Please enable JavaScript.
Coggle requires JavaScript to display documents.
system attacks and threat (malware ((• Malware comes from two words:, •…
system attacks and threat
denial of service
hacking a friends password
shoulder surfing
botnet
hacking
What is a hacker?
A hacker is a person who gets access to a
computer system without permission
s
They can use this access to:
• make the computer run different programs
such as a virus or a botnet
• steal information
• damage files by corrupting or
deleting them
reasons for cyber attacks
disruption
• Attacks such as Denial-of-Service stop websites working
• Viruses can slow down computers and delete files
information or data theft
• Credit card and financial details are stolen to gain money
• Company information may also be stolen
fun/challenge
• Hacking systems can be fun or a challenge
• There is a sense of achievement
• Friends may give respect of hacking achievements
personal attack
• Employees that are unhappy may attack the company
• Friends / family may attack each other if upset over something
financial gain
• Ransoms can be made to prevent attacks from happening
• Ransomware can be used to encrypt a computer until you pay
industrial espionage
• The aim is to find intellectual property such as designs or
blueprints for products, business strategies or software
source code
example
• In 2002, Gary McKinnon, from Glasgow, hacked into
US military and NASA computers
• He was looking for information about UFOs and
technologies that could be useful to the public
• He gained access by trying
default passwords such as ‘admin’
social engineering
phishing
malware
• Malware comes from two words:
• Malicious – to cause an act of harm
• Software
Malware are executable programs that run
on a computer
One type of malware that exists is a computer virus
Malware - Viruses and worms
Computer viruses infect computers
• They replicate their code in other programs
• They infect other computers
• They harm the computer by deleting,
corrupting or modifying files
A worm replicates itself in order to
spread to other computers
• They might cause no damage to the
attacked computers
• They slow down networks and computers
Malware - Trojan horses
pharming