uniformresourcelocator. text based address for a webpage. contains protocol, domains, file-name/web page
IP
internetprotocol. an address for an internet connected device. IPv4 - very limited. IPv6, more space
packet switching
when a file is sent + broken down into data packets. when data is sent the data is all muddledup, once arrived the packets reassemble. not all packets send, it has to be resent
data packets contain:
IP address coming from
IP address going to
sequence number of packets
num. of packets in whole communication
errorchecking data
packets
a segment of data. advantage - you can send file quicker, and all at once
DNS
domain name system. allows you to type in webaddress and translates that into IP address. makes life easier for humans.
NIC
network inferface card. need to get into network, wireless or net
MAC
media access control. assigned to each NIC by manufacture using hexadecimal
phishing
someone using malware communication with the intent of stealing personal information
brute force attack
try to access someones account. they use a list of common passwords
technical weakness can make a computer vulnerable to:
malware
DoS attack
data interpretation and theft
virus
malware + installed on someones device
worms
malware + spread on itsown, its a self replicating virus
DoS attack
Denial of service. try to flood website servers with overwhelming amounts of data packets (requests). this either shuts it down or just slows it down. this requires low amount of skill
cookies
small text files which store data about your browsinghabits
sessioncookies
only lasts while you are on the website. once you close website the cookies are lost. doesn't have a time limit
persistent cookies
long term memory. data stays even when tab closed. has a time limit
digital currency
only exists online. uses HTTPS, details stored in persistent cookies, goes from one machine to another
blockchain
list of records within digital currency (digitalledger). once it is in a block, it can't be edited. anyone who wants to see this data, can
cryptocurrency
decentralised, doesn't need to go through a central place (eg. bank), it is untraceable
firewall
between the users computer and networks to examine data traffic to make sure it meets certain criteria.
browser
software application used to locate, retrieve and display content on web pages and other files.