The Internet And Its Uses: Cyber Security: Describe The Processes Involved In, And The Aim Of Carrying Out, A Range Of Cyber Security Threats (Copy)
| Aspect | Key Points |
|---|---|
| Definition | Cyber security threats are deliberate attacks on computer systems or networks |
| Main Aim | Gain unauthorised access, steal data, disrupt services, or cause damage |
| Targets | Individuals, organisations, networks, data |
| Method | Use of technical and social techniques |
Written and Compiled By Sir Hunain Zia (AYLOTI), World Record Holder With 154 Total A Grades, 7 Distinctions and 11 World Records For Educate A Change O Level And IGCSE Computer Science Full Scale Course
| Threat Type | Process Involved | Aim |
|---|---|---|
| Malware | Malicious software installed on a device | Damage system or steal data |
| Virus | Attaches to files and spreads when executed | Corrupt or delete data |
| Worm | Self-replicates across networks | Overload network/resources |
| Trojan Horse | Disguised as legitimate software | Create backdoor access |
Written and Compiled By Sir Hunain Zia (AYLOTI), World Record Holder With 154 Total A Grades, 7 Distinctions and 11 World Records For Educate A Change O Level And IGCSE Computer Science Full Scale Course
| Threat Type | Process Involved | Aim |
|---|---|---|
| Phishing | Fake emails or websites trick users | Steal passwords or bank details |
| Social Engineering | Manipulating users psychologically | Gain confidential information |
| Spyware | Secretly monitors user activity | Collect personal data |
| Keylogging | Records keystrokes | Capture usernames and passwords |
Written and Compiled By Sir Hunain Zia (AYLOTI), World Record Holder With 154 Total A Grades, 7 Distinctions and 11 World Records For Educate A Change O Level And IGCSE Computer Science Full Scale Course
| Threat Type | Process Involved | Aim |
|---|---|---|
| Brute Force Attack | Repeated password attempts | Break into accounts |
| Denial of Service (DoS) | Flooding server with traffic | Make service unavailable |
| Distributed DoS (DDoS) | Multiple systems attack one server | Crash websites/services |
| Man-in-the-Middle | Intercepts communication | Steal or alter data |
Written and Compiled By Sir Hunain Zia (AYLOTI), World Record Holder With 154 Total A Grades, 7 Distinctions and 11 World Records For Educate A Change O Level And IGCSE Computer Science Full Scale Course
| Common Attack Process (Exam Flow) | Explanation |
|---|---|
| Step 1 | Attacker identifies a target |
| Step 2 | Vulnerability is exploited |
| Step 3 | Malware or attack is deployed |
| Step 4 | Data accessed, stolen, or disrupted |
| Step 5 | Attacker gains benefit or causes harm |
Written and Compiled By Sir Hunain Zia (AYLOTI), World Record Holder With 154 Total A Grades, 7 Distinctions and 11 World Records For Educate A Change O Level And IGCSE Computer Science Full Scale Course
| Overall Aims Of Cyber Attacks | Description |
|---|---|
| Financial Gain | Stealing money or selling data |
| Data Theft | Accessing confidential information |
| Disruption | Shutting down systems or networks |
| Espionage | Monitoring users or organisations |
| Control | Gaining long-term system access |
Written and Compiled By Sir Hunain Zia (AYLOTI), World Record Holder With 154 Total A Grades, 7 Distinctions and 11 World Records For Educate A Change O Level And IGCSE Computer Science Full Scale Course
| Exam Key Phrases | Use These |
|---|---|
| Cyber Threat | “Deliberate attempt to exploit systems” |
| Process | “Exploit vulnerability to gain access” |
| Aim | “Steal data, disrupt services, or gain control” |
| Example | “Phishing uses deception to steal credentials” |
Written and Compiled By Sir Hunain Zia (AYLOTI), World Record Holder With 154 Total A Grades, 7 Distinctions and 11 World Records For Educate A Change O Level And IGCSE Computer Science Full Scale Course
