Internet Threats & Cyber Security
Learning Objectives : Student wil learn about -
The list of cyber threats which need to be considered are -
Q1. Whilst Modern technology allows us to carry out many day-do-day tasks online and the Internet is a fantastic place for communication and information, there are many network security threats you may need to encounter along the way.
a) Identify six Security threats you may encounter while using Internet.
- Brute force attacks.
- Data interception.
- Distributed Denial of Service (DDoS) attacks.
- Hacking.
- Malware (Viruses, Worms, Trojan horse, Spyware, Adware and Ransomware).
- Phishing.
- Pharming.
- Social engineering.
b) Give five security measures that can help to protect a computer system from online security threats.
⇒ Install an Anti-virus software in your system and keep it updated.
⇒ Enable Firewall protection and enhance your browser's Privacy Settings.
⇒ Make use of Proxy Server.
⇒ Make use of Strong Complex Password [by mixing characters (small and caps), numbers and symbols].
⇒ Be cautious with emails links and attachments.
Q2. a) Describe what is meant by Brute force attack.
⇒ Brute force attack is a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys.
⇒ The attacker systematically submits and checks all possible combinations of letters, numbers and other symbols which he could guess until the correct one is found.
⇒ It can be done manually or automatically by software.
b) Describe two ways to mitigate the risk of Brute force attack.
Note :- Mitigate means "reduce the gravity of some kind of risk".
Q3. a) Describe what is meant by Data interception.
⇒ Data interception refers to the process of stealing confidential data by tapping into a wired or wireless communication links.
⇒ In wired network, data interception can be done by using a Packet sniffer (software), which examines data packets being sent over a network, gathers information and sent back to the hacker to obtain the confidential data.
⇒ In wireless network (WiFi), data interception can be done by using Wardriving (also called Access Point Mapping). A laptop or smartphone with antenna and GPS device, together with software is used to intercept Wi-Fi signal to obtain the confidential data.
b) Describe two ways to prevent data interception and theft.
Note : - Incomprehensible means, "not able to be understood / not intelligible".
Q4. a) Describe what is meant by Wardriving.
✬ Wardriving is an act of gaining unauthorized access to a Wireless (WiFi) network using laptop or smartphone.
✬ It requires Wardriving Software and Hardware like, laptop, a wireless network card and an antenna to pick up the wireless signals.
b) Give two harmful effects of Wardriving.
c) Give two ways to prevent Wardriving.
Q5. a) Describe what is meant by Denial Of Service attack (DoS).
✬ DoS is an attempt to make computer resource unavailable to its intended user by sending a large number of requests all at a time to the network or web-server.
✬ In DoS attack, the spam traffic originates from individual computers.
✬ Network or web servers can only handle a finite number of requests, so it is unable or struggles to respond to all the requests.
✬ The server fails or produces times out as a result.
✬ Such attack can prevent a user from accessing their emails, websites, interrupt business operations and make an organization unavailable to its customer.
b) Describe what signs would indicate to users that they had become victims of denial of service attacks.
⇒ Slowdown of network performance (opening files or accessing certain websites).
⇒ Inability to access certain websites.
⇒ Large amount of spam email reaching the user's email account.
c) Describe ways to mitigate the risk of DoS attack.
d) Describe how spam message could be used for DoS attack over any user’s email account?
⇒ ISPs or Email providers only allows a limited number of emails for each user.
⇒ If the attacker sends out very large number of spam emails to the user’s account, it will quickly attain the limit to get blocked up and the user will not be able to receive legitimate emails.
Q6. a) Describe what is meant by Distributed Denial Of Service attack (DDoS).
✬ DDoS attack is carried out by multiple compromised systems used as bots, under the control of the attacker.
✬ They flood a server with lots of requests all at the same time.
✬ A Server can only handle a finite number of requests, so it struggles or fails to respond and produces time out as a result.
✬ The aim of DDoS attack is to disrupt the normal functioning of a system, by denying access to the legitimate users.
✬ The spam traffic originates from many different computers, so it is hard to block the attack.
b) State two aims of carrying out a DDoS attack.
c) Describe ways to mitigate the risk of DDoS attack.
Q7. a) Describe what is meant by Hacking.
✬ Hacking is the act of gaining illegal or unauthorized access to a computer system with the intension of viewing, modifying or stealing data without causing damage to the system.
✬ This is done through cracking of passwords and security codes which gives access to the system.
b) Give two ways to prevent Hacking.
c) Hackers can be classified into different categories based on their intent of hacking a system. Describe the following three types of Hackers.
(i) White Hat Hackers :
(ii) Black Hat Hackers :
(iii) Grey Hat Hackers :
Q8. a) Describe what is meant by Cracking.
✬ Cracking is the act of breaking into a computer or network system, modifying the software to remove or disable its security features, like password or license of computer programs.
✬ Cracking is done with the intension to use the copyrighted software illegally or to hack a computer or network to steal confidential data.
✬ A Cracking and a Hacking are considered synonyms to each other, as they both involving breaking into locked systems.
b) Give three ways to prevent Software Piracy (cracking software to use illegally).
Q9. a) Describe what is meant by Malware.
✬ Malware is short for malicious software.
✬ Malware is the name given to any software that could harm a computer system, interfere with a user's data, or make the computer perform actions without the owner's knowledge or permission.
b) Describe the following types of malware.
(i) Viruses
(ii) Worms
(iii) Trojan horse
Note : - disguise means, "give oneself a different appearance in order to conceal one's identity".
(iv) Spyware
(v) Adware
(vi) Ransomware
c) Give three security measures that can help to protect from any kind of Malware.
Q10. a) Describe what is meant by Phishing.
✬ Phishing is done by sending legitimate looking Emails with Hyperlinks to gain their trust.
✬ The recipient is then tricked into clicking a malicious link, which re-directs the user to the fake web-sites to give up their personal confidential details.
Another term connected to phishing is Spear phishing; this is where the cybercriminal targets specific individuals or companies to gain access to sensitive financial information - regular phishing is not specific regarding who the victims are.
b) Give three ways to prevent Phishing attack.
Q11. a) Describe what is meant by Pharming.
✬ Pharming is a practice of installing malicious software on user’s computer or server.
✬ The malware re-directs the user to the fake web-sites to give up their personal confidential details.
✬ The malicious code manipulates the DNS server software which converts the domain names into IP addresses.
b) Give three ways to prevent Pharming attack.
Q12. Give one Similarity and two Differences between Phishing and Pharming.
Similarities :
- Both are designed to steal personal data.
- Both are scamming practice to draw money using user's confidential details.
Difference-1 :
- Phishing is a practice of sending legitimate looking emails.
Pharming installs a malicious code in user's computer.
Difference-2 :
- Phishing requires user to follow a link, whereas
Pharming uses malicious code to redirect the user to fake websites to give up their confidential details.
Q13. Social engineering is an effective method used by cybercriminals to introduce malware.
a) Describe what is meant by Social engineering attack.
✬ Social engineering is a cyber-attack that relies on human interaction, psychological manipulation, to trick people into installing malware in their system by compromising with their security features.
✬ It is done by exploiting human emotions, invoke fear, urgency, curiosity, empathy and trust in the victim, leading to promptly reveal sensitive information, click a malicious link, or open a malicious file.
✬ The most common form of social engineering attack are phishing, ransomware, scareware (Trojan horse), baiting, etc.
Fear of immediate danger to their computer, curious to win fake lucky prize, a car, etc., making people to believe that all genuine sounding companies can be trusted.
b) Describe how the following form of social engineering attacks are used to introduce malware.
1) Instant messaging : Malicious links are embedded into instant message; for example, an important software update. It relies on user's curiosity. 2) Scareware : A message pops-up which claims that the user's computer is infected with a virus, and they need to download the fake anti-virus immediately. It relies on user's fear. 3) Phishing : A legitimate looking email with embedded links is sent. When the user opens the link, the browser redirects to a fake website to give up their confidential details. It relies on user's curiosity. 4) Baiting : The cybercriminal leaves a malware-infected memory stick somewhere where it can be found; the finder picks up the memory stick and plugs it into their computer (just to see who it belongs to) and unwittingly downloads malicious malware. It relies on user's curiosity. 5) Phone calls : Cybercriminal calls the user on their mobile pretending to be an IT-professional, claiming their device has been compromised in some way, the user is advised to download some special software that allows hacker to take over the user's device giving them access to personal information. It relies on fear.
c) Describe how the following human emotions are exploited to introduce malware.
✬ Fear :
⇒ The user is panicked into believing their computer is in immediate danger and isn't given time to logically decide if the danger is genuine or not.
⇒ The user can be tricked into believing they have won a lucky-draw/car or they find an infected memory stick lying around; their curiosity gets the better to give their confidential details willingly to win the lucky-draw/car or they are curious to know who the memory stick belongs to by plugging it into the computer.
⇒ A real belief that all genuine sounding companies can be trusted, therefore emails or phone calls coming from such companies must be safe.
d) Describe the steps taken by a cyber criminal when targeting their victim through social engineering.
e) Why do cyber criminals use social engineering attacks?
✬ It is often easier to exploit people than it is to find a network or software vulnerability.
✬ There is no hacking involved, since the user is willingly allowing the cyber criminal to have access to their computer.
Q14. Describe Access levels security to keep data safe.
✬ Access level is the hierarchy of levels of privileges or rights provided to the user account of each member of the system or network to access vital data.
✬ It provides control over the type of data an user can and cannot access.
✬ It determines who has the right to access, read, write and delete data.
Q15. An airport uses a computer system to control security, flight bookings, passenger lists, administration and customer services.
a) Describe how it is possible to ensure the safety of the data on the system so that senior staff can see all the data, while customers can only access flight times (arrivals and departures) and duty-free offers.
⇒ Use Access level security, which provides different level of privileges or rights for each user account of the system or network to access vital data.
⇒ It determines the type of data an user can access, and who has the right to read, write and delete data.
⇒ Senior staff should be given higher level of access to view all data, while customers should have access level privilege to only view the flight times and duty-free offers.
b) Describe how the airport can guard against malware attacks from outside and also from customers using the airport services.
Q16. a) Describe how Anti-virus software helps to protect from computer virus.
b) Describe two other different ways to protect computer from virus.
✬ Do not use disks or software from unknown source.
✬ Install and use only reputed software from trusted sources.
✬ Never "double click" on email attachments which are executable, i.e. file name with extension like *.exe, *.com or *.vbs.
Q17. a) Describe how Anti-spyware software detects and removes spyware program installed illegally on a user's computer.
⇒ Anti-spyware software scans the computer to detect the spyware programs based on either "rules" or "file structure" associated with files on the computer.
⇒ Rule based anti-spyware analyses the codes of all of your programs and files, and compare it with the rules of known spyware stored in its database to identify the spyware.
⇒ Anti-spyware also scans the computer for certain file structures associated with the spyware to search and identify the spyware.
⇒ If found then it either removes the spyware or blocks the spyware from accessing confidential data stored in the computer.
b) Give three general features of anti-spyware.
Q18. a) Describe Firewall used to protect computer system from security issues.
⇒ A firewall can be either software or hardware.
⇒ It sits between the user's computer and an external network and filters the incoming and outgoing traffic to the computer.
⇒ It allows the user to set criteria or rules to access to the computer or external network resources.
b) Why do we need to use firewall ?
✬ To protect your computer from cyber threats like - hacking, malware, phishing and pharming by shielding it from malicious or unnecessary network traffic.
c) Give four of the tasks carried out by a firewall.
Q19. a) Describe Proxy server and state its purpose.
⇒ A proxy server is located between the client (user) and the web-server where it acts as an intermediary (security guard) between a Web browser and a Web server.
⇒ It filters the internet traffic against set criteria to allow or block access to a website.
⇒ Keeps user's identity (IP address) secret; access internet via the proxy identity.
⇒ It protects direct attack on web-server by hackers.
⇒ It improve web performance by storing a copy of frequently used web-pages in its cache.
⇒ Proxy servers can also act as firewalls.
b) How proxy server help to prevent hacking and DoS attack on webserver.
✬ It prevents direct access to web server by sitting between the user and the webserver.
✬ If an attack is launched, it hits the proxy server instead; blocks invalid traffic to webserver.
c) How proxy server helps to improve web performance.
✬ When the website is first visited, the home page is stored on the proxy server cache.
✬ And when the user next visits the website, it is served from proxy server cache instead of webserver, giving much faster access.
Q20. Proxy-server and Firewalls have some similar functions.
Identify the similarities and differences between proxy-servers and firewalls.
⇒ Both checks incoming and outgoing traffics.
⇒ Both helps to block access to incoming traffics.
⇒ Both helps to block unauthorised access to the network.
⇒ Both keeps a log of all traffics for later investigation.
⇒ Both allows to set criteria to approve (whitelist) or deny (blacklist) a list of certain network requests.
⇒ Proxy server can hide user's IP-address, Firewall can't hide.
⇒ Proxy server diverts away attack from a website or server, Firewall blocks unauthorised access.
⇒ Proxy server protects a server/network, Firewall protects network/individual computer.
⇒ Proxy server block traffics from a websites, Firewall blocks the ports of incoming traffics.
SSL (Secure Socket Layer) Security
Q21. a) Describe SSL (Secure Socket Layer) used for online transactions, securely over Internet.
⇒ Secure Socket Layer (SSL) is a security protocol used for establishing encrypted link between a web-server and web-browser.
⇒ It uses asymmetric encryption to encrypt data.
⇒ It uses 'https' protocol that ensures the exchange of data to remain confidential.
⇒ It activates a small pad-lock to be displayed at the top-left of the address bar of the browser.
⇒ It uses digital SSL Certificates, which is sent by the web-server to the web-browser when it is requested to validate the authenticity of webserver.
b) State what is meant by SSL Certificate.
⇒ SSL Certificate is a small data file that digitally binds the web-site's public key to it's organizational detail that identifies the owner of the web-site or company.
⇒ It is send by the web-server to the web-browser to allow encrypted secure connection between web-server and web-browser.
⇒ An SSL certificate is used to validate the authenticity of the web-server. It is like an ID card that proves someone who claims to be.
c) Give three examples of where SSL would be used.
Q22. Describe what happens between web browser and web server when a user wishes to access a website which uses SSL certification.
- The web-browser attempts to connect to a website which is secured by SSL.
- The web-browser requests the web-server to identify itself.
- The web-server sends a copy of its SSL Certificate to the web-browser.
- The web-browser checks whether the SSL certificate is trustworthy or not.
- If it is trustworthy then the web-browser sends a positive message to the web-server.
- The web-server will then send back some form of acknowledgement to allow the SSL encrypted session to begin.
- The encrypted data is then shared securely between the web-browser and the web-server.
Protect System from cyber threats
Q23. State the Privacy settings of web browser that could help to protect against cyber threats.
- Enable "Do not track" in your browser - it stops websites collecting and using browsing data which leads to improved security.
- Clear your web browser cache and cookies - it clears browsing history, stored data (like payment details) from cache and unwanted cookies, thereby reducing the risk of data interception.
- Switch OFF Pop-ups - its stops browser windows to push annoying adverts which could contains malicious links and inappropriate contents.
- Turn ON private browsing - protects your private information and blocks websites from tracking your search and browsing data.
- Use a VPN (Virtual Proxy Network) - it encrypts data before sending to the VPN server which decrypts the requests before sending them to the online destination.
Q24. a) State the benefits to a user of allowing Automatic updates to software on, for example, a smartphone.
b) State two drawbacks of allowing Automatic updates.
c) What would you do if Auto-update fails or disrupted (breaks) ?
✬ Use System recovery tool that allows you to reverse the changes made to your system or software.
✬ It allows to reverse the clock time to an earlier date before the updates were made.
✬ System Restore is turned ON by default.
Authentication & Authorization (Biometrics)
Q25. a) Describe what is meant by Authentication.
⇒ Authentication refers to the ability of user to prove who they are.
⇒ It is a process of verifying that the data is coming from a trusted source or person.
⇒ It is a process of verifying that whether the data is true, genuine or valid without any change or alteration.
b) What are the three types or common factors used in authentication.
c) Describe three ways of authentication.
Q26. a) Authentication and authorization are two strong pillars of data cybersecurity that protect data from potential cyberattacks.
Give difference between Authentication and Authorization.
Authentication AuthorizationConfirms the identity of a person, device or system. Granting access to the system. The process of verifying that the data is coming from a trusted source or person. The process of verifying whether you are allowed to access the system or not. The process of verifying that whether the data is true, genuine or valid without any change. It determines what user can and cannot access.
b) Which comes first Authentication or Authorization ?
Authentication is the first step of authorization. Authorization is done after successful authentication.
c) Describe the use of User-ID and Password to authenticate and authorize a person to access the system.
⇒ User-ID and Password are un-spaced sequence of characters used to determine the person's identity and his rights to use the system.
⇒ The system authenticate the user by comparing the user-id and password input against its stored hash values.
⇒ User-ID is used to identify the person requesting to access a system is really that particular person.
⇒ Password is used to authenticate and authorize the person and grant access to the system.
Q27. What is meant by Two-factor Authentication or Two-step Verification ?
✬ Two-step verification is a process that involves two different authentication methods performed one after the other, to verify who you are.
✬ The first method rely on user providing user-id with password and the second method commonly includes providing OTP code (One Time Password) sent to your mobile phone, or providing unique user credentials through Smartcard or providing unique human characteristic through biometrics authentication.
✬ An additional extra layer of security is used to make it harder for hackers to gain access to a person's devices or online accounts in case your password is stolen.
Q28. Describe Biometric Authentication.
✬ Biometric authentication is a security system that relies on the unique biological characteristics of individuals to verify the identity of a person.
✬ It scans unique features of human body like, finger print, patterns of blood vessels in retina, wave patterns of voice, or facial feature using appropriate biometric device.
✬ And then compares it with the stored biometric data to authenticate a person.
Q29. a) Describe how Fingerprint is used in biometric authentication.
⇒ An Optical Fingerprint scanner takes the photo of the finger.
⇒ The image of the fingerprint is sent to the software that identifies the print patterns of ridges and valleys, and converts it into digital format.
⇒ A Capacitive Fingerprint scanner (in Smart phone or Tablets) measures the electrical signals sent from the finger and converts the ridges that directly touches the surface and valleys between two ridges into digital format.
⇒ The digital print patterns is then compared with the stored biometric data, which are fairly unique.
⇒ If it matches then the person is authenticated to allow to access the data or system.
b) Give two benefits of fingerprint scanning.
c) Give two drawbacks of fingerprint scanning.
Q30. a) Describe how Retina scan is used in biometric authentication.
⇒ Retina scanner uses Infra-red light to illuminate the blood vessels of the retina and takes its image.
⇒ The image of the retina is sent to the software that identifies the patterns of blood vessels, and converts it into digital format.
⇒ The digital print patterns is then compared with the stored biometric data, which are fairly unique.
⇒ If it matches then the person is authenticated to allow to access the data or system.
b) Give two benefits of Retina scan.
c) Give two drawbacks of Regina scan.
Q31. In the biometric application example, retina scans were used to control entry to a secure research building.
Describe how the system might change if Face recognition was used instead of retina scanners. The system is triggered automatically if a motion sensor detects the presence of a person.
⇒ Face recognition uses Digital camera to take photo of the person and send it to the Face Recognition software.
⇒ The face recognition software compares its facial key features like width of the nose, distance between the eyes, shape of the cheek bones etc.
⇒ If it matches, then the person is identified and the motion sensor is activated.
⇒ Motion sensor captures the movement of the person and send it to the microprocessor..
⇒ ADC is used to convert sensor's analogue signal to digital.
⇒ Microprocessor compares the input signal with the stored values.
⇒ If the input values are beyond the stored limit, then microprocessor sends signal to the actuator to open the door.
⇒ DAC is used to convert digital signal to analogue for the actuator.
Q32. The diagram shows the use of voice control in a car. A microphone picks up the voice of the driver and carries out their commands. For added security, the system only responds to people authorised to drive the car.
Explain how the microphone and microprocessor are used to control the following functions using verbal input from the driver :
⇒ Microphone picks up the verbal command and send it to the microprocessor.
⇒ ADC is used to convert the analogue signal to digital.
⇒ Microprocessor compares the input voice with the stored wave patterns using voice recognition software to authenticate and authorise the person to drive the car.
⇒ If the person is authorised, then microprocessor compares the input verbal command with the stored commands in database using speech recognition software.
⇒ If the command matches and seeks the direction to a destination, then microprocessor transmits the signal to the satellite and the route is planned in real time by the Satellite Navigation software, and produces output over the screen or speaker.
⇒ If the command is to play music or make a call on telephone, then the microprocessor sends signal to the concerned multimedia system to respond to the driver's request.
⇒ If the command is to close/open the door or window, then the microprocessor sends signal to the Actuator through DAC to close or open the door or window.
⇒ If the verbal command does not match with stored data, then an error message is produced on screen or speaker.
Q33. Describe five ways to check the authenticity of emails and website links to identify the potential threats . Include examples where ever possible in your answer.
Q34. a) Describe three things you should look out for when deciding whether or not an email is a potential phishing scam.
b) Identify at least three potential problems with this email from a company called Watson, Williams and Co :
An email like this should be regarded as phishing; by clicking on the 'Customer accounts link' button, you will divulge your confidential bank account details and other key information since you will be sent to a fake 'Watson, Williams and Co' website.
REVISION : Statements and its key computing terms.
Brute force attack | A "trial and error" method used by cybercriminals to crack passwords by finding all possible combinations of letters, numbers and symbols until the password is found. |
Data interception | An attempt to eavesdrop (means listen without speaker's knowledge) on a wired or wireless network transmission; cybercriminal often use packet sniffing or access point mapping / wardriving to intercept data. |
Packet sniffing | A method used by a cybercriminal to examine data packets being sent over a network and to find the contents of a data packet, which are sent back to the cybercriminal. |
Wardriving | Using a portable device with antenna, GPS system and software to intercept Wi-Fi signals and illegally obtain data; sometimes called Access Point Mapping. |
WEP encryption protocol | Wired equivalency privacy (WEP) encryption protocol is an algorithm for wireless networks to protect them against data interception. |
Denial of service (DoS) attack | A cyber attack in which cybercriminals seek to distrupt the normal operation of a website by flooding it with requests; also used to clog up a user's mailbox by sending out thousands of spam emails. |
Distributed denial of service (DDoS) attack | A denial of service (DoS) attack in which the fake requests come from many different computers, which makes it harder to stop. |
Spam | Unsolicited emails sent to a user's mailbox. |
Hacking | The act of gaining illegal access to a computer system without the owner's permission. |
Malware | Programs (such as viruses, worms and torjan horses) installed on a user's computer with the aim of deleting, corrupting or manipulating data illegally. |
Virus | A program or program code that replicates itself with the intention of deleting or corrupting files or by causing the computer system to malfunction. |
Active host | Functioning software that a virus can affect by attaching itself to the code or by altering the code to allow the virus to carry out its attack. |
Worm | A stand-alone type of malware that can self-replicate; unlike viruses, worms don't need an active host; they can spread throughout a network without the need for any action by an end-user. |
Torjan horse | A type of malware that is designed to look like legitimate software but contains malicious code that can cause damage to a computer system. |
Spyware | A type of malware that gathers information by monitoring a user's activities on a computer and sends the gathered information back to the cybercriminal who sent out the spyware. |
Adware | A type of malware that attempts to flood the end-user with unwanted advertising. |
Ransomware | A type of malware that encrypts data on a user's computer and holds the data hostage until a ransom is paid. |
Phishing | Sending out legitimate looking emails designed to trick the receipients into giving their personal details to the sender of the email. |
Spear phishing | Similar to phishing but targeting specific people or organisation rather than carrying out a blanket attack. |
Pharming | Installing malicious code in user's computer to redirect him to a fake website in give up his confidential data without his knowledge; unlike phishing, pharming is initiated without needing any action by the user. |
DNS cache poisoning | Altering IP-addresses on a domain name server (DNS) with the intenion of redirecting a user's browser to a fake website; carried out by a pharmer or hacker. |
Social engineering | Manipulating people into breaking normal security procedures; giving away security cridentials like password; in order to gain illegal access to their system or to inject malware to their computer. |
Access level | Different levels of access in a computer system allowing a hierarchy of access levels depending on user's level of security. |
Anti-spyware | Software that detects and removes spyware programs installed on a system; the software is based on typical spyware rules or known file structures. |
Authentication | The process of proving a user's identity by using something they know, something they have or something unique to them. |
Biometrics | A type of authentication that uses a unique human characteristic, such as fingerprint, voice or retina blood vessel pattern. |
Two-step verification | A type of authentication that requires two methods of verification to prove the identity of a user. |
Patch | An update for software that is developed to improve the software and / or to remove any bugs. |
Typo squatting | The use by cybercriminals of subtle spelling errors in website addresses used to trick users into visiting their fake websites. |
Firewall | Software or hardware that sits between a computer and an external network (like internet); the firewall monitors and filters all incoming and outgoing traffic. |
Proxy server | A server that acts as an intermediary server through which internet requests are processed; it often makes use of cache memory to speed up web page access. |
Privacy settings | Controls available on social networking and other websites which allow users to limit who can access their profile or what they are allowed to see. |
Secure socket layer (SSL) | A security protocol used when sending data over a network (such as the internet). |
SSL certificate | A form of digital certificate which is used to authenticate a website; it is needed to create secure encrypted link between web browser and website. |