Please enable JavaScript.
Coggle requires JavaScript to display documents.
systems attacks and threats ((Case study: Gareth Crosskey, • Gareth…
systems attacks and threats
There are over 375 cyber attacks every hour.
Denial of Service (DoS)
• In a denial of service attack, a hacker will use or
infect a computer so that:
• it sends as many requests to the server
as it can (known as a flood)
• the server can’t respond fast enough
so slows down or goes offline
• In a distributed denial of
service attack (DDoS),
many computers are used
to send the requests
crypto locker
The crypto locker ransomware occurred between 2013 and 2014 targeting Microsoft Windows computers.
Case study: Gareth Crosskey
• Gareth Crosskey, from West Sussex, was 19 when
he attacked Selena Gomez’s Facebook account:
• He used a similar email address to pose as her manager
• He then asked Facebook to reset her password
• Once reset, he gained access to her personal emails from
Justin Bieber
• The attack was investigated by the police and FBI
• Gareth received 12 months in prison for
Computer Misuse
• What hacking technique did Gareth use?
Malware
Trojan horses
ransomware
Phishing
• Phishing is a type of social engineering technique
• Emails, texts or phone calls are sent to users
commonly pretending to be from a bank or website
• The ‘From’ email address may be forged
• These messages will try to get
personal information such as:
• Usernames
• Passwords
• Credit cards details
• Other personal information
Reasons for attacking systems
Fun/challenge
Hacking systems can be fun or a challenge. There is a sense of achievement and friends may give respect of hacking achievements.
financial gain
Ransoms can be made to prevent attacks from happening, ransomware can be used to encrypt a computer until you pay.
disruption
Attacks such as a denial-of-service stop websites working, and viruses can slow down computers and delete files.
information/data theft
personal attack
Employees that are unhappy may attack the company, friends/family may attack each other if upset over something.
industrial espionage
The aim is to find intellectual property such as designs or blue prints for products, business strategies or software source code.
1 in 5 UK citizens have had an online account hacked.
Malware - Rootkit
• In UNIX, Linux and MacOS computers,
the user account that has
full access to the computer
is known as ‘root’
• A rootkit is a set of
programs that aims
to gain root or
administrator access
to a computer
A hacker is a person who gets access to a computer system without permission.
They can use this to access to: make the computer run different programs such as a virus or a botnet.
steal information.
damage files by corrupting or deleting them.
A hacker who misuses computers is known as a 'black hat' hacker.
Malware - spyware
• Spyware allows an attacker to spy on a
user’s computer without their consent
• Spyware is often delivered by a Trojan horse.
• can cause difficulties connecting
to the internet
• can record passwords and
personal data entered
• What do keyloggers do?