Computer Science
Grade 5
20 min
Network Security Basics
Network Security Basics
Tutorial Preview
1
Introduction & Learning Objectives
Learning Objectives
Define what a network and the Internet are using an analogy.
Explain the role of an IP address, using the example of a home address.
Describe how data is broken into 'packets' to travel across the internet.
Identify the roles of a client, a server, and a router in a simple network diagram.
Trace the basic path of a request from their computer to a website server and back.
Explain why unique addresses are necessary for computers to communicate.
Have you ever wondered how a message you send on a tablet instantly travels across the world to your friend's phone? 💌 Let's uncover the secrets of this digital mail system!
In this lesson, we will explore the invisible roads and highways that make up the internet. We'll learn how computer...
2
Key Concepts & Vocabulary
TermDefinitionExample
NetworkA group of two or more computers connected together so they can share information.The computers and printers in your school's computer lab are a network. Your home's Wi-Fi that connects your family's phones, tablets, and TV is also a network.
InternetA giant, worldwide network of computer networks. It connects billions of devices all over the globe.When you use an app to video call a cousin in another country, you are using the Internet to connect your home network to their home network.
IP AddressA unique address for a device on a network, just like a house has a unique mailing address.A computer's IP address might look like `192.168.1.101`. When you want to visit a website, your computer sends a request to that website's IP address....
3
Core Syntax & Patterns
Packet Switching Logic
1. Break message into small, numbered packets. 2. Send each packet towards the destination IP address. 3. Packets may take different routes. 4. Reassemble packets in the correct order at the destination.
This is how the internet sends large files quickly and reliably. If one packet gets lost, only that small piece needs to be sent again, not the whole file.
Client-Server Request Pattern
IF a Client wants information, THEN it sends a Request to the Server's IP address. IF the Server receives the Request, THEN it sends a Response with the information back to the Client's IP address.
This is the fundamental pattern for how we access almost everything on the internet, from websites to online games. It's a digital conversation with a request...
4 more steps in this tutorial
Sign up free to access the complete tutorial with worked examples and practice.
Sign Up Free to ContinueSample Practice Questions
Challenging
Imagine a website is a single pizza shop with one door. A Distributed Denial of Service (DDoS) attack is like...
A.One person trying to guess the secret recipe (password attack)
B.Someone secretly stealing a slice of pizza (data theft)
C.The shop owner locking the door by mistake (misconfiguration)
D.Thousands of fake robots all trying to get through the door at once, so real customers can't get in
Challenging
A website converts your password into a long, scrambled string of text called a hash. This is a one-way process. How does the website check if you typed the right password when you log in?
A.It takes the password you type, hashes it, and checks if the new hash matches the stored hash
B.It 'un-hashes' the stored hash to see if it matches your password
C.It asks another computer if the password is correct
D.It compares your password to a list of all other users' passwords
Challenging
A software company discovers a brand new security hole in their popular game. A hacker also finds it and releases a virus to take advantage of it on the very same day, before the company has time to create a patch. What is this type of security weakness called?
A.Day-One Patch
B.Social Engineering Attack
C.Zero-Day Vulnerability
D.Man-in-the-Middle Attack
Want to practice and check your answers?
Sign up to access all questions with instant feedback, explanations, and progress tracking.
Start Practicing Free