Major challenge for individuals and organisations that rely on digital technology to store and transmit sensitive information
Brute-force attack
Trial-and-error method used to crack passwords or encryption keys by trying every possible combination until the correct one is found
Aim is to gain unauthorised access to a system or network
Data interception
Eavesdropping on communication channels to intercept and steal sensitive information, such as passwords, credit card numbers, or personal data
Aim is to steal sensitive information for personal gain or to use it for further cyber attacks
Distributed Denial of Service (DDoS) attack
Multiple computers are used as bots to flood a server with lots of requests at the same time which the server can't respond to, causing it to crash or become unavailable to users
Aim is to disrupt the normal functioning of a system or network by denying users access
Hacking
Gaining unauthorised access to a system or network to steal or manipulate data, disrupt services, or cause damage
Aim can vary from personal gain to activism or cyber espionage
Types of malware
Virus
Worm
Trojan horse
Spyware
Adware
Ransomware
Virus
Piece of code that attaches itself to a legitimate program or file and then replicates itself to spread to other programs or files on the computer, can cause damage to the system
Worm
Standalone program that can spread and replicate itself over computer networks, can take up storage space or bandwidth
Trojan horse
Program that disguises itself as a legitimate program or file, but when installed, it can delete data or damage hardware
Spyware
Software that records all key presses and transmits these to a third party
Adware
Type of software that displays unwanted advertisements on the computer without the user's consent, some may contain spyware and some may link to viruses when clicked
Ransomware
Type of malware that encrypts the user's files and demands a ransom payment to decrypt them, can cause data loss, financial damage and disrupt business operations
Malware attacks
Aim can range from data theft to extortion or disruption of services
Phishing
User is sent an email which looks legitimate, containing a link to a fake website where the user is encouraged to enter their details
Aim is to steal sensitive information for personal gain or to use it for further cyber attacks
Pharming
Malware being downloaded without the user's knowledge, redirects the user to a fake website where they're encouraged to enter their personal details
Aim is to steal sensitive information for personal gain or to use it for further cyber attacks
A user needs to click on a link or an attachment to open the fake web page or trigger a download of malicious code, and not just open the email
Social engineering
Manipulating individuals to gain access to confidential information or to perform an action that benefits the attacker
Techniques include impersonation, baiting, and pretexting
Aim is to exploit human behaviour and vulnerabilities to gain unauthorised access to a system or network
Accidental data damage
Loss of power
Liquids being spilt
Flooding
Fire
Hardware failure
Software failure
Human error
Access levels
Used to restrict access to sensitive information to only authorised personnel
Can be set based on a user's role, responsibility, or clearance level
Full access, read-only access, no access
Anti-malware
Used to prevent and remove malware
Includes anti-virus and anti-spyware programs
Scans files and compares them to a list of known malware, quarantines and deletes any malware found
Authentication methods
Passwords
Biometrics
Two-factor authentication
Passwords
Used to protect sensitive data by preventing unauthorised access, should be complex, unique, and changed regularly
Biometrics
Uses biological data for authentication by identifying unique physical characteristics of a human, more secure than passwords
Two-factor authentication (2FA)
Requires users to provide two forms of authentication before accessing data, provides an extra layer of security
Automating software updates
Ensures software systems are up-to-date with the latest security patches, helps prevent security threats
Checking communications
Checking spelling and tone can prevent phishing attacks
Checking URLs
Checking the URL attached to a link can prevent phishing attacks, hackers often use fake URLs
Firewalls
Monitor incoming and outgoing traffic between the computer and the network, accept or reject traffic based on user-set criteria, can help prevent hacking and malware
Privacy settings
Control the amount of personal information shared online, important to prevent identity theft and online fraud
Proxy-servers
Hide a user's IP address and location, filter web traffic and block malicious content, protect against external security threats
Secure Socket Layer (SSL)
Security protocol used to encrypt data transmitted over the internet, helps prevent eavesdropping and interception, widely used to protect online transactions
Physical methods
Used to physically protect hardware that stores sensitive data, can include locked rooms, CCTV, bodyguards
Backup
Process of making a copy of files in case something happens to the original ones, important to protect against data loss
Ethical concerns with using the internet
Addiction
Breaching copyright
Cyber bullying
Data protection
Environmental effects
Fake news
Inappropriate materials
Intellectual property theft
Piracy
Plagiarism
Privacy
System Software
Provides the services that the computer requires, including operating system and utility software
Application Software
Designed to carry out a specific task the user would need for completing a variety of tasks
Systems Software
Allows instructions to be processed by the CPU to allow word processing software to process
Without systemssoftware the system would be useless
Elements of Systems Software
Operating System
Utility Software
Operating System
A program designed to run other programs on a computer, managing both software and hardware resources