Describe how the SSL works
− Browser / client sends request to webserver for identification
− Web server sends its digital / security certificate
− Browser authenticates certificate
− If authentic connection, is established any data sent is encrypted
− Using public and private key to do this
Describe how the TSL works
− Handshake and record protocols
− Client/Browser requests secure connection to web server
− Browser requests server to identify itself
− Web server then provides digital certificate after identification
− Browser validates certificate
− Browser sends signal to web server to begin transmission
− Session key generated
− Encryption method is agreed on
The handshake protocol is used to exchange all the information needed by both computers in order to establish a secure SSL/TLS connection
The record protocol handles the actual data and it’s encryption
Describe how a browser accesses a web page
Describe how a proxy server works
− Acts as mediator between the user’s computer and web server
− Allows internet traffic to be filtered
− Speed access to information on website using cache
Describe encryption
− Encryption key used − Key uses algorithm to scramble data − Data before encryption is plain text − After encryption it is known as cypher text − Same key used to decrypt data
Describe symmetric encryption
− Key is kept secret, only sender and receiver know
− Sender uses same key to encrypt and decrypt
− Key has to be sent over internet, can be intercepted
− Less safe but fast
Describe asymmetric encryption
− Public and private key mathematically linked
− Public key used to encrypt, anyone can see
− Private key not transmitted, used to decrypt
− Safer process but slower
Describe a Denial of Service attack
− Webserver is sent multiple requests, requests flood the webserver at the same time
− Webserver crashes / runs slow
− Designed to prevent access to e.g. a website // Stops legitimate requests being processed/serviced
Describe copyright, plagiarism
Copyright
− law/legislation that requires permission to use intellectual property / other people’s work
Plagiarism
− To claim other’s work as your own
− To use other people’s work without consent / acknowledgement
− Theft of intellectual property
Accidental loss of data and prevention
Lost from
Prevention
Internet risks
How to minimise risk of spyware
Anti-spyware
Onscreen keyboard
2 Factor Authentication
Firewall
How to minimise risk of virus
Anti-virus
Firewall/Proxy server
How to minimise risk of hacking
Firewall/Proxy server
Passwords
Biometrics
2 Factor Authentication
Describe Phishing and Pharming
Phishing
− Legitimate looking email sent to user
− encourages user to click a link that directs user to a fake website
− User encouraged to enter personal details into a fake website // designed
to obtain personal details from a user
Pharming
− Malicious code/malware is downloaded without users’ knowledge
− That re-directs user to fake website (when legitimate URL entered)
− User encouraged to enter personal details into a fake website
− Designed to obtain personal and sensitive details from a user
Describe free software, freeware, shareware
Free software- • Type of software licence • Free of charge • Normally distributed without the source code • Can legally share / copy • Cannot legally modify code • Cannot resell
Freeware- Owner has copyright for software but can be given away for free
Shareware- Often a trial version of full software, fee required for full access
Copyright
Identify and describe risks to a device when accessing the internet
Hacking
− When a person tries to gain unauthorised access to a computer system
− Data can be deleted/corrupted by hacker
Malware
− A software program designed to damage data / disrupt the computer system
− Replicates itself and fills the hard disk
Virus
− A program that replicates itself to damage/delete files
What are ethics
Describe Cracking
-When someone alters a program source code usually for a backdoor (by disabling computer security software)