Save
Computer science
Lesson 2
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Tision
Visit profile
Cards (38)
Malware
is malicious software capable of
Providing remote control for an
attacker
to use an infected machine
Corrupting, modifying or deleting data and files on a
network
Stealing
sensitive
data
signs of
malware
A new
toolbar
appears on your browser
Your homepage has changed
unexpectedly
Your computer suddenly runs a lot
slower
What are some things you should do to avoid
malware
?
Use an
antivirus
programme to scan that download for malware before opening it.
List as many websites/services that you can think of that require a
username
/
password
to access
Snapchat
,
Tiktok
,
Minecraft
,
Youtube
,
Shein
Facebook
Twitter
Snapchat
Risks:Personal information being
released
.
Email
Can see your private messages.
Bank
Can
steal
your money and your details.
What is a
brute force attack
? How do they work?
A
brute
force
attack
is a
trial
and
error
method
of gaining access to
computer
systems.
Simple brute attack
Description: Occurs when hackers attempt to guess the users
login details
Dictionary
attack:
An
intruder
attempts to crack a
password-protected
security
system with a
“dictionary
list”
Hybrid
attack
:
A kind of
cyberattack
where the
perpetrator
blends
two
or more kinds of tools to carry out the
assault.
Credential stuffing
:
A
cyber
attack
in which
credentials
obtained from a
data breach
on one service are used to attempt to
log
in to another
unrelated
service.
Why can
brute
force
attacks be successful?
Brute
attacks
will be successful if your
passwords
are
easy
to guess.
How to make a secure passwordMake a unique password
Use
uppercase letters
Be more than 8
characters
long.
Special
characters
Not a
common
word
NO
PERSONAL INFO
!!!
Methods on how to prevent
brute force attacks
Time delay between entering one
password
and another
Description:
Delays
when the user can attempt to log in with an
incorrect password/code
methods on how to prevent brute force
attacks
Limits
to the number of
password
guesses
Description: Accounts are
locked
after
several
attempts
methods to prevent brute force attacks
Captcha
tests
Descriptions-
forces
a human to
complete
a
test
to see If they are
not
a
bot
What does
PIN
stand for?
Personal Identification Numbers
19XX
and
20XX
are very common PIN combinations, why?
those pins are the
persons
birth year.
What is biometric security?
It’s
software
is made to automatically recognise people based on their unique
behaviour
or
biological
characterics.
Iris/retina
scanning - scans the
unique
patterns of a persons eye
fingerprint scanning
- scans. the
unique
patterns of a persons finger
Facial
recognition-
scans the unique features of a person‘s face
Voice recognition
- scans the
unique
frequencies of a person’s voice
Why might
biometric
scans be more beneficial than traditional passwords systems?
Biometric is more unique and less
hackers
are able to hack it.
What is a
brute force attack
?
a method of guessing
passwords
by trying all possible
combinations
Simple
brute force
attacks…
test a large number of
random
test combinations, consisting of letters,
numbers
and symbols
Dictionary attacks…
test a large list of
common
words and phrases
Hybrid attacks…
test a large combination of
common words
with random text, such as replacing
letter
in common words with an @
symbol
or with
numbers
Credential stuffing
attacks…
tests a large list of
stolen
usernames and passwords to
login
to accounts across a variety of online platforms
What makes a password vulnerable to brute force attack?
being short and simple
What is the purpose of a
username
and
password
?
to identify the user and to
verify
they are who they claim to be
A secure
password
should…
be a mixture of
upper-case
and
lowercase
letter,
numbers
and
characters
what type of
password attacks
would be most successful against against the password
T63k#s23A
?
Brute force
What is
’rate limiting’
, and how does it help prevent
brute force
attacks?
it limits the number of
login attempts
within a certain frame to prevent repeated attempts
what is
NOT
an example of
biometric
security
Text passwords
What is the purpose of a
CAPTCHA
test?
To ensure that a user is a human and not an
automated
bot
Why are
CAPTCHAs
effective against brute force attacks?
they prevent automated
bots
from attempting multiple logins
See similar decks
CS2 - COMPUTER MANAGEMENT
computing
16 cards
AP Computer Science Principles
1196 cards
AP Computer Science A
1898 cards
OCR A-Level Computer Science
2091 cards
OCR GCSE Computer Science
1937 cards
Edexcel GCSE Computer Science
2949 cards
AQA GCSE Computer Science
2308 cards
AQA A-Level Environmental Science
2441 cards
AQA A-Level Computer Science
5135 cards
1.6.2 Legislation Relevant to Computer Science
OCR GCSE Computer Science > 1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
39 cards
Topic 3: Computers
Edexcel GCSE Computer Science
454 cards
3.4 Computer systems
AQA GCSE Computer Science
208 cards
3.1 Hardware and Software Components
Edexcel GCSE Computer Science > Topic 3: Computers
310 cards
3.5 Fundamentals of computer networks
AQA GCSE Computer Science
218 cards
3.1.2 Understanding computer software:
Edexcel GCSE Computer Science > Topic 3: Computers > 3.1 Hardware and Software Components
47 cards
2.1 Algorithms
OCR GCSE Computer Science
207 cards
6.4 Computer architecture
AQA A-Level Computer Science > 6.0 Fundamentals of computer systems
37 cards
4.2.3 Environmental Science
AP French Language and Culture > Unit 4: How Science and Technology Affect Our Lives > 4.2 Science and Ethics
59 cards
6.0 Fundamentals of computer systems
AQA A-Level Computer Science
254 cards
3.4.2 Boolean logic
AQA GCSE Computer Science > 3.4 Computer systems
54 cards
1.5 Systems Software
OCR GCSE Computer Science
59 cards