Back to 课程

Computer-science_A-level_Cie

0% Complete
0/0 Steps
  1. computers-and-components
    6 主题
  2. logic-gates-and-logic-circuits
    2 主题
  3. central-processing-unit-cpu-architecture
    6 主题
  4. assembly-language-
    4 主题
  5. bit-manipulation
    1 主题
  6. operating-systems
    3 主题
  7. language-translators
    2 主题
  8. data-security
    3 主题
  9. data-integrity
    1 主题
  10. ethics-and-ownership
    3 主题
  11. database-concepts
    3 主题
  12. database-management-systems-dbms-
    1 主题
  13. data-definition-language-ddl-and-data-manipulation-language-dml
    1 主题
  14. computational-thinking-skills
    1 主题
  15. algorithms
    14 主题
  16. data-types-and-records
    2 主题
  17. arrays
    2 主题
  18. files
    1 主题
  19. introduction-to-abstract-data-types-adt
    1 主题
  20. programming-basics
    1 主题
  21. constructs
    2 主题
  22. structured-programming
    1 主题
  23. program-development-life-cycle
    2 主题
  24. program-design-
    2 主题
  25. program-testing-and-maintenance
    3 主题
  26. user-defined-data-types
    1 主题
  27. file-organisation-and-access-
    3 主题
  28. floating-point-numbers-representation-and-manipulation
    3 主题
  29. protocols
    2 主题
  30. circuit-switching-packet-switching
    1 主题
  31. processors-parallel-processing-and-virtual-machines
    5 主题
  32. boolean-algebra-and-logic-circuits
    4 主题
  33. purposes-of-an-operating-system-os
    3 主题
  34. translation-software
    3 主题
  35. encryption-encryption-protocols-and-digital-certificates
    3 主题
  36. artificial-intelligence-ai
    4 主题
  37. recursion
    1 主题
  38. programming-paradigms
    4 主题
  39. object-oriented-programming
    7 主题
  40. file-processing-and-exception-handling
    2 主题
  41. data-representation
    5 主题
  42. multimedia
    3 主题
  43. compression
    2 主题
  44. networks-and-the-internet
    11 主题
课 Progress
0% Complete

Network & internet risks

What are common network & internet risks?

Hackers

  • A hacker is someone who gains unauthorised access to computer systems or networks

  • Hackers often exploit security weaknesses to:

    • Steal sensitive data

    • Gain control of systems

    • Cause damage or disruption

  • Hackers are considered cybercriminals when their actions are illegal or harmful.

How do hackers gain access?

  • Hackers look for opportunities or vulnerabilities in systems, such as:

    • Unpatched software – Missing security updates can leave systems exposed

    • Out-of-date anti-malware – Older protection can fail to detect new threats

    • Weak passwords – Simple or reused passwords are easy to guess or crack

Effects of a hacker attack

  • When a hacker successfully gains access, it can lead to:

Effect

Impact

Data breaches

Personal or company information is leaked or stolen

Malware installation

Hackers may install viruses or spyware to cause further harm

Data loss

Important files may be deleted or corrupted

Identity theft

Stolen personal data can be used to impersonate individuals

Financial loss

Hackers may access bank accounts or demand ransom payments

How can hacking be prevented?

  • There are several methods to reduce the risk of being targeted by hackers:

    • Use strong passwords that are long and hard to guess

    • Enable two-factor authentication for extra login security

    • Install and regularly update anti-malware software

    • Use firewalls to block unauthorised access to the network

    • Keep all software up to date with security patches

Phishing

  • Phishing is a form of social engineering

  • It involves sending fraudulent, legitimate-looking emails to a large number of email addresses, claiming to be from a reputable company or trusted source to try and gain access to your details

  • Phishing often tries to coax the user to click on a login button to enter their details

What are the effects of phishing?

  • The creator of the email can gain unauthorised access to personal data such as login information, bank accounts and more

  • Phishing can lead to identity theft or fraudulent activity on credit cards and bank accounts

How can phishing be prevented?

  • Phishing can be prevented by:

    • Anti-spam filters to avoid fraudulent emails arriving in a user’s inbox

    • Training staff to recognise fraudulent emails and to avoid opening attachments from unrecognised senders

    • User access levels to prevent staff from being able to open files-types such as executable (.exe) files and batch (.bat) files

Pharming

  • Pharming is typing a website address into a browser and it is redirected to a ‘fake’ website to trick a user into typing in sensitive information such as passwords

  • An attacker attempts to alter DNS settings or change a users browser settings to redirect users to the fraudulent website

What are the effects of pharming?

  • The creator of the malicious content can gain unauthorised access to personal data such as login information, bank accounts and more

  • Pharming can lead to identity theft or fraudulent activity on credit cards and bank accounts

How can pharming be prevented?

  • Pharming can be prevented by:

    • Keeping anti-malware software up to date

    • Checking URLs regularly

    • Make sure the padlock icon is visible

Malware

  • Malware (malicious software) is the term used for any software that has been created with malicious intent to cause harm to a computer system

  • Examples of issues caused by malware include

    • Files being deleted, corrupted or encrypted

    • Internet connection becoming slow or unusable

    • Computer crashing or shutting down 

  • Malware can exist in many forms, each designed to perform its role in different ways

Malware

What it Does

Computer virus

  • A program which can replicate itself on a user’s computer. It contains code that will cause unwanted and unexpected events to occur

  • Examples of issues a user may experience are

    • Corrupt files

    • Delete data

    • Prevent applications from running correctly

Trojan

  • Sometimes also called a Trojan Horse

  • Trojans disguise themselves as legitimate software but contain malicious code in the background 

Spyware

  • Software which will allow a person to spy on the users’ activities on their devices

  • This form of software will be embedded into other software such as games or programs that have been downloaded from illegitimate sources

  • Spyware can record your screen, log your keystrokes to gain access to passwords and more

How can malware be prevented?

  • To protect against the threat of malware:

    • Ensure code is written correctly

    • Keep anti-malware software up to date

    • Install a firewall

    • Educate users

Responses

您的邮箱地址不会被公开。 必填项已用 * 标注