6 minute read

TA4: Cyber-security and legislation

What you need to know

• Why we need cyber-security • What a Denial of Service Attack (DoS) is.

Cyber-security is important because we are sharing more information through our digital devices. Having secure data is important for individuals, organisations and governments. Policies Cyber-security = Procedures = Security from internal and external threats + Technology Most cyber-security attacks can be prevented by having up-to-date anti-virus software on your device. Cyber attacks take place for a range of reasons: • Fun/amusement • To steal data/information • Financial gain • To cause disruption • To spy DoS attacks

Attackers target a network or website The system is flooded with more requests than it can handle The system cannot handle that many requests and therefore goes offline This is best prevented using a firewall, as this can control the amount of network traffic that has access to the network/website at any given time.

Revise it! Remember it!

• Anti-virus software needs to be kept up to date in order to identify the latest viruses. • A firewall helps control the traffic going in/out of a network and therefore reduces the risk of a DoS attack.

+ SAMPLE

Create a revision mind map that covers: • What cyber-security is. • Why we need cyber-security including reference to a recent cyber attack on a well-known business. • How a DoS attack works.

What you need to know

• Why people hack • What the different types of hacking are.

Hacking is the unauthorised access to a computer system. It is a form of attack where an individual looks for weaknesses in a computer system and tries to exploit them. White hat hacking The hacker has permission to attack the system. Grey hat hacking The hacker attacks the system for fun. They may wish to prove a point – that they have the skills. Black hat hacking The hacker attacks the system for illegal reasons such as industrial espionage or financial gain. Remember it!Practise it! SAMPLE • White hat hacking is legal as you have the owner’s permission. • Grey hat and black hat hackers are operating illegally. • The best defence against hacking is good security including strong passwords.

1 Define the term ‘hacking’. (2 marks) 2 Give one reason for a cyber attack taking place. (1 mark) 3 Explain one reason why hacking might take place. (2 marks)

What you need to know

• What the purpose of malware is • The range of malware available.

Malware is a type of software that has been created to cause a security risk on a device or computer network. There are a wide variety of types that can be used, each with its own purpose. Adware • Software that shows an advert to the user. Botnet • A group of internetconnected devices which are running a bot. Ransomware • A unique piece of malware that encrypts all the files on a device. The attacker demands money for the password. Spyware • Software that monitors and collects information about what you are doing on the devices. Trojan Horse • Software that seems valid, but is malicious and allows another computer to take control of your device. Virus • A program which makes copies of itself by attaching itself to another program. Worm • A malicious program which spreads copies of itself from device to device. SAMPLE

Revise it!

Create a series of revision flash cards about the different types of malware and explain how each one works.

Remember it!

• Each type of malware is a computer program. • Malware programs are designed to cause specific problems.

What you need to know

• The purpose of each threat • How each threat is installed.

Not all malware is malicious – some is just designed to be annoying. Malware is mostly prevented using anti-virus software and firewalls. Adware

Forces users to see adverts on their device Each advert shown gives the creator a fee Built into software or part| of a webpage Botnet

Piece of software that forces a device to be part of a larger network A bot does repetitive tasks faster than a human Part of download the user has unwittingly installed Ransomware

Piece of software that adds encryption to all your data and requires a password to unlock it or the data is deleted The creator asks for money in return for providing the password so you can decrypt the data safely

Often a link or attachment on an email which, when clicked on, activates the malware Remember it!Revise it! SAMPLE

Create a table about malware using the following headings: • Type of malware. • How each type of malware works. • How to prevent each type of malware. • Not all malware is malicious. • Anti-virus software and firewalls are tools to prevent malware.

What you need to know

• The purpose of each threat • How each threat is installed.

Malware is often installed on a device when a user does not check that the programs they are installing are genuine or secure.

Spyware Piece of software designed to monitor what you are doing on a device Spyware will know all the passwords and usernames, plus other personal details Part of a download the user has unwittingly installed Piece of software that makes copies of itself, infecting the device Can destroy data and spread to other devices on the same network Part of a download the user has unwittingly installed from an email attachment Trojan Horse Piece of software that looks safe but in reality is malicious Often the malicious software takes control of the user’s device Part of a download the user has unwittingly installed Worm

Works in a similar way to a virus Depending or how it has been programmed, it can destroy data or change data Virus Part of a download the user has unwittingly installed from an email attachment • Nearly all malware is installed by the user of the device through downloading email Remember it! 1 Give one reason why someone might create malware. (1 mark) Practise it! SAMPLE 2 Petra’s computer has been infected attachments, clicking on suspicious links, with malware. It is asking for £3000 or installing what looks like legal software. be transferred so that Petra can have access to all her files. Name the type of malware Petra’s computer has been infected with. (1 mark)

This article is from: