Connectivity : Part 2

  • Created by: jordanb-h
  • Created on: 30-03-18 18:32
When you type in a website address what uses HTTP to ask the web server to send the files needed to show the webpage on your computer
the client (your browser)
1 of 39
What do Digital certificates certify?
the identity of the website your browser is communicating with
2 of 39
What is the protocol called that is used when sending confidential information over the Internet?
Hypertext Transfer Protocol over SSL (Secure Sockets Layer) or HTTPS. The data is encrypted so that it cannot be read by anyone except the recipient
3 of 39
State how HTTPS works (part 1)
the browser checks the site's certificate
4 of 39
State how HTTPS works (part 2)
the web server and your browser determines the encryption types that they can both use to understand each other
5 of 39
State how HTTPS works (part 3)
Your browser and the web server send each other unique codes to use when encrypting the information that is being sent
6 of 39
State how HTTPS works (part 4)
Your browser and the web server start talking to each other using the encryption
7 of 39
When you connect what to a network it is visible to all the other computers on the network?
a computer
8 of 39
When you connect to what your computer is visible to billions of computers around the world?
the Internet
9 of 39
State one way to prevent remote access?
use a firewall
10 of 39
What is a firewall?
is software that permits or blocks connections between your computers and other computers on the network according to the rules you have set. A firewall is not enough on its own because some malware work by shutting down your firewall
11 of 39
State an example of sensitive information users send across networks including the Internet
credit card information
12 of 39
State an example of sensitive information users send across networks including the Internet
personal details
13 of 39
State an example of sensitive information users send across networks including the Internet
sensitive company information
14 of 39
State an example of sensitive information users send across networks including the Internet
bank account information
15 of 39
State one way of keeping data safe
encryption
16 of 39
What is a Virus?
is a program designed to cause other computer programs to malfunction or stop working. Viruses can replicate themselves and can be passed on to other users in files and emails
17 of 39
State a precaution to take against viruses
install antivirus software and keep it updated
18 of 39
State a precaution to take against viruses
run regular scans of files on the computer
19 of 39
State a precaution to take against viruses
only download from trusted websites
20 of 39
State a precaution to take against viruses
only open emails and attachments from recognised senders
21 of 39
State a precaution to take against viruses
scan CDs, DVDs and memory sticks before accessing them
22 of 39
State a precaution to take against viruses
do not use pirate copies of CDs and DVDs
23 of 39
State a precaution to take against viruses
avoid file sharing websites
24 of 39
Data can be stolen or corrupted by who?
unauthorised users on a network
25 of 39
Most networks require a user to have what?
a username and password in order to prove their identity
26 of 39
What does a strong password consist of?
numbers, upper case and lower case letters and punctuation marks
27 of 39
To ensure that the user is human, and not a computer program they may be given what?
a captcha test
28 of 39
Data is at risk from what?
people physically accessing your computer and stealing it
29 of 39
When leaving your computer unattended you can use what in windows so that a password is required to start using it again?
the lock function
30 of 39
What can be used to fix a desktop computer or a laptop to a desk?
chains and locks. Having locks on doors and blinds are other simple ways of keeping equipment safe
31 of 39
What can be used in labels attached to items?
Radio Frequency Identification (RFID) chips. A scanner can read the chip and identify the product. It could sound an alarm if the item is being taken out of a building or shop
32 of 39
State one way of physically keeping people out
Use biometrics to identify people based on their physical characteristics
33 of 39
State one way of physically keeping people out
fit doors with security keypads and keep them locked
34 of 39
State one way of physically keeping people out
install a burglar alarm and fit monitors in every room
35 of 39
State one way of physically keeping people out
install closed circuit television (CCTV) cameras inside and out
36 of 39
State one way of physically keeping people out
require all people entering the building to authenticate their identity
37 of 39
State one way of physically keeping people out
issue swipe cards (which stores a person's details in the card stripe)
38 of 39
State one way of physically keeping people out
fit blinds so people can't see in
39 of 39

Other cards in this set

Card 2

Front

What do Digital certificates certify?

Back

the identity of the website your browser is communicating with

Card 3

Front

What is the protocol called that is used when sending confidential information over the Internet?

Back

Preview of the front of card 3

Card 4

Front

State how HTTPS works (part 1)

Back

Preview of the front of card 4

Card 5

Front

State how HTTPS works (part 2)

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar All resources:

See all All resources »See all ICT resources »