IGCSE Computer Science - The Internet and Its Uses | HTTP/HTTPS, DNS, Cookies, Cyber Security
Chapter 5 ยท Paper 1

The Internet and Its Uses

Internet vs WWW, HTTP/HTTPS, DNS, web browsers, cookies, digital currency, and cyber security.

Based on Cambridge IGCSE / O-Level CS Syllabus 0478/2210 (2026โ€“2028)

1 Internet vs World Wide Web

The Internet
  • The global physical infrastructure
  • A network of networks โ€” cables, routers, servers
  • Carries all internet traffic (email, streaming, web, VoIP)
  • Exists independently of the web
The World Wide Web
  • A collection of websites and web pages
  • Accessed using the internet via a browser
  • Uses HTTP/HTTPS protocols
  • One service that runs on top of the internet

The Internet and the World Wide Web are not the same thing. The internet is the infrastructure; the web is one service that uses it.

2 URLs

A URL (Uniform Resource Locator) is a text-based address that uniquely identifies a web page or resource on the internet.

https://painlessprogramming.com/understanding-number-systems/
โ”‚       โ”‚                      โ”‚
โ”‚       โ”‚                      โ””โ”€โ”€ Web page / file path
โ”‚       โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ Domain name
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ Protocol (HTTPS)

A URL can contain: the protocol, the domain name, and the file path. Domain names are resolved to IP addresses by DNS servers.

3 HTTP & HTTPS

HTTPHTTPS
Full nameHyperText Transfer ProtocolHyperText Transfer Protocol Secure
PurposeTransfers web pages between server and browserSame as HTTP but with encryption
EncryptionNone โ€” data sent in plain textUses SSL/TLS to encrypt data
SecurityData can be intercepted and readData is encrypted and cannot be read if intercepted
UseBasic web pages with no sensitive dataOnline banking, shopping, login pages

4 Web Browsers

A web browser is an application whose main purpose is to request, receive, and render HTML to display web pages to the user.

Browser Functions

  • Storing bookmarks and favourites
  • Recording and displaying browsing history
  • Allowing multiple tabs to be open simultaneously
  • Storing and managing cookies
  • Providing navigation tools (back, forward, refresh, home)
  • Providing an address bar for entering URLs

5 How Web Pages Load

When a user types a URL and presses Enter:

  • The browser extracts the domain name from the URL
  • The browser sends the domain name to a DNS (Domain Name Server)
  • The DNS looks up the domain and returns the corresponding IP address
  • The browser sends an HTTP/HTTPS request to the web server at that IP address
  • The web server sends back the requested HTML (and CSS, JS, images)
  • The browser renders the HTML and displays the web page to the user

DNS acts like a phone book for the internet โ€” it translates human-readable domain names (e.g. painlessprogramming.com) into machine-readable IP addresses (e.g. 185.230.63.186).

6 Cookies

A cookie is a small text file stored on a user's device by a website. It allows the website to remember information about the user across sessions.

Session Cookies
  • Temporary โ€” deleted when the browser is closed
  • Used for: keeping a user logged in during a visit
  • Holding items in an online shopping cart
  • Tracking activity within a single session
Persistent Cookies
  • Saved on the device for a set period of time
  • Used for: remembering login details
  • Saving user preferences (language, theme)
  • Tracking user behaviour across multiple visits

7 Digital Currency & Blockchain

A digital currency is a form of money that exists only in electronic form โ€” there is no physical equivalent (no coins or notes). Example: Bitcoin.

Blockchain is a digital ledger โ€” a time-stamped, ordered list of transaction records that is distributed across many computers. Each block in the chain contains a set of transactions and a reference to the previous block, making it tamper-evident.

Blockchain's key property: once a record is added, it cannot be altered without changing all subsequent blocks โ€” making fraud very difficult to carry out undetected.

8 Cyber Security Threats

Brute-force attack
Systematically tries every possible password or key combination until the correct one is found
Data interception
Capturing data packets as they travel across a network to read sensitive information
DDoS attack
Thousands of devices flood a server with requests simultaneously, making it crash or become unavailable
Hacking
Gaining unauthorised access to a computer system to steal, modify, or destroy data
Virus
Malware that attaches to legitimate files and spreads when those files are opened or shared
Worm
Self-replicating malware that spreads across networks without needing to attach to a file
Trojan horse
Malware disguised as legitimate software โ€” user installs it willingly, then it causes harm
Spyware
Secretly monitors user activity and sends information (passwords, keystrokes) to an attacker
Adware
Displays unwanted advertisements and may redirect browser searches
Ransomware
Encrypts the victim's files and demands payment (ransom) for the decryption key
Pharming
Redirects users to a fake website even when they type the correct URL โ€” exploits DNS
Phishing
Fake emails/messages pretending to be from trusted sources to trick users into revealing credentials
Social engineering
Manipulating people psychologically to reveal confidential information or perform actions

Know the difference: Phishing = fake emails. Pharming = fake websites via DNS manipulation. Social engineering = manipulating people (not systems).

9 Cyber Security Solutions

Access levels
Different users get different permissions โ€” limits damage from insider threats
Anti-malware
Anti-virus and anti-spyware software detects and removes malicious programs
Authentication
Username/password, biometrics (fingerprint, face ID), two-step verification
Software updates
Automated updates patch security vulnerabilities as soon as fixes are available
Check URL spelling
Verify the URL before clicking links to avoid phishing and pharming sites
Check email tone
Suspicious spelling/urgency in emails may indicate phishing โ€” do not click links
Firewall
Monitors and filters incoming/outgoing network traffic based on security rules
Privacy settings
Limit what personal data websites and apps can access
Proxy server
Acts as an intermediary โ€” hides user's IP address, can filter malicious content
SSL / HTTPS
Secure Socket Layer encrypts data between browser and server โ€” look for the padlock
Scroll to Top