0% found this document useful (0 votes)
5 views

Hacking

Hacking refers to unauthorized access to computer systems for malicious purposes, leading to issues like data breaches and financial loss. Phishing is a social engineering tactic that uses fraudulent emails to steal personal information, while pharming redirects users to fake websites to capture sensitive data. Preventative measures against these threats include strong passwords, anti-malware software, firewalls, and user training.

Uploaded by

trevor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Hacking

Hacking refers to unauthorized access to computer systems for malicious purposes, leading to issues like data breaches and financial loss. Phishing is a social engineering tactic that uses fraudulent emails to steal personal information, while pharming redirects users to fake websites to capture sensitive data. Preventative measures against these threats include strong passwords, anti-malware software, firewalls, and user training.

Uploaded by

trevor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Hacking

What is a hacking?

• Hacking is a generic term used to describe the act of gaining unauthorised


access to computer systems or networks to gain control, steal
information, or cause damage
• A hacker is a criminal who exploits technical vulnerabilities to break into
computer systems and networks
• Hackers seek out opportunities that make this possible, these include:
o Unpatched software
o Out-of-date anti-malware
o Weak passwords

What are the effects of hacking?

• Hacking can cause a number of issues for an organisation or individual, these


include:
o Data breaches
o Installation of malware
o Data loss
o Identify theft
o Financial loss

How can hacking be prevented?

• Hacking can be prevented by a number of methods, some of these include:


o Using strong passwords
o Using two-factor authentication
o Installing anti-malware software
o Using firewalls

Phishing
What is a phishing?

• Phishing is a form of social engineering


• It involves sending fraudulent, legitimate-looking emails to a large number
of email addresses, claiming to be from a reputable company or trusted
source to try and gain access to your details
• Phishing often tries to coax the user to click on a login button to enter their
details

What are the effects of phishing?


• The creator of the email can gain unauthorised access to personal data such
as login information, bank accounts and more
• Phishing can lead to identity theft or fraudulent activity on credit cards and
bank accounts

How can phishing be prevented?

• Phishing can be prevented by:


o Anti-spam filters to avoid fraudulent emails arriving in a user's inbox
o Training staff to recognise fraudulent emails and to avoid opening
attachments from unrecognised senders
o User access levels to prevent staff from being able to open files-types
such as executable (.exe) files and batch (.bat) files

Pharming

Cyber Security
Threats (Cambridge (CIE)
IGCSE Computer Science)
: Revision Note
Forms of cyber security threat

• Computers face a variety of forms of attack and they can cause a large
number of issues for a network and computers
• The main threats posed are:
o Brute-force attacks
o Data interception & theft
o DDos attack
o Hacking
o Malware
o Pharming
o Phishing
o Social engineering

Brute Force Attack


What is a brute-force attack?

• A brute force attack works by an attacker repeatedly trying multiple


combinations of a user's password to try and gain unauthorised access to
their accounts or devices
• An example of this attack would be an attacker finding out the length of a PIN
code, for example, 4-digits
• They would then try each possible combination until the pin was cracked,
for example
o 0000
o 0001
o 0002
• A second form of this attack, commonly used for passwords is a dictionary
attack
• This method tries popular words or phrases for passwords to guess the
password as quickly as possible
• Popular words and phrases such as 'password', '1234' and 'qwerty' will be
checked extremely quickly.

Data interception
What is data interception & theft?

• Data interception and theft is when thieves or hackers


can compromise usernames and passwords as well as other sensitive data
• This is done by using devices such as a packet sniffer
• A packet sniffer will be able to collect the data that is being transferred on a
network
• A thief can use this data to gain unauthorised access to websites,
companies and more

DDoS Attack
What is a DDoS attack?

• A Distributed Denial of Service Attack (DDoS attack) is a large


scale, coordinated attack designed to slow down a server to the point of it
becoming unusable
• A server is continually flooded with requests from multiple distributed
devices preventing genuine users from accessing or using a service
• A DDoS attack uses computers as 'bots', the bots act as automated
tools under the attackers control, making it difficult to trace back to the
original source
• A DDoS attack can result in companies losing money and not being able to
carry out their daily duties
• A DDoS attack can cause damage to a company's reputation

Hacking
What is hacking?

• Hacking is the process of identifying and exploiting weaknesses in a


computer system or network to gain unauthorised access
• Access can be for various malicious purposes, such as stealing data,
installing malware, or disrupting operations
• Hackers seek out opportunities that make this possible, this includes:
o Unpatched software
o Out-of-date anti-malware

Malware
What is malware?

• Malware (malicious software) is the term used for any software that has been
created with malicious intent to cause harm to a computer system
• Examples of issues caused by malware include
o Files being deleted, corrupted or encrypted
o Internet connection becoming slow or unusable
o Computer crashing or shutting down
• There are various types of malware and each has slightly different issues
which they cause

Malware What it Does


• Contains code that will replicate and cause unwanted and unexpected events to occur
• Examples of issues a user may experience are
o Corrupt files
Virus
o Delete data
o Prevent applications from running correctly

• Very similar to viruses, main difference being that they spread to other drives and computers on the
network
• Worms can infect other computers from
o Infected websites
Worms
o Instant message services
o Email
o Network connection

• Sometimes called a Trojan Horse


Trojan • Trojans disguise themselves as legitimate software but contain malicious code in the background

• Allow a person to spy on the users' activities on their devices


• Embedded into other software such as games or programs that have been downloaded
Spyware from illegitimate sources
• Can record your screen, log your keystrokes to gain access to passwords and more

• Displays adverts to the user


• Users have little or no control over the frequency or type of ads
Adware
• Can redirect clicks to unsafe sites that contain spyware

• Locks your computer or device and encrypts your documents and other important files
Ransomware
• A demand is made for money to receive the password that will allow the user to decrypt the files
• No guarantee paying the ransom will result in the user getting their data back

Pharming
What is pharming?

• Pharming is typing a website address into a browser and it being redirected


to a 'fake' website in order to trick a user into typing in sensitive information
such as passwords
• An attacker attempts to alter DNS settings, the directory of websites and
their matching IP addresses that is used to access websites on the internet or
change a users browser settings
• A user clicks a link which downloads malware
• The user types in a web address which is then redirected to the fake
website

How can you protect against it?

• To protect against the threat of pharming:


o Keep anti-malware software up to date
o Check URLs regularly
o Make sure the padlock icon is visible

Phishing
What is phishing?

• Phishing is the process of sending fraudulent emails/SMS to a large number


of people, claiming to be from a reputable company or trusted source
• Phishing is an attempt to try and gain access to your details, often by coaxing
the user to click on a login button/link

Social Engineering
What is social engineering?

• Social engineering is exploiting weaknesses in a computer system


by targeting the people that use or have access to them
• There are many forms of social engineering, some examples include
o Fraudulent phone calls: pretending to be someone else to gain
access to their account or their details
o Pretexting: A scammer will send a fake text message, pretending to
be from the government or human resources of a company, this scam
is used to trick an individual into giving out confidential data
• People are seen as the weak point in a system because human errors can
lead to significant issues, some of which include:
o Not locking doors to computer/server rooms
o Not logging their device when they're not using it
o Sharing passwords
o Not encrypting data
o Not keeping operating systems or anti-malware software up to
date

Worked Example

A company is concerned about a distributed denial of service (DDoS) attack.

(i) Describe what is meant by a DDoS attack.

[4]

(ii) Suggest one security device that can be used to help prevent a DDoS attack.[1]

Answers

(i) Any four from:

• multiple computers are used as bots


• designed to deny people access to a website
• a large number / numerous requests are sent (to a server) …
• … all at the same time
• the server is unable to respond / struggles to respond to all the requests
• the server fails / times out as a result.

(ii)

• firewall OR proxy server

Access Levels
What are access levels?
• Access levels ensure users of a network can access what they need to
access and do not have access to information/resources they shouldn't
• Users can have designated roles on a network
• Access levels can be set based on a user's role, responsibility, or
clearance level
o Full access - this allows the user to open, create, edit & delete files
o Read-only access - this only allows the user to open files without
editing or deleting
o No access - this hides the file from the user
• Some examples of different levels of access to a school network could
include:
o Administrators: Unrestricted - Can access all areas of the network
o Teaching Staff: Partially restricted - Can access all student data but
cannot access other staff members' data
o Students: Restricted - Can only access their own data and files
• Users and groups of users can be given specific file permissions

Anti-Malware
What is anti-malware software?

• Anti-malware software is a term used to describe a combination of different


software to prevent computers from being susceptible to viruses and
other malicious software
• The different software anti-malware includes are
o Anti-virus
o Anti-spam
o Anti-spyware

How does anti-malware work?

• Anti-malware scans through email attachments, websites and


downloaded files to search for issues
• Anti-malware software has a list of known malware signatures to
block immediately if they try to access your device in any way
• Anti-malware will also perform checks for updates to ensure the database of
known issues is up to date

Authentication
What is authentication?

• Authentication is the process of ensuring that a system is secure by asking


the user to complete tasks to prove they are an authorised user of the
system
• Authentication is done because bots can submit data in online forms
• Authentication can be done in several ways, these include
o Usernames and passwords
o Multi-factor authentication
o CAPTCHA - see example below

Biometrics
• Biometrics use biological data for authentication by identifying unique
physical characteristics of a human such as fingerprints, facial
recognition, or iris scans
• Biometric authentication is more secure than using passwords as:
o A biometric password cannot be guessed
o It is very difficult to fake a biometric password
o A biometric password cannot be recorded by spyware
o A perpetrator cannot shoulder surf to see a biometric password

Automating Software Updates


What are automatic software updates?

• Automatic software updates take away the need for a user to remember to
keep software updated and reduce the risk of software
flaws/vulnerabilities being targeted in out of date software
• Automatic updates ensure fast deployment of updates as they release

Communication
What is communication?

• One way of protecting data is by monitoring digital communication to


check for errors in the spelling and grammar or tone of the communication
• Phishing scams often involve communication with users, monitoring it can be
effective as:
o Rushed - emails and texts pretending to be from a reputable company
are focused on quantity rather than quality and often contain basic
spelling and grammar errors
o Urgency - emails using a tone that creates panic or makes a user feel
rushed is often a sign that something is suspicious
o Professionalism - emails from reputable companies should have
flawless spelling and grammar

URL
How to check a URL?

• Checking the URL attached to a link is another way to prevent phishing


attacks
• Hackers often use fake URLs to trick users into visiting fraudulent websites
o e.g. http://amaz.on.co.uk/ rather than http://amazon.co.uk/
• If you are unsure, always check the website URL before clicking any
links contained in an email

Firewalls
What is a firewall?

• A firewall monitors incoming and outgoing network traffic and uses a set
of rules to determine which traffic to allow
• A firewall prevents unwanted traffic from entering a network by filtering
requests to ensure they are legitimate
• It can be both hardware and software and they are often used together to
provide stronger security to a network
o Hardware firewalls will protect the whole network and prevent
unauthorised traffic
o Software firewalls will protect the individual devices on the network,
monitoring the data going to and from each computer

What form of attack would this prevent?

• Hackers
• Malware
• Unauthorised access to a network

Privacy Settings
What are privacy settings?

• Privacy settings are used to control the amount of personal


information that is shared online
• They are an important measure to prevent identity theft and other forms of
online fraud
• Users should regularly review their privacy settings and adjust them as
needed

Proxy Servers
What is a proxy server?

• A proxy-server is used to hide a user's IP address and location, making it


more difficult for hackers to track them
• They act as a firewall and can also be used to filter web traffic by setting
criteria for traffic
• Malicious content is blocked and a warning message can be sent to the user
• Proxy-servers are a useful security measure for protecting against external
security threats as it can direct traffic away from the server

SSL
What is SSL?

• Secure Socket Layer (SSL) is a security protocol which is used to encrypt


data transmitted over the internet
• This helps to prevent eavesdropping and other forms of interception
• SSL is widely used to protect online transactions, such as those involving
credit card information or other sensitive data
• It works by sending a digital certificate to the user’s browser
• This contains the public key which can be used for authentication
• Once the certificate is authenticated, the transaction will begin

Worked Example

(i) ) Identify a security solution that could be used to protect a computer from a
computer virus, hacking and spyware.

Each security solution must be different

Threat Security solution


Computer virus
Hacking
Spyware
[3]

(ii) Describe how each security solution you identified in (i) will help protect the
computer.

[6]

Answers

(i)

Threat Security solution


Computer virus Anti-malware/virus (software) Firewall
Firewall

Passwords
Hacking
Biometrics

Two-step verification
Anti-malware/virus (software)

Spyware Two-step verification

Firewall
(ii) Two marks for each description

• Anti-malware/virus (software)
o Scans the computer system (for viruses)
o Has a record of known viruses
o Removes/quarantines any viruses that are found
oChecks data before it is downloaded
o… and stops download if virus found/warns user may contain
virus
• Anti-malware/spyware (software)
o Scans the computer for spyware
o Removes/quarantines any spyware that is found
o Can prevent spyware being downloaded
• Firewall
o Monitors traffic coming into and out of the computer system
o Checks that the traffic meets any criteria/rules set
o Blocks any traffic that does not meet the criteria/rules set // set
blacklist/whitelist
• Passwords
o Making a password stronger // by example
o Changing it regularly
o Lock out after set number of attempts // stops brute force attacks
// makes it more difficult to guess
• Biometrics
o Data needed to enter is unique to individual
o … therefore it is very difficult to replicate
o Lock out after set number of attempts
• Two-step verification
o Extra data is sent to device, pre-set by user
o … making it more difficult for hacker to obtain it
o Data has to be entered into the same system
o … so if attempted from a remote location, it will not be accepted

Viruses & malware


Why is malware a threat?

• Malware (malicious software) is the term used for any software that has been
created with malicious intent to cause harm to a computer system
• Examples of issues caused by malware include
o Files being deleted, corrupted or encrypted
o Internet connection becoming slow or unusable
o Computer crashing or shutting down
• Malware can exist in many forms, each designed to perform its role in
different ways

Malware What it Does


• A program which can replicate itself on a user's computer. It contains
code that will cause unwanted and unexpected events to occur
• Examples of issues a user may experience are
Computer
o Corrupt files
virus
o Delete data
o Prevent applications from running correctly
• Sometimes also called a Trojan Horse
• Trojans disguise themselves as legitimate software but contain
Trojan
malicious code in the background

• Software which will allow a person to spy on the users' activities on


their devices
• This form of software will be embedded into other software such as
games or programs that have been downloaded from illegitimate
Spyware
sources
• Spyware can record your screen, log your keystrokes to gain access
to passwords and more

How can malware be prevented?

• To protect against the threat of malware:


o Ensure code is written correctly
o Keep anti-malware software up to date
o Install a firewall
o Educate users

Card fraud
Why is card fraud a threat?

• Card fraud is a threat as fraudsters will try to gain illegal access to credit and
debit cards
• The main way this is achieved is through:
o Shoulder surfing (shouldering)
o Card cloning
o Keylogging

Shoulder Surfing

• Observing a person's private information over their shoulder e.g. cashpoint


machine PINs
• This can be prevented by users ensuring they have covered over their
PIN when entering it

Card cloning

• This is the copying of the data from a user's credit or debit card by
scanning the magnetic strip through a skimmer machine
• Card cloning can be prevented by ensuring a card with a chip is being used
and the chip can not be cloned, though the data on it can still be read

Keylogging

• This is software installed to detect and store keystrokes from the keyboard
and send the data back to the criminal
• Data such as passwords and other secure data can be collected this way
• To prevent key logging, users should frequently scan their system using
anti-virus software and use cloud password software to prevent having to
enter their details manually

Protection of Data
How can data be kept securely?

• Data can be held securely by storing it in an encrypted format and


ensuring authentication is being used
• This goes a long way to ensuring that only trusted sources can access the
data
• There are a number of ways to store data securely, these include:
o Biometrics
o Digital certificate
o Secure socket layer (SSL)
o Encryption
o Firewall
o Two-factor authentication
o Usernames & passwords

Biometrics including the use of biometric data


Digital certificate including its purpose and contents
Secure socket layer (SSL) including encrypted links between the server and the client computer
Encryption including its purpose for the protection of data on hard discs, email, cloud, HTTPS websites
Firewall including its purpose
Two-factor authentication including its purpose and function
User id and password including how they are used to increase the security of data
Biometrics
What are biometrics?

• Biometrics are a way of authenticating a user by using their unique human


characteristics
• Some of the ways biometrics can be used are:
o Fingerprint scans
o Retina scans
o Facial recognition

What are the benefits of using biometrics?

• Biometric data is unique to the person and can not be copied, meaning that
the data is always with the person
• Passwords can be easily copied, forgotten, guessed or cracked
• It is difficult to copy or forge biometric data
• Biometrics eliminates the possibility of attacks such as shoulder surfing and
key-logging software
• Biometrics of a high degree of accuracy as there is no known way to copy a
person's retina pattern for example

What are the drawbacks of using biometrics?

• Collecting biometric data can be intrusive, for example, scanning eyes


• Scans be not be recognised, an example of could be fingerprint scans with
dirty hands
• Retina and iris recognition is very expensive to install
• Low light can provide an issue for facial recognition as well as hats and
glasses
• people may be uncomfortable having their most unique characteristics being
stored in a database

Digital certificate
What is a digital certificate?

• A digital certificate is a digital file used to prove who stores the public key
• The public key works alongside a private key to encrypt and decrypt the data
so that all content is secure
• Digital certificates are given by trusted companies to ensure they are real and
safe

What is included in a digital certificate?

• Digital certificates contain a lot of information, some of this includes:


o Public key: The key associated with the holder
o Subject information: Details about the holder
o Issuer information: This identifies the certificate authority (CA)
o Validity period: The start and end date for the certificate to remain
valid
o Serial number: A unique number to identify the certificate
o Signature algorithm: The algorithm used by the CA to sign the
certificate
o Digital signature: The CA's signature to prove the certificate was
issued by them

Secure Socket Layer (SSL)


What is SSL?

• Secure Socket Layer (SSL) is a security protocol which is used to encrypt


data transmitted over the internet
• This helps to prevent eavesdropping and other forms of interception
• SSL is widely used to protect online transactions, such as those involving
credit card information or other sensitive data
• It works by sending a digital certificate to the user’s browser
• This contains the public key which can be used for authentication
• Once the certificate is authenticated, the transaction will begin

Worked Example

(i) ) Identify a security solution that could be used to protect a computer from a
computer virus, hacking and spyware.

Each security solution must be different

Threat Security solution


Phishing
DDoS attack
Hacking
[3]

(ii) Describe how each security solution you identified in (i) will help protect the
computer.

[6]

Answers

(i)

Threat Security solution


Phishing Monitoring communication
Brute force attack Authentication
Hacking Firewall/Biometrics
(ii) Two marks for each description

• Monitoring communication
o Checking for spelling & grammar errors
o Reading tone, is the user being rushed? // is the user made to
panic?
• Authentication
o Checks the user is they say they are
o Captcha proves they are not a bot
o Passwords lockout after a set number of attempts
• Firewall
o Monitors traffic coming into and out of the computer system
o Checks that the traffic meets any criteria/rules set
o Blocks any traffic that does not meet the criteria/rules set // set
blacklist/whitelist
• Biometrics
o Data needed to enter is unique to individual
o … therefore it is very difficult to replicate
o Lock out after set number of attempts
Encryption
What is encryption?

• Encryption is a method of converting plain text into ciphered text to be stored


• Encryption uses complex mathematical algorithms to scramble the text
• Asymmetric encryption, also known as private key, public key encryption is
often used for web pages and other communication

What form of attack would this prevent?

• Encryption plays a role in all forms of attack on a network


• It is important to note that it does not prevent the attacks from occurring but
it does stop the attacker from gaining access to the information

Firewall
What is a firewall?

• A firewall is a barrier between a network and the internet


• A firewall prevents unwanted traffic from entering a network by filtering
requests to ensure they are legitimate
• It can be both hardware and software and they are often used together to
provide stronger security to a network
o Hardware firewalls will protect the whole network and prevent
unauthorised traffic
o software firewalls will protect the individual devices on the network,
monitoring the data going to and from each computer

What form of attack would this prevent?

• Hackers
• Malware
• Unauthorised Access to a Network
• DOS/DDOS attacks

Two-factor authentication
What is two-factor authentication (2FA)?

• 2FA is a security measure that requires users to provide two separate


forms of identification to verify their identity
• The purpose of 2FA is to add an extra layer of security beyond just a
username and password
• It usually involves a combination of something the user knows
(password), something the user has such as a smartphone using SMS or
an authenticator application
• The two stages of two-factor authentications are:
1. the user enters a username and password / pin number
2. The user enters a 1 time unique pin number sent to their mobile device

Username & Password


What are passwords?

• Passwords are a digital lock to prevent unauthorised access to an account


• They are often stored as an encrypted/ciphered text entry in a database,
ensuring that even with unauthorised access to a database, a hacker would
not be able to gain access to the individual passwords of users
• Strong passwords and regular password changes are important to
maintain security
• To maintain a strong password, it is recommended to use a combination of
uppercase and lowercase letters, numbers, and special characters

What form of attack would this prevent?

• Data Interception and Theft


• Physical Security Issues
• SQL Injection

What are the advantages and disadvantages of using passwords?

Advantages Disadvantages
• Passwords that are too complex can be
harder to remember
• Strong passwords are difficult to crack
• Too many passwords are hard to
• Regularly changing passwords increases the
remember
security
• It is harder to choose unique
• Using a range of passwords over the system
passwords if a user is forced to
will prevent or slow unauthorised access to the
regularly update them
full system
• Hackers can break most passwords
using brute force attacks

You might also like