6 minute read

TA4: Cyber-security and legislation

What you need to know

• Why we need cyber-security • What a Denial of Service Attack (DoS) is.

Cyber-security is important because we are sharing more information through our digital devices. Having secure data is important for individuals, organisations and governments.

Policies Cyber-security = Procedures = Security from internal and external threats + Cyber attacks take place for a Technology range of reasons: • Fun/amusement • To steal data/information

Most cyber-security attacks can be • Financial gain prevented by having up-to-date • To cause disruptionanti-virus software on your device • To spy DoS attacks

Attackers target a network or website The system is flooded with more requests than it can handle

The system cannot handle that many requests and therefore goes offline This is best prevented using a firewall, as this can control the amount of network traffic that has access to the network/website at any given time. + DRAFT • Anti-virus software needs to be kept up to date in order to identify the latest viruses. • A firewall helps control the traffic going in/out of a network and therefore reduces the risk of a DoS attack.

Revise it!

Create a revision mind map that covers: • What cyber-security is. • Why we need cyber-security including reference to a recent cyber attack on a well-known business. • How a DoS attack works.

Remember it!

What you need to know

• Why people hack • What the different types of hacking are.

Hacking is the unauthorised access to a computer system. It is a form of attack where an individual looks for weaknesses in a computer system and tries to exploit them.

White hat hacking The hacker has permission to attack the system. Grey hat hacking The hacker attacks the system for fun. They may wish to prove a point – that they have the skills. Black hat hacking The hacker attacks the system for illegal reasons such as industrial espionage or financial gain. DRAFT • White hat hacking is legal as you have the owner’s permission. • Grey hat and black hat hackers are operating illegally. • The best defence against hacking is good security including strong passwords.

Practise it!

1 Define the term ‘hacking’. (2 marks) 2 Give one reason for a cyber attack taking place. (1 mark) 3 Explain one reason why hacking might take place. (2 marks)

Remember it!

What you need to know

• What the purpose of malware is • The range of malware available.

Malware is a type of software that has been created to cause a security risk on a device or computer network. There are a wide variety of types that can be used, each with its own purpose.

• Software that shows an • A group of internetadvert to the user. connected devices which are running a bot. Adware Botnet • A unique piece of malware • Software that monitors and that encrypts all the files on collects information about a device. The attacker what you are doing on demands money for the devices. the password. Ransomware Spyware • Software that seems valid, but is malicious and allows another computer to take control of your device. • A program which makes copies of itself by attaching itself to another program.

• Destroying data and information. DRAFT Trojan Horse Virus Worm

Revise it!

Create a series of revision flash cards about the different types of malware and explain how each one works.

Remember it!

• Each type of malware is a computer program. • Malware programs are designed to cause specific problems.

What you need to know

• The purpose of each threat • How each threat is installed.

Not all malware is malicious – some is just designed to be annoying. Malware is mostly prevented using anti-virus software and firewalls.

Adware Forces users to see adverts on their device

Each advert shown gives the creator a fee Built into software or part| of a webpage

Botnet Piece of software that forces a device to be part of a larger network

A bot does repetitive tasks faster than a human Part of download the user has unwittingly installed

Ransomware Piece of software that adds encryption to all your data and requires a password to unlock it or the data is deleted

The creator asks for money in return for providing the password so you can decrypt the data safely

Often a link or attachment on an email which, when clicked on, activates the malwareDRAFT

Revise it!

Create a table about malware using the following headings: • Type of malware. • How each type of malware works. • How to prevent each type of malware.

Remember it!

• Not all malware is malicious. • Anti-virus software and firewalls are tools to prevent malware.

What you need to know

• The purpose of each threat • How each threat is installed.

Malware is often installed on a device when a user does not check that the programs they are installing are genuine or secure.

Spyware Piece of software designed to monitor what you are doing on a device Spyware will know all the passwords and usernames, plus other personal details Part of a download the user has unwittingly installed Piece of software that makes copies of itself, infecting the device Can destroy data and spread to other devices on the same network Part of a download the user has unwittingly installed from an email attachment Trojan Horse Piece of software that looks safe but in reality is malicious Often the malicious software takes control of the user’s device Part of a download the user has unwittingly installed

Worm

Works in a similar way to a virus Depending or how it has been programmed, it can destroy data or change data Virus Part of a download the user has unwittingly installed from an email attachment Remember it!Practise it! DRAFT 1 Give one reason why someone might create malware. (1 mark) 2 Petra’s computer has been infected with malware. It is asking for £3000 be transferred so that Petra can have access to all her files. Name the type of malware Petra’s computer has been infected with. (1 mark) • Nearly all malware is installed by the user of the device through downloading email attachments, clicking on suspicious links, or installing what looks like legal software.

This article is from: