Component 3 Learning Aim B Cyber Security- B1 Threats to Data Why Systems Are Attacked
Total Page:16
File Type:pdf, Size:1020Kb
Component 3 Learning Aim B Cyber Security- B1 Threats to Data Why Systems are Attacked Key Vocabulary Intellectual Property An idea that you invented that belongs to you, for example, an image that is copyrighted. Ransomware A form of malware, usually infecting unprotected digital systems, occurring when users open malicious email attachments. Malware A malicious form of software that is transferred to, and then executed on, a user’s machine to damage or disrupt the system or allow unauthorised access to data. Denial-of-Service (DoS) attacks Attack a remote computer by making it unable to respond to legitimate user requests. Cybersecurity The combination of policies, procedures, technologies and the actions of individuals to protect from both internal and external threats. Organisations have become reliant on digital systems to hold data and perform vital business functions. Data and information theft Many organisations have their digital systems attacked daily. Industrial Espionage Data and information both have value as they can be sold The reasons these attacks may occur are varied Intellectual property (designs, business strategy for financial gain. etc) can be stolen through organised cyberattacks. This can be done by stealing customer payment information and then using it to purchase goods These types of assets can be highly valuable, leading •Fun/ illegally. to cheaper, fake copies of products being sold and Breaches of data and information are a major cause of •challenge the original organisation suffering a loss of income. identity theft. •Data and Financial Gain Fun/ Challenge •Industrial information • Hackers may attack systems for the thrill, adrenaline espionage theft A very simple motive: money. rush or a sense of personal achievement. Reasons • They may view increased security as a why Extorting money from victims of a cyberattack is technical challenge and enjoy trying to get past it. systems common practice. • They may also get recognition from their peers when are they successfully hack into systems. attacked Disruption •Financial •Disruption Any attack that prevents an organisation from operating gain Personal Attack normally causes operational chaos, loss of earnings and reputational damage. The most common type of personal attack is made by Disruption can be caused in many ways e.g. defacing •Personal ex-employees holding a grudge against their former a website or Denial-of-service (DoS) attacks attack employer, perhaps feeling they have been unfairly treated or suffered a form of emotional distress. Motivations may be: financial/social/political reasons. Component 3 Learning Aim B Cyber Security- B1 Threats to Data External Threats to Digital Systems and Data Security Key Vocabulary Social Engineering The act of getting users to share sensitive information through a false pretext (commonly known as ‘blagging’) Phishing A cyberattack that sends spam messages to try and trick people to reply with desired information. Pharming A cyberattack that uses malware to direct a user to a fake website that requests information. External attack methods include: Unauthorised access/Hacking: • Unauthorised access/hacking ‘Black-hat’ hacking - users attempt to gain access to • Phishing remote systems without permission from the owners to do so • Pharming legally • Man-in-the-middle attacks ‘White hat’ or ethical hacking - Hacking legally performed by paid specialists who are testing the security systems for a company is called Pharming ‘Grey hat’ hacking - hackers test security without permission, but don’t exploit any vulnerabilities for personal gain. A type of cyber attack Phishing User is directed to A form of social engineering and a very common form of a fake website thinking it is real and cyberattack. Spoof emails are sent that pretend to be from a genuine they then enter confidential details Man in the Middle Attacks such as usernames and passwords. company. The user is fooled into thinking its from a legitimate source. A form of cyberattack where the communication between 2 Usernames, passwords and credit card numbers are the most The cybercriminal uses these devices, such as a user and a web server, is intercepted and commonly captured personal information. captured details to log into the real potentially tampered with. website and commit illegal acts These can then be sold for profit to other criminals or users to illegally purchase goods or services. e.g. withdrawing money, purchasing Encryption can protect against this form of hacking as any goods, downloading personal files or intercepted data cannot be easily used. Spear phishing is an attack targeting specific organisations or sending fraudulent emails Cybersecurity specialists also suggest that users would be safer if individuals. they did not use Wi-Fi. v Component 3 Learning Aim B Cyber Security- B1 Threats to Data Internal Threats to Digital Systems and Data Security Key Vocabulary Productivity a measure of effectiveness – how long it takes an employee to produce an item for sale. •Visiting untrustworthy websites Impacts of security breach Internal Threats Immediate Impacts Longer-term Impacts •Use of Some internal threats happen because of •Download portable accidents, mistakes or poor choices made s from the •Data loss Damage to the organisation’s by an organisation’s employees. However, a storage •Lost sales public image which could lead internet disgruntled employee could do devices •Downtime to: something malicious. •Reduction in productivity •Financial loss •Potential legal action For example: • Delete customer records Internal • Steal confidential information • Create fake invoices that will be paid to Threats their own bank account • Install malware Protecting an organisation against internal •Disclosur •Stealing or threats is as important as protecting leaking against external ones. e of data information •Users Example Exam Question overriding security controls Component 3 Learning Aim B Cyber Security- B2 Prevention and Management of Threats to Data User Access Restriction Physical Security Passwords Benefits Drawbacks The use of passwords is a traditional security measure to control access to digital systems. Act as a deterrent and deter attackers. Often more expensive to purchase There are other forms of passwords: Stop attackers from gaining direct and Building work may be required. • Patterns that can be drawn connecting a series of dots physical access to locations where data is • Gesture passwords - can be used with touchscreen devices where the stored. user draws a shape. Automatically and secretly call the police Some methods of physical security, such Benefits Drawbacks if an attacker is detected, as CCTV, do not stop data from being stolen •They are simple and easy to use. •They are only effective if users keep •There are no costs involved as their passwords secret. Example Security techniques: they require no specialist •A strong password can be hard to • Electronic Swipe Lock hardware to setup. remember. • Secure Device •Specialist software can be used by • CCTV Camera attackers to try and guess the user’s passwords. •Users can find it hard to remember lots of different passwords. Benefits Drawbacks Biometrics Requires individuals to use part of •Users don’t need to •More expensive as you Two-factor Authentication their body to prove their identity. remember lots of need specialist hardware A popular form of multifactor authentication and is used when just a password different passwords devices to set them up. or PIN is not considered sufficient. • Common biometric examples include: or keep updating •They can easily spread It works by asking the user to supply two forms of identification. • Eye (retina or iris pattern) scan them. germs, e.g. if lots of users • Fingerprint identification •More secure as they are using the finger print Benefits Drawbacks • Hand geometry (shape of user’s hand) cannot be guessed, scanner then germs can be • Voice analysis lost or forgotten. easily spread. •It is more secure. •It is possible that some factors may get lost • Facial recognition •Can take less •Some users may feel that No extra equipment is e.g. you may lose your swipe card. • Gait analysis (how a user walks) management because it is an invasion of their • needed as users can use The recovery options that are used to reset • Handwriting analysis users are less likely privacy by having their • items they already have to your account are easy to get through, which to be ‘locked out’ biometric data stored. authenticate themselves, e.g. could be exploited by attackers. or need to have their their mobile phones. It can take longer to gain access user accounts reset. • Component 3 Learning Aim B Cyber Security- B2 Prevention and Management of Threats to Data Data level protection: firewalls and anti-virus software (part 1) Key Vocabulary Firewall A device that protects an IT system (or network) from unauthorised access by blocking ‘bad’ network traffic. Local Area Network (LAN) A network based on geographical location, such as an office or a school Access Control List (ACL) A list that tells the network which data can be sent and received. Shoulder Surfing Obtaining sensitive personal information from a user by literally looking over their shoulder while they use digital devices e.g. computers or cash machines. Session Cookies Data stored by the web browser until it is closed Worms Small computer programs that can spread to other programs. Trojans Types of malware disguised as legitimate programs. Rootkit Collection of tools or programs