Hacking
Hacking
What is a hacking?
Phishing
What is a phishing?
Pharming
Cyber Security
Threats (Cambridge (CIE)
IGCSE Computer Science)
: Revision Note
Forms of cyber security threat
• Computers face a variety of forms of attack and they can cause a large
number of issues for a network and computers
• The main threats posed are:
o Brute-force attacks
o Data interception & theft
o DDos attack
o Hacking
o Malware
o Pharming
o Phishing
o Social engineering
Data interception
What is data interception & theft?
DDoS Attack
What is a DDoS attack?
Hacking
What is hacking?
Malware
What is malware?
• Malware (malicious software) is the term used for any software that has been
created with malicious intent to cause harm to a computer system
• Examples of issues caused by malware include
o Files being deleted, corrupted or encrypted
o Internet connection becoming slow or unusable
o Computer crashing or shutting down
• There are various types of malware and each has slightly different issues
which they cause
• Very similar to viruses, main difference being that they spread to other drives and computers on the
network
• Worms can infect other computers from
o Infected websites
Worms
o Instant message services
o Email
o Network connection
• Locks your computer or device and encrypts your documents and other important files
Ransomware
• A demand is made for money to receive the password that will allow the user to decrypt the files
• No guarantee paying the ransom will result in the user getting their data back
Pharming
What is pharming?
Phishing
What is phishing?
Social Engineering
What is social engineering?
Worked Example
[4]
(ii) Suggest one security device that can be used to help prevent a DDoS attack.[1]
Answers
(ii)
Access Levels
What are access levels?
• Access levels ensure users of a network can access what they need to
access and do not have access to information/resources they shouldn't
• Users can have designated roles on a network
• Access levels can be set based on a user's role, responsibility, or
clearance level
o Full access - this allows the user to open, create, edit & delete files
o Read-only access - this only allows the user to open files without
editing or deleting
o No access - this hides the file from the user
• Some examples of different levels of access to a school network could
include:
o Administrators: Unrestricted - Can access all areas of the network
o Teaching Staff: Partially restricted - Can access all student data but
cannot access other staff members' data
o Students: Restricted - Can only access their own data and files
• Users and groups of users can be given specific file permissions
Anti-Malware
What is anti-malware software?
Authentication
What is authentication?
Biometrics
• Biometrics use biological data for authentication by identifying unique
physical characteristics of a human such as fingerprints, facial
recognition, or iris scans
• Biometric authentication is more secure than using passwords as:
o A biometric password cannot be guessed
o It is very difficult to fake a biometric password
o A biometric password cannot be recorded by spyware
o A perpetrator cannot shoulder surf to see a biometric password
• Automatic software updates take away the need for a user to remember to
keep software updated and reduce the risk of software
flaws/vulnerabilities being targeted in out of date software
• Automatic updates ensure fast deployment of updates as they release
Communication
What is communication?
URL
How to check a URL?
Firewalls
What is a firewall?
• A firewall monitors incoming and outgoing network traffic and uses a set
of rules to determine which traffic to allow
• A firewall prevents unwanted traffic from entering a network by filtering
requests to ensure they are legitimate
• It can be both hardware and software and they are often used together to
provide stronger security to a network
o Hardware firewalls will protect the whole network and prevent
unauthorised traffic
o Software firewalls will protect the individual devices on the network,
monitoring the data going to and from each computer
• Hackers
• Malware
• Unauthorised access to a network
Privacy Settings
What are privacy settings?
Proxy Servers
What is a proxy server?
SSL
What is SSL?
Worked Example
(i) ) Identify a security solution that could be used to protect a computer from a
computer virus, hacking and spyware.
(ii) Describe how each security solution you identified in (i) will help protect the
computer.
[6]
Answers
(i)
Passwords
Hacking
Biometrics
Two-step verification
Anti-malware/virus (software)
Firewall
(ii) Two marks for each description
• Anti-malware/virus (software)
o Scans the computer system (for viruses)
o Has a record of known viruses
o Removes/quarantines any viruses that are found
oChecks data before it is downloaded
o… and stops download if virus found/warns user may contain
virus
• Anti-malware/spyware (software)
o Scans the computer for spyware
o Removes/quarantines any spyware that is found
o Can prevent spyware being downloaded
• Firewall
o Monitors traffic coming into and out of the computer system
o Checks that the traffic meets any criteria/rules set
o Blocks any traffic that does not meet the criteria/rules set // set
blacklist/whitelist
• Passwords
o Making a password stronger // by example
o Changing it regularly
o Lock out after set number of attempts // stops brute force attacks
// makes it more difficult to guess
• Biometrics
o Data needed to enter is unique to individual
o … therefore it is very difficult to replicate
o Lock out after set number of attempts
• Two-step verification
o Extra data is sent to device, pre-set by user
o … making it more difficult for hacker to obtain it
o Data has to be entered into the same system
o … so if attempted from a remote location, it will not be accepted
• Malware (malicious software) is the term used for any software that has been
created with malicious intent to cause harm to a computer system
• Examples of issues caused by malware include
o Files being deleted, corrupted or encrypted
o Internet connection becoming slow or unusable
o Computer crashing or shutting down
• Malware can exist in many forms, each designed to perform its role in
different ways
Card fraud
Why is card fraud a threat?
• Card fraud is a threat as fraudsters will try to gain illegal access to credit and
debit cards
• The main way this is achieved is through:
o Shoulder surfing (shouldering)
o Card cloning
o Keylogging
Shoulder Surfing
Card cloning
• This is the copying of the data from a user's credit or debit card by
scanning the magnetic strip through a skimmer machine
• Card cloning can be prevented by ensuring a card with a chip is being used
and the chip can not be cloned, though the data on it can still be read
Keylogging
• This is software installed to detect and store keystrokes from the keyboard
and send the data back to the criminal
• Data such as passwords and other secure data can be collected this way
• To prevent key logging, users should frequently scan their system using
anti-virus software and use cloud password software to prevent having to
enter their details manually
Protection of Data
How can data be kept securely?
• Biometric data is unique to the person and can not be copied, meaning that
the data is always with the person
• Passwords can be easily copied, forgotten, guessed or cracked
• It is difficult to copy or forge biometric data
• Biometrics eliminates the possibility of attacks such as shoulder surfing and
key-logging software
• Biometrics of a high degree of accuracy as there is no known way to copy a
person's retina pattern for example
Digital certificate
What is a digital certificate?
• A digital certificate is a digital file used to prove who stores the public key
• The public key works alongside a private key to encrypt and decrypt the data
so that all content is secure
• Digital certificates are given by trusted companies to ensure they are real and
safe
Worked Example
(i) ) Identify a security solution that could be used to protect a computer from a
computer virus, hacking and spyware.
(ii) Describe how each security solution you identified in (i) will help protect the
computer.
[6]
Answers
(i)
• Monitoring communication
o Checking for spelling & grammar errors
o Reading tone, is the user being rushed? // is the user made to
panic?
• Authentication
o Checks the user is they say they are
o Captcha proves they are not a bot
o Passwords lockout after a set number of attempts
• Firewall
o Monitors traffic coming into and out of the computer system
o Checks that the traffic meets any criteria/rules set
o Blocks any traffic that does not meet the criteria/rules set // set
blacklist/whitelist
• Biometrics
o Data needed to enter is unique to individual
o … therefore it is very difficult to replicate
o Lock out after set number of attempts
Encryption
What is encryption?
Firewall
What is a firewall?
• Hackers
• Malware
• Unauthorised Access to a Network
• DOS/DDOS attacks
Two-factor authentication
What is two-factor authentication (2FA)?
Advantages Disadvantages
• Passwords that are too complex can be
harder to remember
• Strong passwords are difficult to crack
• Too many passwords are hard to
• Regularly changing passwords increases the
remember
security
• It is harder to choose unique
• Using a range of passwords over the system
passwords if a user is forced to
will prevent or slow unauthorised access to the
regularly update them
full system
• Hackers can break most passwords
using brute force attacks