You are on page 1of 18
> CAMBRIDGE IGCSE™ & O LEVEL COMPUTER SCIENCE: COURSEBOOK ‘Ask your teacher if you are allowed to use a packet tracer. Your teacher may want to complete this activity together as a class. Use the packet tracer to send data to another device and look at the data that the packet tracer software provides. What kind of information does it give you? What route did your packets take to get to the destination device? 2.2 Packet switching You have learnt that data is broken down into packets to be sent from one device to another. The process of transmitting these packets is called packet switching. In this process, each packet of data is sent individually from one device to another. There could be several pathways across a network that the packets could be transmitted Each data packet could be sent along a different pathway. A router is the device that controls which pathway will be used to transmit each packet. You will learn more about how a router does this later in the chapter. Look at the diagram of a network in Figure 2.2: Router] Router! RRouter| Device 3 Device Router] Router Figure 2.2: A network “The packets of data start at device A, they could be transmitted down any of the pathways between device A and device B. Each packet can be sent using a different pathway, When a packet reaches a router, the router decides which pathway to send the packet along next. This will continue until all the packets have arrived at device B. It is likely that the packets will arrive out of order. Once all packets have arrived, they are reordered to recreate the file, KEY WORD packet switching: a method of transmitting data packets across a network. Each data packet is able to take an individual pathway ‘across the network network: computers and devices that are joined together using cables or wireless technology. router: a network component that examines a data packet to obtain its destination address and then forward the packet to this address. > CAMBRIDGE IGCSE™ & O LEVEL COMPUTER SCIENCE: COURSEBOOK 2.3 Methods of data transmission _ nny el bender ernie ‘one device to another, but there are actually several. You need to understand how data is transmitted using each of these methods, These include: *sevial + parallel + simplex © halFduplex + fullduplex. Serial and parallel data transmission involve the number of wires that are used to transmit the data, and how many bits of data are sent at a time, Serial data transmission In serial data transmission, data is transmitted using a single wire, Each bit of data is transmitted one at a time along the single wire. Figure 2.3 shows an example: 11, 0_, 0_, Device A Device 8 Each bit of data is transmitted one at @ time along a single wire Figure 2.3: Serial data transmission There are several advantages and disadvantages of serial data transmission, see Table 2.1: As data is sent one bit at a time, ‘As data is sent one bit at a time, the should arive in order of sequence. This | transmission of data is slower. means there is less chance of the data being skewed As data is sent along a single wiro, ‘Additional data may need to be sent to there is less chance of interference. This means there is less chance of error in the data, indicate to the receiving device when the data transmission has started and stopped. These are called a start bit anda stop bit. Only one wire is needed for a serial transmission cable, therefore, itis cheaper to manufacture and also cheaper to buy. Table 2.1: Advantages/disadvantages of serial data transmission 38 > serial: a transmission method where data is sent one bit at a time down a single wire. paral transmission method where data is sent multiple bits at a time down multiple wires. interference: disruption, such as electromagnetism, to data when itis, ‘transmitted. Serial transmission has less chance of data being skewed and less chance of interference. ‘This makes it more suitable for the transmission of data over long distances. Parallel data transmission In parallel data transmission, data is transmitted using multiple wires. Multiple bits of data are transmitted along each wire atthe same time, Figure 2.4 shows an example: a 1-1 20 0 > O +1 —s1—+0 dont ot oso tt Device 8 1 150 1.0 +050» Opt pt pt Multiple bits of data are transmitted at the same time, along multiple wires Figure 2.4: Parallel data transmission There are several advantages and disadvantages of parallel data transmission, see Table 2.2: ‘As data is sent multiple bits at the __| As data is sent multiple bits at the same time, the transmission of data is quicker. same time, bits do not arrive in order and need to be reordered after transmission, This increases the risk of the data being skewed. Many computers and devices use parallel data transmission to transmit data internally. Therefore, there is no requirement to convert this to serial data transmission to transmit the data across a network. ‘As data is sent along multiple wires, there is more chance of interference. This means there is more chance of error in the data Multiple wires are needed for a parallel transmission cable, therefore, it is more expensive to manufacture and also more expensive to buy. Table 2,2: Advantages/disadvantages of parallel data transmission Parallel transmission has an increased chance of data being skewed and an increased, chance of interference. This makes it more suitable for the transmission of data over shorter distances, This is often limited to approximately 5 metres > CAMBRIDGE IGCSE™ & O LEVEL COMPUTER SCIENCE: COURSEBOOK Question 5 A marketing company prints leaflets to deliver to people's houses. The leaflets are designed on a computer and sent to a large printer that is 3 metres away. Large numbers of leaflets need to be printed in a short period of time, to makes sure that they are ready for detivery. Would you use a serial or a parallel data transmission cable to connect the computer to the printer? Why would you choose this type of cable? ‘Simplex, half-duplex and full-duplex transmission involve the direction in which the dat: iransmitted. method where data . eos is transmitted in a Simplex data transmission single direction only. In simplex data transmission, data is transmitted from one device to another in one half-duplex: a direction only. Figure 2.5 shows an example: transmission method where data is transmitted in both directions, but only one direction at a DeviceA |, Device B time. full-duplex: a transmission method where data is Figure 2.5: Simplex data transmission aneeiiad Te bo . directions at the ‘You would only use this type of data transmission when there is no need to send data same time. both ways between the devices. One example is connecting a keyboard to a computer. ‘Simplex data transmission can be used to do this as data only needs to be sent from the keyboard to the computer, so that the computer screen can display the keys that are pressed. There is no reason why the computer Would need to send data to the keyboard, so a simplex data transmission connection is used. Figure 2.6: Simplex data transmission is used between a computer and a keyboard 40 > 2 Data transmission Half-duplex data transmission In half-duplex data transmission, data can be transmitted in both directions between the devices, but only one direction ata time. Figure 2.7 shows an example Device A Device B IF data is being transmitted from Device A to Device B, then data cannot be transmitted from Device B to Device A, at the same time, Device A, Device B data is being transmitted from Device B to Device A, then data cannot be transmitted from Device A to Device B, at the same time. Figure 2.7: Hall-duplex data transmission You would use this type of data transmission when you need to send data in both directions between the devices, but there is no requirement for this to be at the same time. It can also be used when the communication between two devices needs to have ‘thigh level of performance. This is when two half-duplex connections can be sct up between devices to allow data to be transmitted in both directions at the same time, but using two different channels of communication. Can you work out how this would be set up? Use the internet to research how half-duplex data transmission is used to create a Wi-Fi connection. Why is half-duplex, rather than full-duplex data transmission used in Wi-Fi connections? Li dabetulnicedicee duplex data transmission Full-duplex data transmission In full-duplex data transmission, data can be transmitted in both directions between the devices, at the same time, Figure 2.9 shows an example: > camBRinGe IGCSE™' & 0 LEVEL COMPUTER SCIENCE: COURSEBOOK Device A Device B Figure 2.9: Full-duplex data transmission ‘You would use this type of data transmission when it is essential for data to be both sent and received by each device, at the same time. One example is a telephone conversation. ‘The person speaking into Device A can speak at the same time as the person speaking to Device B. It may bea little bit of a chaotic conversation if you both try and speak at the same time all the time though! However, during most conversations, people do sometimes speak at the same time, so full-duplex data transmission is needed. When a connection is created between two different devices it will either be a serial or parallel data connection, It will also be a simplex, half-duplex or full-duplex connection ‘This means that a connection can be, for example, a serial simplex connection, or a parallel half-duplex connection, or possibly a serial full-duplex connection. You need to ‘understand when each of the different methods of transmission are most suitable, Questions 6 — Which method of data transmission sends data along a single wire? 7 Which method of data transmission sends data multiple bits at a time? 8 If a data transmission connection sends data one bit at a time, in both directions, but not at the same time, what kind of data transmission methods are used? 9 What are two advantages of serial data transmission? 10 What are two disadvantages of parallel data transmission? 11 A business manager transmits data about its customers to a central file server. The file server is 100 metres away from the business manager’ office. They need to be able to send and receive customer data to and from the server, at the same time. The accuracy of the customer's data is imperative. Which methods of data transmission should be used to create the connection between the business manager's computer and the file server? Why would you choose those methods? ACTIVITY 2.4 Write a data transmission scenario like the one given in Question 11. Think about which data transmission methods could be used for your scenario and why they would be the most suitable. Peer Assessment Give the scenario to a friend and ask them which data transmission methods they would use. Are they the same methods that you thought should be used? If you have chosen different methods, discuss and come to an agreement about which methods should be used. If you chose the same methods, see if you had the same reasons for choosing those methods. 2)» 2 Data transmission There are several error detection methods that can be used, these inelude: © parity check checksum © echo check, Each of these methods is designed to check for errors after the data has been transmitted from one device to another. Parity check ‘A parity check ean use an odd or even check method. Each byte of data has 7 bits and parity check: a type 1 extra bit that is called a parity bit (see Figure 2.11). The parity bit is normally the of error detection first or last bit of data in the byte. method that adds an additional bit to each HoOuOOUL byte to create an odd oreven sum. Parity bt 7 bits of data Figure 2.11; The parity bit isthe firs bit of data in this byte Before transmission begins, the parity check is set to be either odd or even parity. The number of 1s in the 7 bits of data is totalled. In the example in Figure 2.11, the result of that would be 2. If an odd parity check is used, then a 1 is added as a parity bit, This is because all the Is in the byte now add up to 3, which is an odd number. If an even parity check is used a parity bit of O would have been added instead. This is beeause all the Is in the byte would then add up to 2, which is an even number. When the parity bit has been added to each byte, the data can be transmitted. After transmission, the receiving device will check each byte of data for errors. If an odd parity check has been used and the device finds a byte that has an even number of 1s, then it knows that an error has occurred with this byte of data. The error is detected! Questions 17 Which of these bytes would have been transmitted incorrectly if an even parity ccheck has been used? a 1o1lto11 b o1tioit © 10101000 18. Which of these bytes would have been transmitted incorrectly if an odd parity ccheck has been used? a 00110001 b 10110101 © 10001000 19 Can you think of an instance in which an error could oceur in the data, but this would not be detected by a parity check? > CAMBRIDGE IGCSE™ & © LEVEL COMPUTER SCIENCE: COURSEBOOK component within the CPU called the memory data register (MIDR). This is also an example ofa register inthe CPU. The instruction is sent to the MDR using the data bus, When the MDR has received the instruction, it sends it tothe current instruction reister (CIR), This is another example of a restr in the CPU. The MDR uses the : dat bus to send the instruction tothe CIR. This registers part of acomponent within | Ong OTS the CPU called the contol unit (CU). Itis the CU that is responsible forthe next stage | Cpu har holes the of the eyee, the decode stage. memory data data or instruction Figure 3.4 shows the operation of the fetch stage of the cycle: that are fetched from RAM. ——— I data bus: wires used cpu PC | for the transmission of data and instructions between components “ADDRESS BUS ina computer. MAR current instruction register (CIR): a register thats built DATA BUS into the CU that holds the current instruction thatis being cu earl processed in the CPU BUS control unit (CU): oR the component in the CPU that controls all the operations in the CPU. [ADORESS| RAM iow the fetch stage operates instruction set: a set of commands that can be processed by a certain CPU. Draw a diagram like the one given in Figure 3.4 to see if you can draw and label the process for the fetch stage of the cycle. 3.3 The decode stage ‘The decode stage of the cycle begins when the instruction is received by the CU. The CU is the unit in the CPU that decodes the instruction. The instruction needs to be decoded so that the CPU can understand what is required to execute the instruction, To decode an instruction the CU uses an instruction set. This is a set of all the ‘commands that are understood and can be processed by the CPU. These commands are in machine code. Once the instruction is decoded using the instruction set, it can now be executed. 3.4 The execute stage ‘The execute stage is when any actions that are required for the instruction are carried cout. This i likely to involve some mathematical and logical calculations. If these kinds PSS NAL SAG Sn i 58 > > CAMBRIDGE IGCSE™ & © LEVEL COMPUTER SCIENCE: COURSEBOOK Four pages of data are sent to RAM ‘There is only space for 3 pages in RAM. Page C isn’t immediately needed 50 itis sent to virtual memory. a| [=| [fe] [e Virtual Memory Hard drive RAM Page Ais sent to the CPU to be processed. cpu Page C is now required, s0 it can be sent back to RAM. Figure 3.13: Pages of data are transferred to the virtual memory so that RAM doesn't become full If the RAM became full and the computer did not have the ability to transfer pages of data to the virtual memory, this could cause it to crash, as it may not be able to complete the task itis currently working on. 3.9 Cloud storage Despite a common misconception that many people have, cloud storage does not store | cloud storage: data ‘our data somewhere up in the clouds. So how did it get that name? It is more in relation | storage that is owned to the very large collections of data that are stored being like clouds of data, think by a third party and clouds of millions of raindrops! accessed by the user, {As technology has developed, and continues to do so, people have found that they want | 489g the internet. and need to store larger amounts of data, and data storage is quite expensive to buy, server: a component keep and maintain. ‘that acts as a central resource for the storage of data and applications or for providing a service. ‘You might be able to make sure that your 2 Terabyte hard drive at home is safe in your hhouse and is checked regularly for security issues, but it’ likely you only have a relatively small amount of data to store. Some multinational businesses have huge amounts of data to store. This ean require large rooms that are needed to house expensive hardware, such as computer servers, to store all the data that the company requires. This could be the details of millions of their customers and all the online transactions they have made to buy products. They would also need staff to maintain this equipment and keep that data safe, These kinds of costs could amount to many thousands of pounds a year for a business. Therefore, cloud storage offers them an alternative, > CAMBRIDGE IGCSE™ & O LEVEL COMPUTER SCIENCE: COURSEBOOK Figure 5.5 shows an example of a URL: ups fan, cambridge.org feducation “There is a whole process involved in a Se ee requesting and retrieving web pages that Protocol domain webpage | domai ‘you need to understand, the URL and its name name (ONS): a special three components are fundamental to this Figure 5.5: The components of a URL server that contains a process. So how is a web page requested —_——————_ OOO database of domain and retrieved by our computers? names and their slow the procs te user opens thir web browsorand pes the URLintoshe | Seeetna address bar The web browser then sends the URL for the website to the domain name server (DNS). The DNS is a special kind of server that stores all the different domain web server: a hames (part of the URL shown in Figure 5.5) along with their equivalent IP address. network component ‘The DNS looks through its database of domain names to find the equivalent IP vuhere the web pages address. As you can imagine, there are billions of websites, so these are not all stored for a website are ‘ona single DNS. Therefore, the first DNS will search its database and if it doesn’t stored. find the domain name, it sends it to the next DNS. This will happen until the domain name is found, or if it is not found, a message is sent back to the web browser to say hypertext transfer that the website is not found. When the DNS find the domain name, it sends the protocol (HTTP): a equivalent IP address back to the web browser — the IP address of the web server that protocol that is used stores the website, This process is summarised in Figure 5.6, for the transmission of web pages and DNS searches related data across veel fe comin the internet. sends URL to ce hypertext markup ene URL iS coer language (HTML): ace a scripting (web authoring) language that is used to create web pages, cascading style sheet (CSS): a scripting language aa that is used to create a presentation template for a web page. It includes what kind of font and colour text will appear on the igure 5.6: A web browser requests an IP address from a DNS ‘The web browser receives the IP address for the website from the DNS. It now knows where to find the website. The web browser sends a request to the web server to ask for the web page from the website It uses a protocol called the hypertext transfer webpage protocol (HTTP) to send the request to the web server. Each web page is created active script: this is using hypertext markup language (HTML), eascading style sheets (CSS) and may the script that is used include active seript such as JavaScript. When the web server receives a request for a ‘web page, it sends the data for the website, including the HTML, CSS and any active seript, back to the web browser using the HTTP, The web browser then renders the HTML and CSS and runs any active script to display the web page. This process is summarised in Figure 5.7. to produce any of the interactive elements of aweb page. on S 5 The internet and its uses Web browser uses the IP address to send a request to the web server 10 ‘obtain the data for the web page NY Web browser renders the HTML Data for web page and CSS and runs the active script to display the web page Request for web page Questions 1 Whatisa URL? ‘2 = What is an IP address? 3. What are the three main parts of a URL? Another protocol can be used to request the data for the web pages that will require an igure 5.7: The web browser requests @ web page and renders the HTML and CS Web server sends the data, including HTML, CSS and active script to the web browser KEY WORDS hypertext transfer protocol secure (HTTPS): a secure version of the HTTP | that encrypts data for transmission. encryption: a method of securing data for storage or transmission that scrambles itand makes it meaningless. CAMBRIDGE IGCSE™ & © LEVEL COMPUTER SCIENCE: COURSEBOOK ‘This process is summarised in Figure 5.8. Web browser asks the web server to send its digital certificate Web server sends its digital conficate to the web browser Request for digital certificate Crap dot wari EE, <— eb bowser utente be ect authentic, encrypted data transmission Digital certificate sent igure 5.8: A web browser requests a digital certificate to allow encrypted data transmission ‘The HTTPS protocol is the standard HTTP protocol with a layer of security combined, that is either the secure sockets layer (SSL) ot transport layer security (TLS) | secure sockets layer protocol. TLS isa newer version of SSL. This is the protocol that is used to ereate the (SSL) protocol: a eneryption. You can check visually whether a website is secure by seeing if it uses the type of protocol HITTPS protocol. IF it does, you will see this atthe start of the URL in the address bar | that encrypts data in the web browser. You will also see a small padlock before the start of the URL. for transmission. It ‘Most web browsers also have an option for you to view the digital certificate for the is the protocol, that website. This is often found by right clicking your mouse on the padlock. is combined with the HTTP to create Renae HTTPS. Use the internet to research why the TLS protocol was developed to replace transport layer the SSL protocol security (TLS) protocol: an updated version of the SSL . protocol, Questions render: the method 4 What isa digital certificate and how is it used in the HTTPS protocol? of processing all the 5 Does the web browser or the web server authenticate the digital certificate? web page data, such as HTML, to display the web page. 5.3 The purpose of a web browser ‘You may have noticed that the web browser has a key role in the requesting and retrieving of web pages The main purpose of a web browser is that iti a software application that allows you to access information that is available on the world wide web. As you learnt previously, it does this by requesting the HTML files and other data required to create the ‘web page, then renders this data so that you can view the web page. One thing to note about a web browser is that some people confuse it with a search engine. This is because some web browser software development companies also eT 100 > Cookies are created when you visit a web page and then they are stored by your web browser. There are two main types of cookie, session cookies and persistent cookies. Session cookies are temporary files that are created when you visit a web page. As type of cookie that soon as you close your web browser, these cookies are deleted. If you open your web | is deleted when browser again and go back to the same web page, the web page will not recognise the web browser is ‘you. That means that it will not be sent any cookies by your web browser, about closed. ‘your personal details or preferences, as this type of cookie are not saved by the browser once itis closed. You might have experienced this type of cookie when you are online shopping. You may have added several items that you wanted to buy toa shopping curt on a website, you then close your web browser. You then open your web browser ata later date and go back to the web page, only to find that the items you put in the online shopping eart are no longer there. This is because it is a session cookie that is used to temporarily store them. This process is summarised in Figure 5.13. persistent cookie: type of cookie that is stored by the web browser until itis deleted by the user or because it has expired. User visits the web page that is stored on the web server Session cookies are temporarily stored by user's web browser until the browser is. closed and the session ‘ends. The cookies are ‘then deleted Session cookies are sent from web server to user's web browser Persistent cookies are permanent files that are created when you visit a web page. ‘These are stored by your web browser onto the hard drive of your computer. ‘When you visit the same web page again, the cookie file is sent back to the web server that stores the web pages to provide the data about your personal details or preferences. This will allow your login details to be automatically entered, for example, These cookies will remain stored on your hard drive until you manually delete them, or your browser deletes them because they have expired. Each persistent cookie file is sent with an expiration date. When this expiration date is reached, the web browser will delete this cookie from your hard drive. This process is summarised in Figure 5.14, 103 > > CAMBRIDGE IGCSE™ & © LEVEL COMPUTER SCIENCE: COURSEBOOK User visits the web page that is stored on the web server Persistent cookies are permanently stored by user's web browser until the user or the web browser deletes them. Persistent cookies are sent to the web server every time the user Visits the web page Persistent cookies are sent from web server to user's web browser Figure 5.14: Persistent cookies Internet users have mixed feelings about cookies. ‘This is because they can have a very useful role but can also be used for improper activities. Cookies do build up an online profile about your details and preferences. Some people fee! this is an invasion of their privacy. Other people also believe that this data can be gathered to build a profile about you and add to the risk of your identity being stolen. If you are worried ‘about this being a possibility, you can limit the use of cookies in your online activity by changing the settings for your web browser. Questions & — Whatis a cookie used for? 7 What isthe difference between a session ‘cookie and a persistent cookie? 8 Why do some people have an issue with cookies being used? COMPUTER SCIENCE IN CONTEXT Figure 5.1 ‘okies can be a privat Wait, what? You want to delete Each company that creates a web browser will often have a slightly different aim as its focus. Some web browser development companies focus on the security of the transmission of data, whereas others focus on how quickly the web pages are rendered and displayed. my cookies? 5 The internet and its uses 5.4 Digital currency When you pay for products and services using the internet, you will normally use a digital currency. A digital currency is one that exists electronically (see Figure 5.16). digital currency: a It is a method of payment that is similar to paying with coins and bank notes. currency that exists However, rather than exchanging physical bank notes and coins to make the payment, electronically rather the currency is exchanged digitally using computers. There are several different forms than physically of digital curreney, the most popular are payments using credit cards, mobile phones, and smart watches. The most common of these is using eredit cards when making payments using the internet. When the data about the payment with the digital currency is sent from one computer to another, itis encrypted to keep it secure. The method of encryption used is what you learnt about previously, in Section 5.2, using the HTTPS protocol. The payment details for the use of a digital currency can be stored in a persistent cookie. That means that each time you visit the website to buy a product, your payment details will be ‘automatically entered so you don't need to type them in each time. One type of digital currency that you may have heard of is Bitcoin. This type of digital currency is more specifically known as a cryptocurrency. The banks that wwe use fo manage our money on a daily basis are called centralised systems. This means that there is an authority at the centre managing the process in which they are used. In this case, the bank is the authority. A. eryptocurreney is a decentralised KEY WORDS ceryptocurrency: a type of digital currency that uses encryption procedures. blockchain: a method that is used to track all the Siem this mans that there is, F#9U®S-17:A eyptocurency ia cia currency transactions made seecmral authority, Hkea bank, {tl anaged by a decentralised system with a cryptocurrency. ‘managing the process of digital ledger: a payments. Payments are also encrypted using this type of currency, As there is no database that is alist central authority managing the system of payments with this type of digital currency, | of all the transactions adifferent system called blockchin is used to keep track of the payments. recorded by the use In its most basic form, blockchain is a list of all the records made with the digital of blockchain. curreney. This is called a digital ledger (Figure 5.18). Each time a payment is made with the digital currency, a record is added to the ledger that includes a digital signature with the time and date that the payment is made. In blockehaining, once these records are added to the digital ledger, hey cannot be changed. Data that is stored ina digital 105 > The internet and its uses ‘The main security solution that you can use to keep data secure that is sent over a network is encryption. Data is normally encrypted using the SSL protocol that you Jearnt about earlier in Section 5.2. This security solution will not stop the data packets from being intercepted, but it will mean that if the data packets are intercepted, the data contained in the packets will be meaningless to anyone who tries to read them. ‘Remember, you can check to see if a website encrypts your data before transmission by looking to see if the URL uses HTTPS. It is also often possible, in your web browser settings, to set your web browser to only connect to websites that use eneryption to transmit data, Figure 5.19: If your data is intercepted by someone, will tbe encrypted? CCheckif the URL uses HTTPS Have you ever gone into a café or a store and thought, “Excellent, free Wi-Fi!” and you immediately connect to it? Perpetrators can also use this kind of incentive to get you to ‘connect to the network through a system of theirs. Any data that you send using this connection can be intercepted by the perpetrator. It is advisable, if you see a free Wi-Fi ‘connection, to ask the café or store if itis their free Wi-Fi before you connect to it Insummary: ‘What happens? Data packets are intercepted and examined through the use of software such as a packet sniffer. What is the aim? To steal your precious personal data for criminal activity such as identity theft or fraud. What security solutions _ | Encryption such as the SSL protocol and visually can be used? checking the URL of a website to see if it uses the HTTPS protocol Use the internet to find out how a virtual private network (VPN) can be used to help prevent data interception. Distributed denial of service (DDoS) attack To carry out a DDoS attack, a perpetrator will first create a botnet (bot network, see Figure 5.20), This is done by sending malware to many computers to try and get you to VORDS distributed denial of service (DDoS) attack: a type of cyber threat that targets a web server to cause it to crash and prevent access to the web pages that it stores. botnet: a network of bots that are created to carry out a DDoS attack, malware: a type of malicious software that is downloaded onto a user's computer or device. 5. The internet and its uses Perpetrator Botnet Bot Requests i a =] Figure §.20: A botnet can cause @ DD6S attack In summary: What happens? Malware is sent to lots of computers to turn them into bots to create a botnet. The perpetrator then uses the botnet to send many requests to a web server, all atthe same time. . What is the aim? The aim is to cause the web server to crash. The perpetrator may be doing this to demand money for it to stop, or as an act of revenge or activism. What security solutions can be used? ‘The company can use a proxy server to act a5 a barrier that filters requests to the web server. You can scan your computer with anti-malware on a regular basis to try and prevent it being used as a bot. Use the internet to find out about a huge DDoS attack that was carried out on 2st October 2016, and which companies it affected. Ta UR CCRT m)> {your computer and will help to find the file that is redirecting you to the fake website. The ‘anti-malware software will quarantine this fle and let you delete it. When you type in the URL now the redirection should stop and you should be taken to the genuine website. ‘One thing that you can do to help prevent pharming is to only download software or click links that you know are from a trusted source. You should also thoroughly check any website before you enter your personal details. You can look to see: ‘© If the URL at the top of the screen is the correct one. ‘© If the site is secured using HTTPS. ‘+ If the website looks like it normally does. Are all the usual colours, images and text there in the same places? If you are in any doubt at all whether the website is genuine, close the website \without entering any of your details and scan your computer immediately with anti- malware software Any personal data Perpetrator input is obtained a Request gets redirected Fake website to fake website Malicious software downloaded User types in URL for genuine website Genuine website Figure 5.26: Pharming is a cyber threat where fake websites are used to steal deta In summary: What happens? Malicious software is downloaded onto your hard drive that will redirect you to a fake web page when you input the genuine URL What is the aim? To get your personal data to commit criminal activity such as stealing your money, identity theft or fraud. omens! What security solutions | Anti-malware software, visually checking the web page cyber threat that can be used? and only downloading data from trusted sources. involves sending a user a fake email that is designed Question to look genuine. It will encourage the user to provide their personal data either by clicking a link to 111 What can you do to prevent a perpetrator getting your personal data through pharming? ichi a fake website, or by Phishing responding tothe Phishing is also used by perpetrators to try and get your personal data, such as your email username and password for your online accounts, They can then log into the account, 17>

You might also like