Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cyber Secuirty (Hackers (The UK experiences over 375 cyber attacks per…
Cyber Secuirty
Hackers
The UK experiences over 375 cyber attacks per hour, and 1 in 5 people have a hacked account.
A hacker is someone who gets access to a computer system without permission - a hacker who misuses a computer is called a 'black hat'
This can lead to stolen information, damaged files and viruses.
Reasons for cyber attacks includes a fun challenge, financial gain, disruption, personal attack, information theft and industrial espionage.
An example case: in 2002, Gary McKinnon from Glasgow hacked into USA databases in search of information on UFO's and related technology.
Key methods used to hack
-
-
Phishing: The use of emails, texts or phone calls are sent to users imitating someone they trust.
Pharming - is a way of redirecting a legitimate websites' users to a false website by changing the entry points to their server instead.
-
Botnet
-
In a botnet, the hacker will first infect the machines to make zombie devices. These can then be controlled by one central computer, which gives hackers free access to them.
-
Malware
'Malware' comes from two words - malicious and software. They are executable programs that run on a computer.
Some examples of Malware's are:
-viruses and worms, which effect their computers and damage them, and slow down computers.
- Trojan horses, which uses attractive methods to access and damage computers.
-ransomware, which holds a computer hostage by encrypting it.
-Spyware which allows an attacker to spy on a victim.
-Rootkit, which aims to gain full access to a device (root).
Denial of Service (DoS)
The aim is to send as many requests to a server as possible (a flood) and make the server so slow it goes offline.
In a Distributed Denial of Service, many computers are used to send requests.
-