Save
AQA GCSE Computer Science
3.6 Cyber security
3.6.1 Cyber security threats
Save
Share
Learn
Content
Leaderboard
Share
Learn
Cards (40)
Order the steps in a cyber security attack from an external threat
1️⃣ Attack originates outside the organization
2️⃣ Targets sensitive data
3️⃣ Disrupts operations
Phishing attacks often use fraudulent emails to obtain login
credentials
Match the type of cyber threat with its description:
Malware ↔️ Malicious software designed to cause damage
Phishing ↔️ Deceptive attempts to obtain sensitive information
DoS ↔️ Overwhelming systems with traffic
Insider threats involve malicious actions by current or former
employees
What combination of measures is required to mitigate internal threats effectively?
Security controls, training, monitoring
Understanding and mitigating cyber threats is essential for maintaining robust
cyber security
.
True
Match the type of cyber threat with its definition:
Malware ↔️ Malicious software designed to cause harm
Phishing ↔️ Deceptive attempts to obtain sensitive information
DoS ↔️ Overwhelming systems with traffic
Malware is malicious software designed to cause damage or gain unauthorized
access
What does a Denial of Service (DoS) attack aim to do?
Disrupt normal operations
External threats target sensitive data and aim to
disrupt
operations.
True
Internal threats are cyber security risks that come from within the
organization
What is a common example of human error that can lead to a security breach?
Falling for phishing scams
Malware is malicious software designed to cause damage or gain unauthorized
access
What is the primary goal of a Denial of Service (DoS) attack?
Overwhelm systems with traffic
What is a cyber security threat?
Malicious activity targeting systems
What does phishing involve?
Obtaining sensitive information deceptively
Phishing attempts often use fake emails or
websites
External threats originate from outside an
organization's
internal network.
True
What type of threat uses fraudulent emails or websites to steal information?
Phishing
Why is understanding cyber security threats important?
To prevent data breaches
Phishing uses deceptive
emails
to obtain sensitive information.
True
Match the cyber security threat with its definition:
Malware ↔️ Malicious software to cause harm
Phishing ↔️ Deceptive attempts to obtain information
Denial of Service (DoS) ↔️ Overwhelming systems with traffic
What is the purpose of a Denial of Service (DoS) attack?
To prevent legitimate access
Malware is malicious
software
Match the type of cyber security threat with its description:
Malware ↔️ Software designed to cause harm
Phishing ↔️ Deceptive attempts to obtain data
Denial of Service ↔️ Flooding systems with traffic
Malware is malicious software designed to cause
damage
A Denial of Service (DoS) attack overwhelms systems with
traffic
What is the purpose of malware in a cyber attack?
Cause damage
Denial of Service (
DoS
) attacks aim to flood systems with traffic to make them unavailable.
True
What is the primary difference between external and internal cyber threats?
Origin of the threat
Human error, such as falling for phishing scams, can lead to
security breaches
.
True
Cyber security threats are malicious activities that target computer systems, networks, and
data
Some common types of cyber security threats include malware, phishing, and denial of
service
Phishing involves deceptive attempts to obtain
sensitive
information through fake emails or websites.
True
Cyber security threats can lead to data breaches and financial losses.
True
External threats originate from outside an organization's internal
network
What is the purpose of phishing attacks?
Obtain sensitive information
Insider threats involve malicious actions by current or former
employees
.
True
Steps to mitigate internal threats
1️⃣ Implement security controls
2️⃣ Provide employee training
3️⃣ Monitor systems vigilantly
Phishing attempts use deceptive emails or websites to obtain
sensitive
information.
True