What is malware?
Network threats
What are different types of malware?
Network threats
How do viruses work?
Network threats
Computer viruses infect computers by:
- replicating their code in other programs
- infecting other computers
- harming the computer by deleting,
corrupting or modifying files
How do worms work?
Network threats
How do computer trojans work?
Network threats
How does ransomware work?
Network threats
Software which:
- holds a computer hostage by locking or encrypting access to it
- if the data is encrypted, not even a cyber security professional will be able to recover the data unless backups are available.
- the access will only be restored if the ransom is paid.
What are 2 ways hackers can exploit technical vunerabilities?
Network threats
Why are unpatched software vulnerable?
Network threats
if software updates and security updates are not installed then the software will be vulnerable
Why are out-of-date anti-malware vulnerable?
Network threats
if software, such as antivirus software, isn’t regularly updated then it won’t be able to detect the latest viruses
What is social engineering?
Network threats
Social engineering is the ability to obtain confidential information by asking for it.
What is sholder surfing?
Network threats
Shoulder surfing is the ability to get information or passwords by observing as someone types them in.
What is Phising?
Network threats
Phishing is a type of social engineering technique, emails, texts or phone calls are sent to users commonly pretending to be from a bank or website.
How can phising be spotted?
Network threats
What is a denial of service (DoS) attack?
Network threats
In a denial of service attack, a hacker will use or infect a computer so that:
- it sends as many requests to the server as it can (known as a flood)
- the server can’t respond fast enough so slows down or goes offline
What is a distributed denial of service attack (DDoS)?
Network threats
many computers are used to send the requests
What is a man-in-the-middle attack (MITM)?
Network threats
allows the attacker to intercept communications between the user and server and:
- eavesdrop to find passwords and personal information
- add different information to a web page or other communication such as email
What are some threats to digital devices?
Network threats
Methods to protect mobile phone:
Network threats
What is a brute force attack?
Network threats
In a brute force attack, a hacker will try every combination of password until the correct password is found.
What is a SQL injection and how does it work?
Network threats
uses web forms to add SQL instructions to a query that cause data loss or the revealing of personal information
What is penetration testing?
Preventing vulnerabilities
The practice of deliberately trying to find security holes in your own systems.
How does penetration testing work?
Preventing vulnerabilities
testing to:
- identify the targets of potential attacks
- identify possible entry points
- attempt to break in
- report back the findings
What is an anti malware software?
Preventing vulnerabilities
Anti-malware software will detect malware such as viruses, worms, trojans, and spyware
How does anti malware software work?
Preventing vulnerabilities