Please enable JavaScript.
Coggle requires JavaScript to display documents.
System attacks and threats (Hacking (Reasons for attacking systems (Fun…
System attacks and threats
pharming
Pharming is a way of redirecting a legitimate websites visitors to a fake website run by a hacker
Shoulder surfing
Shoulder surfing is the ability to get information or passwords by observing as someone types them in.
Hacking
The UK experiences over 375 cyber attacksevery hour
1 in 5 UK citizens have had an online account hacked
A hacker is a person who gets access to a computer system without permission
They can access to:
Make the computer run different programs such as a virus or botnet
Steal information
Damage files by corrupting or deleting them
A hacker who misuses computers is known as a " black hat " hacker
Reasons for attacking systems
Fun and challenge
financial gain
disruption
Industrial espionage
Personal attack
Information / data theft
Hacking a friends password
Social engineering
Social engineering is the ability to obtain confidential information by asking people for it.
Denial of service
In a denial of service attack a hacker will use or infect a computer so that it sends as many requests to the server as it can ( known as a flood)
The server cant respond fast enough so slows down or goes offline.
Phishing
Phishing is a type of social engineering technique
Emails, texts or phone calls are sent to users commonly pretending to be from a bank or website
These messages will try to get personal information such as , usernames , passwords , credit card details and other personal information
Botnet
Botnet comes from robot network , in a botnet hacker will first infect machines to make zombie devices
They gain free access to computers
malware
Malware comes from two words:
Malicious - to cause harm
Software
Malware are executable programs that run on a computer
One type of malware that exists bis a computer virus
Computer viruses infect computers
They replicate their code in other programs
They infect other computers
They harm the computer by deleting, corrupting or modifying files
A worm replicates itself in order to spread to other computers
They might cause no damage to the attacked computers
They slow down networks and computers
Trojan horses
Computer Trojans are similar:
They have a program, game or cracked file which is something the user wants
They have negative program code which causes damage, takes control or provides access to the computer.
Ransomware is software which encrypts a computer and enforces the owner of the to pay a ransom and then they gain access again.