Computer Science : S5: L5 : Cyber Security
—----------------------------------------------------------------------------------------------------------------------Section 5: The Internet and its Uses
Viruses - Is a type of malware which spreads between computers . It can cause damage to the software and data on the computer. It gains access to your computer on an infected network router, files and emails. Once it gains access to the computer it can replicate itself and spread throughout the rest of the files.
Spyware - Is a programme which uses your internet connection to send information from your computer to another computer without you knowing. This information can be personal data, browsing habits … Types can be Password stealer (Which gains access by secretly being downloaded) Infostealers which steal information about the device and Browser Hijackers which are a type of network security attack to take control of your device.
Brute Force Attack - Is when a hacker enters all possibilities (Systematically) for a password into your login page until they get it right. This can be done by trial and error using IT work.
Phishing - When there is a breach of sensitive data which is caused by a user clicking an encrypted link. It can happen by deceiving the user into clicking into the dodgy links and messages.
Data Interception - When someone records data before it reaches the other person. It can be used for gaining passwords, personal information, identity theft and many more . Packets of data can be stolen through third part applications which record the packets before they get sent to the final destination. This can be prevented by using encrypted messaging systems, limiting user access levels and educating the user.
Worms - Are a piece of malware which multiplies itself once it has access to the computer, It can gain full control to the device and steal data, download other software whilst causing system overload for using too much bandwidth. They find weaknesses in the security and breach them to gain access.
Social Engineering - When the hacker gains access to personal information through deceiving the user psychologically using emotions to allow the user to given private information
Pharming - A cyber attack where criminals redirect the user to a different site which is aimed to steal personal and private data from the user. A malware pharming causes the machines to send the wrong URL to the DNS. Causing the DNS to find a fake website and redirect the user.DNS poisoning is where hackers modify the table in a DNS server, causing users to visit fake websites instead of new ones.
DDOs Attack - When multiple computers are used to flood a server with lots of requests eventually causing it to slow down and eventually crash or become unavailable for use
Hacking - When someone gains unauthorised access to personal or organisational data .Hacking in cyber security refers to the misuse of devices to cause damage or corrupt systems, gather information, steal documents and disrupt data related activity.
Adware - Is a malicious software which installs itself onto a device and causes unwanted advertisements and popups to show
Ransomware - Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files. A criminal group will then demand a ransom in exchange for decryption
.
Trojan Horse - Trojan Horse is a virus which is a type of malware. It downloads onto your device by disguising itself as a legitimate programme.
Once downloaded it allows the attacker to be able to access the device remotely. They can then delete files, steal data and do anything else with the device they want to do
—----------------------------------------------------------------------------------------------------------------------Section 5: The Internet and its Uses
Viruses - Is a type of malware which spreads between computers . It can cause damage to the software and data on the computer. It gains access to your computer on an infected network router, files and emails. Once it gains access to the computer it can replicate itself and spread throughout the rest of the files.
Spyware - Is a programme which uses your internet connection to send information from your computer to another computer without you knowing. This information can be personal data, browsing habits … Types can be Password stealer (Which gains access by secretly being downloaded) Infostealers which steal information about the device and Browser Hijackers which are a type of network security attack to take control of your device.
Brute Force Attack - Is when a hacker enters all possibilities (Systematically) for a password into your login page until they get it right. This can be done by trial and error using IT work.
Phishing - When there is a breach of sensitive data which is caused by a user clicking an encrypted link. It can happen by deceiving the user into clicking into the dodgy links and messages.
Data Interception - When someone records data before it reaches the other person. It can be used for gaining passwords, personal information, identity theft and many more . Packets of data can be stolen through third part applications which record the packets before they get sent to the final destination. This can be prevented by using encrypted messaging systems, limiting user access levels and educating the user.
Worms - Are a piece of malware which multiplies itself once it has access to the computer, It can gain full control to the device and steal data, download other software whilst causing system overload for using too much bandwidth. They find weaknesses in the security and breach them to gain access.
Social Engineering - When the hacker gains access to personal information through deceiving the user psychologically using emotions to allow the user to given private information
Pharming - A cyber attack where criminals redirect the user to a different site which is aimed to steal personal and private data from the user. A malware pharming causes the machines to send the wrong URL to the DNS. Causing the DNS to find a fake website and redirect the user.DNS poisoning is where hackers modify the table in a DNS server, causing users to visit fake websites instead of new ones.
DDOs Attack - When multiple computers are used to flood a server with lots of requests eventually causing it to slow down and eventually crash or become unavailable for use
Hacking - When someone gains unauthorised access to personal or organisational data .Hacking in cyber security refers to the misuse of devices to cause damage or corrupt systems, gather information, steal documents and disrupt data related activity.
Adware - Is a malicious software which installs itself onto a device and causes unwanted advertisements and popups to show
Ransomware - Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files. A criminal group will then demand a ransom in exchange for decryption
.
Trojan Horse - Trojan Horse is a virus which is a type of malware. It downloads onto your device by disguising itself as a legitimate programme.
Once downloaded it allows the attacker to be able to access the device remotely. They can then delete files, steal data and do anything else with the device they want to do