1. Overview
Cyber security is crucial in today's interconnected world. It involves protecting computer systems, networks, and data from theft, damage, or unauthorized access. Understanding cyber security threats and how to defend against them is essential for anyone using the internet.
Key Definitions
- Brute-force attack: An attempt to gain access to a system by trying every possible combination of passwords or keys.
- Data interception: The unauthorized capture of data transmitted over a network. (Also known as packet sniffing).
- DDoS (Distributed Denial-of-Service) attack: An attack that overwhelms a server with traffic from multiple sources, making it unavailable to legitimate users.
- Hacking: Unauthorized access to or control over computer systems or networks.
- Malware: Malicious software designed to harm or disrupt computer systems.
- Virus: A type of malware that attaches itself to files and spreads when the infected file is shared.
- Worm: A type of malware that self-replicates and spreads through networks without requiring user interaction.
- Trojan horse: A type of malware disguised as legitimate software that can create a backdoor for attackers.
- Spyware: Malware that monitors user activity and collects personal information without their knowledge.
- Adware: Software that displays unwanted advertisements, often bundled with other programs.
- Ransomware: Malware that encrypts files on a device and demands a ransom payment for the decryption key.
- Pharming: Redirecting users to a fake website without their knowledge, often by corrupting DNS records.
- Phishing: A technique used to trick individuals into revealing sensitive information, such as usernames, passwords, and credit card details, often through deceptive emails or websites.
- Social engineering: Manipulating individuals into divulging confidential information or performing actions that compromise security.
- Access levels: Restrictions on user access to data based on their role (e.g., admin, user, guest).
- Anti-malware: Software designed to detect, prevent, and remove malware.
- Authentication: The process of verifying the identity of a user or device.
- Automating software updates: Automatically installing software updates to patch security vulnerabilities.
- Firewall: A network security system that monitors and controls incoming and outgoing network traffic based on predefined security rules.
- Privacy settings: Options that allow users to control the amount of personal information they share online.
- Proxy server: An intermediary server that hides a user's IP address and provides anonymity.
- SSL (Secure Sockets Layer)/TLS (Transport Layer Security) security protocol: A protocol that encrypts data transmitted between a web browser and a web server (HTTPS).
- Checking URLs: Verifying that website addresses are legitimate before clicking on them to avoid phishing.
- Checking spelling and tone of communications: Looking for suspicious errors or unusual language in messages that might indicate phishing or social engineering.
Core Content
Cyber Security Threats:
- Brute-force Attack: This involves trying every possible combination of characters until the correct password is found.
- Example: A program might try "aaaa", "aaab", "aaac", etc.
- Countermeasure: Using strong passwords (long, complex), account lockout policies.
- Data Interception (Packet Sniffing): Capturing data as it travels across a network. This can be done using software that intercepts network traffic.
Security Measures:
- Access Levels: Restricting access to data based on user roles (e.g., administrator, user, guest).
- Example: Only administrators can install software.
- Benefit: Prevents unauthorized access and modification of critical system settings and data.
- Anti-malware Software: Detects, prevents, and removes malware.
- Benefit: Protects against viruses, worms, Trojan horses, spyware, and other malicious software.
- Authentication: Verifying the identity of a user or device.
- Methods: Passwords, biometrics (fingerprint, facial recognition), two-factor authentication (2FA).
- 2FA Example: Requiring a password and a code sent to a mobile phone.
- Automating Software Updates: Automatically installing software updates to patch security vulnerabilities.
- Benefit: Ensures that software is up-to-date and protected against known vulnerabilities.
- Checking Spelling and Tone of Communications: Being wary of emails or messages with poor spelling, grammar, or unusual language.
- Benefit: Helps identify phishing attempts and social engineering attacks.
- Checking URLs: Verifying that website addresses are legitimate before clicking on them.
- Benefit: Prevents users from being redirected to fake websites.
- Firewalls: Monitors and controls network traffic based on predefined security rules.
- Function: Examines incoming and outgoing traffic and blocks anything that doesn't meet the rules.
Exam Focus
- Threats: Examiners want you to describe the process involved in each attack and the aim of the attack. Simply naming the attack is not enough.
- Security Measures: Examiners want you to explain how each solution helps keep data safe. Explain the mechanism of the security measure, not just its benefit.
- URLs: Be able to identify the protocol (HTTPS, HTTP), domain name (e.g., google.com), and file name (e.g., index.html) within a given URL.
- Context is Key: Always tailor your answers to the specific scenario described in the question.
- Terminology: Use precise technical terms (e.g., "encrypts" instead of "makes safe").
- Diagrams: If diagrams are required, annotate them clearly and focus on the core process rather than artistic flair.
Common Mistakes to Avoid
- ❌ Wrong: "A firewall protects your computer." ✓ Right: "A firewall monitors network traffic and blocks any connections that do not meet pre-defined rules, preventing unauthorized access to the network."
- ❌ Wrong: "Spyware analyzes your data and puts it on the internet." ✓ Right: "Spyware records all user data and transmits it to a remote server where it can be analysed."
- ❌ Wrong: "Hacking is malware." ✓ Right: "Hacking is an unauthorized access technique, and malware such as a Trojan horse might be used as part of a hacking attack."
- ❌ Wrong: "Worms and viruses both spread quickly." ✓ Right: "Viruses spread by attaching themselves to files shared on a single computer, while worms spread themselves across networks automatically."
- ❌ Wrong: "A proxy server makes your internet faster." ✓ Right: "A proxy server can cache frequently accessed web pages, reducing load times if you visit those pages frequently. However, its primary purpose is to hide your IP address and provide a layer of security."
Exam Tips
- Define Terms: Start by defining key terms to show your understanding.
- Explain the Process: Clearly explain how each threat works and how each security measure protects against it.
- Use Examples: Provide specific examples to illustrate your points (e.g., a specific type of malware or a scenario where social engineering is used).
- Think like an Attacker/Defender: When answering questions, try to think from both the attacker's and defender's perspectives to show a comprehensive understanding of the topic.