Save
OCR Computer Science
Cyber Threats To Systems Security
Save
Share
Learn
Content
Leaderboard
Learn
Created by
zara k
Visit profile
Cards (15)
System security
Protection of systems,
computers
, programs and data from
attack
, damage or unauthorized access
Security threats
Attacks on
systems
and
networks
Attack
Data is viewed or vandalized
without
authorization
Types of attacks
Passive
(data is
monitored
)
Active
(data is
modified
)
Attacker location
Inside
the organization
Outside
the organization
Six out of
seven
security breaches come from the
inside
Malware
Any
hostile
or
intrusive
software
Types of malware
Viruses
(insert into normal programs)
Worms
(spread autonomously)
Trojans
(disguised as desirable software)
Spyware
(collects data)
Adware
(generates unwanted ads)
Phishing
Disguising a message to obtain
sensitive
information
Social engineering
Exploiting human
weaknesses
to access
data
Brute force attack
Trying all possible
combinations
to gain access
Denial of service (DoS) attack
Overloading
a resource to prevent
normal
operation
Distributed denial of service (
DDoS
) attack
DoS
attack from
multiple
locations
SQL injection
Exploiting
vulnerabilities
in database-driven websites to execute
malicious
SQL statements
SQL
injection
attacks are not very common because
web developers
know about them and can validate input