging services to trick
individuals into revealing sensitive information, clicking on malicious links, or downloading malicious content. The term
"smishing" is a combination of "SMS" (Short Message Service) and "phishing," reflecting the nature of the attack.
Vishing
Vishing is a type of cyberattack or social engineering scam that occurs over the phone, specifically voice communication,
to trick individuals into revealing sensitive information, such as personal identification numbers (PINs), credit card
numbers, or login credentials. The term "vishing" is a combination of "voice" and "phishing," reflecting the nature of the
attack.
Pharming
Pharming is malicious code installed on a user’s computer or on an infected website. The code redirects the user’s browser
to a fake website without the user’s knowledge. Unlike phishing, the user doesn’t actually need to take any action for it to
be initiated. The creator of the malicious code can gain personal data, such as bank details, from the user.
+919596393635
Page 10
By: Mr. Sanjay
1. Data Interception: Data sent over the internet can be intercepted, compromising sensitive information.
2. Data Breaches: Unauthorized access to systems can lead to data breaches, resulting in financial losses and
reputation damage.
3. Malware and Phishing: Phishing emails and malware can compromise data and system integrity.
b. Threat Explanation:
1. Data Interception Threat: Attackers can access and misuse sensitive data, leading to potential legal and
financial consequences.
2. Data Breaches Threat: Unauthorized access can result in data theft, manipulation, and ransom attacks,
causing financial and reputational harm.
3. Malware and Phishing Threat: These attacks can disrupt systems, steal data, and compromise data
integrity.
c. Mitigation Strategies:
1. Data Interception Mitigation: Use encryption, VPNs, and employee training to protect data in transit.
2. Data Breaches Mitigation: Implement access controls, regular audits, intrusion detection, and keep
software updated.
3. Malware and Phishing Mitigation: Train employees to recognize and report threats, use email filters, and
maintain up-to-date systems and security software. Have an incident response plan in place.
+919596393635
Page 11
By: Mr. Sanjay
1. John should create passwords that are complex, containing a mix of uppercase letters, lowercase letters,
numbers, and special characters (e.g., !, @, #, $).
2. Longer passwords are generally stronger. Aim for a minimum of 8 to 12 characters.
3. Avoid using easily guessable words, such as names, dictionary words, or common phrases.
+919596393635
Page 12
By: Mr. Sanjay
Social engineering
Social engineering occurs when a cybercriminal creates a social situation that can lead to a potential victim dropping
their guard. It involves the manipulation of people into breaking their normal security procedures and not following
best practice.
Levels of access
1. Public access (this refers to the data anyone from the general public can access)
2. Friends (only people identified as ‘friends’ by the owner of the data can see certain data)
3. Custom (this allows the user to further refine what data can be seen by ‘friends’ allowing them to exclude
certain content from selected people)
4. Data owner (this is the data that only the owner of the data can see).
+919596393635
Page 13
By: Mr. Sanjay
Anti-spyware
Anti-spyware software detects and removes spyware programs installed illegally on a user’s computer system.
1. Password Authentication: Users provide a username or email and a secret password to prove their identity. It's
one of the most widely used forms of authentication.
2. Biometric Authentication: This method verifies identity using unique physical or behavioral characteristics like
fingerprints, facial recognition, or iris scans.
3. Two-Factor Authentication (2FA): 2FA combines two different authentication methods, such as a password and a
one-time code sent to a mobile device, for enhanced security.
Weak
Weak
Weak
Strong
weak
+919596393635
Page 14
By: Mr. Sanjay
Senior Staff: Grant full access rights to the entire system, allowing them to view and manage security, flight
bookings, passenger lists, administration, and customer services.
Customers: Limit customer access to specific modules, like flight times (arrivals and departures) and duty-free
offers.
b. Use firewalls, anti-spyware and antivirus software.
Keep systems updated with security patches.
Implement email filtering and maintain backups.
Biometrics
Biometrics relies on certain unique characteristics of human beings; examples include:
• Fingerprint scans
• Retina scans
• Face recognition
• Voice recognition
Fingerprint scans
Fingerprint scans Images of fingerprints are compared against previously scanned fingerprint images stored in a database;
if they match, then a user has been correctly recognised. The system compares patterns of ‘ridges’ and ‘valleys’ that are
unique.
+919596393635
Page 15
By: Mr. Sanjay
+919596393635
Page 16
By: Mr. Sanjay
a.
1. Face recognition can be faster than retina scans, as individuals can be recognized as they approach the entry
point without the need for direct eye contact.
2. Since the system is triggered by a motion sensor, face recognition can be seamlessly integrated. As soon as a
person is detected by the sensor, their face can be captured and matched against the database for access
control.
b. Fingerprint scanner
c.
Advantages Disadvantages
1. Hands-free operation 1. Accuracy and reliability issues
2. Enhanced accessibility 2. Limited functionality
3. Multilingual support 3. Privacy concerns
Two-step verification
Two-step verification requires two methods of authentication to verify who a user is. It is used predominantly
when a user makes an online purchase using a credit/debit card as payment method.
+919596393635
Page 17
By: Mr. Sanjay
Firewalls
Firewalls are the primary defence to any computer system to help protect it from hacking, malware (viruses and
spyware), phishing and pharming.
It sits between the user’s computer and an external network and filters information in and out of the computer.
This allows the user to decide whether or not to allow communication with an external source and it also warns
a user that an external source is trying to access their computer.
There are certain circumstances where the firewall can’t prevent potential harmful ‘traffic’:
1. It cannot prevent individuals, on internal networks, using their own hardware devices (e.g. Modems,
smartphones) to bypass the firewall
2. Employee misconduct or carelessness cannot be controlled by firewalls (for example, control of
passwords or user accounts)
3. Users on stand-alone computers can choose to disable the firewall, leaving their computer open to
harmful ‘traffic’ from the internet.
Proxy servers
Proxy servers act as an intermediate between the user and a web server:
+919596393635
Page 18
By: Mr. Sanjay
SSL certificate
The term SSL certificate was mentioned in Figure 5.23. An SSL certificate is a form of digital certificate which is
used to authenticate a website. This means any communication or data exchange between browser and website
is secure provided this certificate can be authenticated.
1.
+919596393635
Page 19
By: Mr. Sanjay
2. Below are the steps how SSL/TLS works
a. Browsers send a request to the webserver. In this request, it specifies that it wants to use SSL/TLS for secure
communication.
b. The webserver, upon receiving the request, responds by sending its SSL/TLS certificate to the browser.
c. The browser then checks the certificate's validity, including verifying the certificate's digital signature and
ensuring it hasn't expired.
d. If the certificate is valid, the browser generates a random symmetric encryption key and encrypts it with the
server's public key (from the certificate). This ensures that only the server, possessing the corresponding
private key, can decrypt this session key.
e. The server decrypts the session key using its private key.
f. Now, both the browser and the server have the same symmetric session key, which they will use for the
remainder of the communication.
3. Here is what you should look out
a.
1. Check for suspicious or misspelled sender addresses.
2. Be cautious of emails creating panic with threats or urgent requests.
3. Phishing emails often contain language errors.
b.
1. The email id in “from” field has not a valid domain (unprofessional)
2. In the “To” field the name of the customer should display. How it is possible that a company is not aware
of the names of its customers?
3. The message has language mistakes (“we not” should be written as “we are not”.
4. The email requests an immediate resubmission of account details without offering a clear explanation
of the issue.
I. A cookie is a small piece of data stored on a user's computer by a website, often used for tracking and
remembering user preferences and activity.
II. A session cookie is temporary and expires when the user's browser is closed, while a persistent cookie
remains on the user's device for a specified duration, even after the browser is closed.
III.
• They store items in a shopping cart, allowing users to return to a website and complete a purchase
later.
• They enable ad networks to track user behavior and display personalized advertisements.
• Persistent cookies help websites collect long-term data on user interactions for analytics and
improvement.
+919596393635
Page 20
By: Mr. Sanjay
a. Spyware is malicious software that secretly infiltrates a computer, often through deceptive means, to
monitor and collect user data without their consent, such as browsing habits, login credentials, or personal
information, which is then typically sent to a third party for nefarious purposes.
b. One method that could be used by the online bank to reduce the impact of spyware when logging on is:
2FA adds an additional layer of security to the login process. After entering their username and password
on the web page, users are required to provide a second piece of information, such as a one-time code
generated by a mobile app, received via SMS, or obtained from a hardware token.
c. A firewall acts as a barrier between a company's internal network and external networks like the internet.
It monitors incoming and outgoing network traffic and applies predetermined security rules. This helps
protect against unauthorized access to data by blocking malicious or suspicious incoming connections and
preventing unauthorized data leaks, effectively controlling and filtering traffic to ensure only legitimate and
authorized data flows into and out of the network.
d. Proxy server and Anti-virus / anti-spyware
+919596393635
Page 21
By: Mr. Sanjay
+919596393635
Page 22
By: Mr. Sanjay
4A. C E A B D
4B. When students arrive at school, they place their finger on a fingerprint scanner at the designated checkpoint,
such as the entrance. The scanner captures their fingerprint.
The captured fingerprint is compared to the stored templates in the system's database. If there's a match, the
system marks the student as present. If there's no match, it records the absence.
+919596393635
Page 23
By: Mr. Sanjay
5b.
Stage 1 – The victims are identified; information about victim gathered and method of attack decided
Stage 2 – At this stage the victim is being targeted (either through email, phone call, Trojan horse and so on; it all
depends on who the victim is)
Stage 3 – The attack on the victim is now executed allowing the cybercriminal to obtain the information or to cause
the disruption decided on at Stage 1
Stage 4 – When the cybercriminal has decided they have what they wanted they try to remove all traces of the
malware to cover their tracks.
+919596393635
Page 24
By: Mr. Sanjay
5c.
i. Digital currency is like money on the internet, and it's not controlled by any government, while traditional
currency is the physical money you use every day, like coins and paper bills, and it's managed by the government.
ii.
6a.
• HTML structure refers to the organization and layout of content in a web page, including elements like
headings, paragraphs, lists, images, links, and their hierarchical arrangement.
• HTML uses html tags to define the content's structure and semantics.
6b.
+919596393635
Page 25
By: Mr. Sanjay
+919596393635
Page 26