What is malware?
Malicous executable programs that run on a computer
Give examples of Malware
Viruses, worms, trojans, ransomware
What are viruses?
Code that infect computers
• They replicate their code in other programs
• They infect other computers
• They harm the computer by deleting, corrupting or modifying files
What are worms?
A worm replicates itself in order to soread to other computers
• They might cause no damage to the attacked computers
• They slow down networks and computers
What are Trojans?
Negative program code which causes damage, , takes control, or provides access to computers
What is ransomware?
Software that:
• Holds a computer hostage by locking or encrypting access to it
• If the data is encrypted, a cyber security specialist won’t be able to recover the data unless a backup is available
• Once a ransom is paid to the attacker, the computer might be restored
What are ways hackers can exploit technical vulnerabilities?
What is social engineering?
The ability to obtain confidential information by asking people for it
What is Shoulder Surfing?
The ability to get information or passwords by observing as someone types them in.
• CCTV
• Looking over someone’s shoulder
What is phishing?
Phishing is a type of social engineering technique where, emails, texts or phone calls are sent to users commonly pretending to be banks or websites. They try to steal information such as • Usernames • Passwords • Credit card details • Other personal information
Features of phishing attacks
Greetings aren't personlised Sender's address is often a variation of a genuine address Forged link and is not the exact link Request your personal details Rushed Poor spelling and grammar
Denial of Service
A hadker will use or infect a computer so that:
• it sends many requests to the server (flood)
• the server can’t respond fast enough so it slows down or goes offline
Distributed Denial of Service
Many computers are making requests to the server, not just one
Man in the middle attack
Why shouldn’t you use a found free USB stick?
• It may contain malware that can steal data from your device
Data theft
Stealing private data
Threats from digital decices
Reeucing threats on mobile devices
Brute Force Attacks
SQL
* Database query language
SQL injection
• Using web forms to add SQL instructions to a query that cause data loss or the revealing of personal information
How to execute SQL Injection
* These can return or destroy valuable data