Cyber security threats that computers are vulnerable to
Cyber security
Covers the different processes, practices and technologies that protect the following from attack, damage or unauthorised access:
- Networks
- Computers
- Programs and data
Password policy
Passwords are often checked as they are created to make sure that they conform to the parameters given in a required policy. Organisations and computer systems will often have password policies. These will make sure that your chosen password has features like:
- Minimum length of characters
- Include at least one lowercase letter
- Include at least one uppercase letter
- Include at least one symbol
- Change password every month
Misconfigured access rights
What is pharming?
A cyber attack that redirects a user to a fake website
How does a pharming attack happen?
What is removable media?
Any storage device that can be inserted and removed from a computer
What can removable media be used for?
How could malware get onto removable media?
What is unpatched software?
Which types of software are the most important to update?
Operating system
- operating system updates often contain security updates
- it is crucial that the operating system is kept as secure as possible as it has full control of the computer or server
Anti-virus or anti-malware software
- needs to be updated regularly or daily so that it can detect new malware
Which types of software are the most important to update?
Operating system
- operating system updates often contain security updates
- it is crucial that the operating system is kept as secure as possible as it has full control of the computer or server
Anti-virus or anti-malware software
- needs to be updated regularly or daily so that it can detect new malware
Explain how pharming poses a risk to computer systems, data or networks
A DNS server is compromised so that it points to a fake website which can then obtain personal information such as usernames and passwords
Explain how weak and default passwords pose a risk to computer systems, data or networks
Make it easy for hackers to gain access using password lists or brute-force attack
Explain how misconfigured access rights pose a risk to computer systems, data or networks
The give users to much access which they can then misuse
Explain how unpatched or outdated software pose a risk to computer systems, data or networks
Leave security holes open
Explain how removable media poses a risk to computer systems, data or networks
These can be used to introduce malware or remove confidential documents
What is social engineering?
The ability to obtain confidential information by manipulating people for it
What techniques can hackers use to gain information via social engineering?
What is shoulder surfing?
Shoulder surfing or shouldering is the ability to get information or passwords by observing as someone types them in
Examples of shoulder surfing
Preventing vulnerabilities
Anti-malware software
Describe how anti-virus software works