Professional Documents
Culture Documents
4. Phishing
5. Pharming
-malicious code installed on user’s hard drive / computer
-user is redirected to a fake website (where personal data may be obtained)
-without their consent and knowledge to steal their personal data
-protection by only trusting secure websites, e.g. look for https in URL
awabaqibb@gmail.com https://www.youtube.com/c/awabaqib/
GCSE CS (2210) / IGCSE CS (0478) P1 NOTES BY AWAB AQIB
6. Spyware
-software that gathers information by monitoring key presses
-on a user’s computer and relays the information
-back to the person who sent the software
-protection by installing anti-spyware and anti-virus
7. Spam
- Junk / unwanted email
– Sent to large numbers of people
– Used for advertising / spreading malware
– Fills up mail boxes
1. Encryption
awabaqibb@gmail.com https://www.youtube.com/c/awabaqib/
GCSE CS (2210) / IGCSE CS (0478) P1 NOTES BY AWAB AQIB
Stages through which a user accesses a secured website with SSL deployed
OR
How a browser identifies whether a website is Secured or Not
- the web browser attempts to connect to a web site which is secured by SSL
- the web browser requests the web server to identify itself
- the web server sends the web browser a copy of its SSL certificate
- the web browser checks whether the SSL certificate is trustworthy
- if it is then the web browser sends a message back to the web server
- the web server will send back acknowledgement the SSL encrypted session to begin
- the encrypted data is then shared securely between web browser and server
4. Firewall
-examines/monitors traffic to and from a user’s computer and a network/Internet
-checks whether incoming and outgoing traffic meets a given set of criteria/rules
-firewall blocks/filters traffic/website that doesn’t meet the criteria/rules
-logs all incoming and outgoing traffic
-can prevent viruses or hackers gaining access
-can be both software and hardware
-blocks/filters access to specified IP addresses/websites
-warns of attempted unauthorized access to the system
5. Proxy Server
-Prevents direct access to the webserver, sits between user and webserver
-If an attack is launched it, hits the proxy server instead
-can be used to help prevent DDOS (Distributed Denial of Service) hacking of webserver
-Used to direct invalid traffic away from the webserver
-Traffic is examined by the proxy server
-If traffic is valid the data from the webserver will be obtained by the user
-If traffic is invalid the request to obtain data is declined
-Can block requests from certain IP addresses
awabaqibb@gmail.com https://www.youtube.com/c/awabaqib/
GCSE CS (2210) / IGCSE CS (0478) P1 NOTES BY AWAB AQIB
7. Anti-Virus software
-Helps prevent data corruption or deletion
-Identifies / removes a virus in the system
-Scans a system for viruses
10.Physical methods
-Locked doors / cctv timeout / auto log off, to help prevent unauthorized access
12.Access rights
-Allows users access to data that they have permission to view
-Maintain a hierarchy of levels of users, each having different levels of access e.g. admin,
employee, guest
Biometric password
-A stored physical measurement e.g. fingerprint, retina scan, voice/face recognition
-That is compared to a previously scanned human measurement
awabaqibb@gmail.com https://www.youtube.com/c/awabaqib/