IB Computer Science Case Study 2026: An ethical approach to hacking

0.0(0)
Studied by 2 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/50

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:43 PM on 5/3/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

51 Terms

1
New cards

Buffer overflow attacks

An attack that occurs when a program writes more data to a buffer than it can hold, causing the excess data to overwrite adjacent memory.

2
New cards

Cross-Site Scripting (XSS)

an attacker injects malicious client-side code (usually JavaScript) into a trusted website. When unsuspecting users visit the compromised page, the browser executes this code, allowing attackers to steal session cookies, capture data, or impersonate users

3
New cards

Exploit development

A specialized area within the field of cybersecurity that focuses on discovering and utilizing software vulnerabilities. At its core, it involves analyzing software to find weak spots and then crafting code (known as an 'exploit') to take advantage of these vulnerabilities. This could be to gain unauthorized access, escalate privileges, or achieve other objectives.

4
New cards

password cracking tool

recovers passwords using various techniques. The process can involve comparing a list of words to guess passwords or the use of an algorithm to repeatedly guess the password.

5
New cards

penetration testing

Is a simulated cyberattack used to evaluate the security of a system or network. It involves ethical hackers, also known as pen testers, who attempt to exploit vulnerabilities to identify weaknesses and improve security measures.

6
New cards

Port scanning

network security technique used to identify which ports on a system are open, potentially revealing vulnerabilities and services running on that system.

7
New cards

Pretexting

form of social engineering where an attacker fabricates a story or "pretext" to gain a victim's trust and trick them into sharing sensitive information, performing actions, or granting access to systems.

8
New cards

Response plan

outlines specific actions to be taken in response to a particular event or situation, ensuring a coordinated and effective reaction. These plans can cover a wide range of scenarios, from natural disasters and security breaches to medical emergencies or cyberattacks. Effective response plans are characterised by clarity, actionability, and regular updates to address evolving risks.

9
New cards

Search engine dorking

Is a technique that uses advanced search operators to find specific, often hidden or sensitive, information on the web. It leverages the extensive indexing of webpages by search engines like Google, allowing users to target precise information by combining keywords and search operators.

Common operators include site:, filetype:, inurl:, and intitle:.For example, site:example.com filetype:pdf would search for PDF files within the example.com website.

10
New cards

Security posture assessment

a comprehensive evaluation of an organization's cybersecurity strength, focusing on identifying vulnerabilities and assessing overall resilience against cyber threats. It helps organizations understand their current security status and prioritize areas for improvement.

11
New cards

Hacker

a person who uses computers to gain access/control to data/systems.

12
New cards

Social Engineering Attacks

These are manipulative tactics used to deceive individuals into revealing sensitive information or performing actions that compromise security. Common forms are BAITING, SCAREWARE, and PHISHING.

13
New cards

IP Address

A number that identifies each computer or device on a network

14
New cards

Network Mapping

Discovery and documentation of physical and logical connectivity that exists in the network

15
New cards

Network topology

Arrangement of different elements in a network.

16
New cards

OS detection

Performs various tests including registry checks, ICMP, and TCP fingerprinting to determine target OS

17
New cards

SQL Injection

An attacker issues a SQL command to a web server as part of the URL or as input to a form on a website; web server might pass the command onto the database which then allows potentially anything to be done to the database

18
New cards

White Box Testing

This involves sharing full network and system information with the tester, including network maps and credentials. This helps to save time and reduce the overall cost of an engagement. A white box penetration test is useful for simulating a targeted attack on a specific system utilising as many attack vectors as possible.

19
New cards

Gray Box Testing

Only limited information is shared with the tester. Usually, this takes the form of login credentials. It is useful to help understand the level of access a privileged user could gain and the potential damage they could cause. These tests strike a balance between depth and efficiency and can be used to simulate either an insider threat or an attack that has breached the network perimeter.

20
New cards

Black Box Testing

No information is provided to the tester at all. The pen tester in this instance follows the approach of an unprivileged attacker, from initial access and execution through to exploitation. This scenario can be seen as the most authentic, demonstrating how an adversary with no inside knowledge would target and compromise an organisation. However, this typically makes it the costliest option too.

21
New cards

OSINT

Open Source Intelligence

-information of potential intelligence value that is available to the general public

22
New cards

Network scanning

Involves detecting all active hosts on a network and mapping them to their IP addresses, as well as running services and open ports

23
New cards

Malware

software that is intended to damage or disable computers and computer systems to gain access to user's data

24
New cards

Vishing (Voice Phishing)

Fraudulent method of making voice calls or leaving voice messages imitating reputable companies to take individuals' personal information.

25
New cards

CVEs

A list of publicly known cybersecurity vulnerabilities in systems used to address issues and track patch progress

26
New cards

Return-Oriented Programming (ROP)

A sophisticated technique that uses existing code snippets ('gadgets') in memory, chaining them together to bypass certain protection mechanisms and execute arbitrary code.

27
New cards

Network/packet sniffing

A computer program or computer hardware such as a packet capture appliance that can analyze and log traffic that passes over a computer network or part of a network.

28
New cards

Fuzzers

automatically input a vast amount of random, unexpected, or malformed data into software applications to discover coding errors and vulnerabilities.

29
New cards

active-active healthcare data centre

A configuration where two or more data centres are running the same services and applications simultaneously, and are synchronised with each other, such that if one data centre fails or experiences a disruption, the other one can take over seamlessly, without any data loss or downtime.

30
New cards

PACS

A digital medical imaging technology that manages, stores, retrieves, and transmits diagnostic images (such as X-rays, MRIs, and CT scans) and related reports

31
New cards

Io T-Enabled medical devices

Devices with unique and critical vulnerabilities: Usually can't easily be patched, use hard-coded passwords and failure can have immediate life or death consequences (Eg. infusion pumps, heart monitors).

32
New cards

NMap

a free, open-source tool used for network discovery, inventory management, and security auditing. It acts as a powerful port scanner, identifying active hosts, available services, operating systems, and packet filters on a network by analyzing raw IP packets

33
New cards

MetaSploit

A framework designed for developing exploits and executing them in a systematic manner. They can significantly reduce the time needed for writing custom exploits.

34
New cards

Lateral Movement

The technique attacers use to move from a compromised system to others within the network. A key part of Post-Exploitation.

35
New cards

Priviledge Escalation

Ways that hackers use to exploit access to compromised machines through vertical priviledge escalation (gaining higher priviledges on the same machine) and horizontal (gaining access to another user's priviledges at the same level).

36
New cards

Persistence Mechanisms

How attackers maintain access e.g. scheduled tasks, new user accounts, Dynamic Loaded Library hacking.

37
New cards

Security Information and Event Management (SIEM)

An application that aggregates and analyzes log data to monitor critical activities in an organization

38
New cards

Zero-Day Vulnerability

A software vulnerability that is unknown to the vendor that can be exploited by attackers.

39
New cards

Internet of Medical Things

The specific subset of IoT for healthcare. Using this term instead of just IoT is a major mark-earner.

40
New cards

Clinical Engineering vs. IT Departments

Highlights the organizational silos in hospitals that create security gaps for medical devices.

41
New cards

Protected Health Information (PHI)

The specific term for the sensitive data in EHRs that HIPAA protects.

42
New cards

STRIDE Model

threat modelling framework. Spoofing, tampering, repudiation, information Disclosure, denial of Service, elevation of Privilege

43
New cards

CVSS

Common Vulnerability Scoring System: used to determine the severity of a vulnerability to aid in prioritisation

44
New cards

DREAD Model

A vulnerability severity model. Damage potential, reproducibility, exploitability, affected users, discoverability

45
New cards

BC&DR

Business Continuity and Disaster Recovery: Broader plans that a cybersecurity incident response plan feeds into

46
New cards

HIPAA (Health Insurance Portability and Accountability Act)

The primary U.S. regulation for health and data privacy and security. The legal context for everything in the case study.

47
New cards

Responsible Disclosure

The process of privately reporting a vulnerability to the vendor before making it public. The ethical hacking counterpart to finding bugs.

48
New cards

Get Out Of Jail Free Card

A formal, signed document from a client authorizing a tester to perform specific, often intrusive, security tests, protecting the tester from legal prosecution.

49
New cards

Non-Disclosure Agreement (NDA)

A legal document that binds the testers to confidentiality - crucial for protecting Personal Health Information (PHI) and details of any vulnerabilities.

50
New cards

Burp Suite / OWASP ZAP

Tools for web application testing (highly relevant for EHR systems and login portals).

51
New cards

Nessus / OpenVAS

Industry standard vulnerability scanners.