KEMBAR78
Chapter 5 IGCSE Computer Science | PDF | World Wide Web | Internet & Web
0% found this document useful (0 votes)
726 views4 pages

Chapter 5 IGCSE Computer Science

The document discusses SSL and how it provides secure connections, denial of service attacks, spyware and how it obtains data, viruses and their effects, how browsers check website security, the role of web browsers, how webpages are requested and displayed, how cookies store payment details, how firewalls protect against unauthorized access, how SSL connections are established, how proxy servers protect websites, and user concerns about cookies.

Uploaded by

tecshahzeb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
726 views4 pages

Chapter 5 IGCSE Computer Science

The document discusses SSL and how it provides secure connections, denial of service attacks, spyware and how it obtains data, viruses and their effects, how browsers check website security, the role of web browsers, how webpages are requested and displayed, how cookies store payment details, how firewalls protect against unauthorized access, how SSL connections are established, how proxy servers protect websites, and user concerns about cookies.

Uploaded by

tecshahzeb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Chapter 5

Describe the process of SSL and how it provides a secure connection?


 SSL is a security protocol
 It encrypts any data that is sent
 It uses digital certificates which is sent to the users browser that contains gallery’s public
key
 That can be used to authenticate the gallery
 Once the certificate is authenticated, the transaction will begin

Explain what is meant by a denial of service attack?


 Designed to deny people access to a website
 A large number of requests are sent to a server all at the same time
 The server is unable to respond to all the requests
 The server fails out as a result

Explain what is meant by a Spyware and how it used to obtain data?


 Type of malware
 Records keypresses
 Sends data to the third party
 Collected Data is analysed to obtain data

State what is meant by a virus and explain what could happen if a virus was
downloaded
 Software that can replicate itself
 It could cause the computer to crash
 It could delete files
 It could fill up the storage space
 It could spread to other devices on the network
Describe how a browser check that a website is secure
 Requests the web server to view the SSL certificate
 Receives a copy of the SSL certificate, sent from the webserver
 Check if SSL certificate is authentic
 Send signal back to the webserver that the certificate is authentic
 Starts to transmit data once the connection is established as secure

Describe the role of a web browser


 Allows user to view web pages
 Renders HTML
 Allows user to bookmark favorite web pages
 Allows multiple tabs
 Records history of web pages visited
 Stores cookies
 Has a homepage

Describe how webpages are requested and displayed


 Browser send the URL to the DNS using HTTP
 DNS finds the matching IP addresses for URL and sends IP address to the web browser
 Web browser sends request to IP address for web pages
 Web pages are sent from web server to browser
 Browser renders HTML to display web pages
 Any security certificates are exchanged

Describe how cookies can be used to store and automatically enter a users
payment details
 Web server sends cookie file to the users browser
 Users “””” details stored in encrypted text file
 Cookie file is stored by the browser on users HDD or SSD
 When user revisits the website, webserver requests cookie file and browser sends
cookie file back to the webserver
Describe how a Firewall could help protect against unauthorized access to the
data
 Monitors traffic coming into and out of the computer system
 Checks that traffic meets any specific criteria
 Blocks any traffic that does not meet the criteria
 Allows to block certain IP addresses
 Can close certain ports

Describe how an SSL connection is established


 Browser sends request to the webserver to request identification
 Web server sends it digital certificate
 Browser authenticates certificates
 If certificate is authentic, connection is established
 Any data send is encrypted using public and private keys

Describe how the Proxy server will help protect the website
 Acts a firewall
 Examines incoming and outgoing traffic
 Criterias for the traffic can be set
 Blocks any traffic that does not meet the criteria and can send a warning message to the
user
 Stops the website failing in a DoS attack

User concerns about cookies


 Might collect the data that the user does not know about so the user may feel their
privacy is affected
 Other websites could gain access to the cookies stored on a users computer
 Sensitive information stored in cookies could be intercepted in transmission
 Computer could be hacked to obtain data stored in cookies so payment information
could be stolen and used by a third party
Template Spyware
 User could have been sent an email with an link containing the spyware
 User could have clicked the link on an untrusted website
 When the link was clicked, spyware was downloaded onto the users computer
 Spyware recorded all the keylogs from the users keyboard
 Recorded keylogs are sent to the creator of spyware
 Key logs were analysed
 A common pattern in the keylogs could have allowed a password to be identified

You might also like