Please enable JavaScript.
Coggle requires JavaScript to display documents.
System Attacks and Threats (Hacking (Fun/Challenge (Hacking systems can be…
System Attacks and Threats
Hacking
What is a hacker?
A hacker is a person who gets access to a computer system without permission
A hacker who misuses computer is known as a 'black hat' hacker
Fun/Challenge
Hacking systems can be fun or challenging
There is a sense of achievement
Friends may give respect of hacking achievements
Financial gain
Ransomware can be used to encrypt until you pay
Ransoms can be made to prevent attacks from happening
Disruption
Attacks such as Denial-of-Service stop websites working
Viruses can slow down computers and delete files
Industrial Espionage-spying in companies
The aim is to find intellectual property such as designs or blueprints for products, business strategies or software
Personal attack
Friends/Family may attack each other if upset over something
Employees that are unhappy may attack the company
Information/Data Theift
Credit card and financial details are stolen to gain money
Company information may also be stolen
Pharming
Pharming is a way of redirecting a legitimate websites’ visitors to a fake website run by a hacker
The hacker can then use this site to discover usernames and passwords or other personal information
A Domain Name System (DNS) server is what translates a web address into an IP address
The hacker changes the entry to point to their server instead
Social Engineering
Social engineering is the ability to obtain confidential information by asking people for it
The "Money-Box Scheme"
Salting
Malware
Malware stands for MALicious softWARE
Viruses and Worms
Computer viruses infect computers
They infect other computers
They harm the computer by deleting corrupting or modifying files
They replicate their code in other programs
A worm replicates itself in order to spread to other computers
They might cause no damage to the attacked computers
They slow down networks and computers
Trojan Horses
Trojan story of men hiding in a wooden horse
The Trojans brought the horse into the city, allowing the Greeks to open the city gates letting the army in to destroy Troy
Computer Trojans are similar
They have a program, game or cracked file which is something the user wants
They have negative program code which causes damage, takes control, or provides access to the computer
Ransomware
Ransomware is software which:
If the data is encrypted, not even a cyber security professional will be able to recover the data unless backups are available
Once a ransom is paid to the attacker, access is restored
Holds a computer hostage by locking or encrypting access to it
Spyware
Spyware is often delivered by a Trojan horse and:
Can record passwords and personal data entered
Can cause difficulties connecting to the internet
Spyware allows an attacker to spy on a users computer without their consent
Adware displays unwanted advertisements
Rootkit
In UNIX, Linux and MacOS computers, the user account that has full access to the computer is known as ‘root’
A rootkit is a set of programs that aims to gain root or administrator access to a computer
Hacking a friends password
Three different ways i could get their password and one way they wont know I attempted to find their password
You can use password reset links
You can try effectively guessing their password
You can use a keylogger to track the keys their typing.
Black hat hacking is against the law
Phishing
Emails, texts or phone calls are sent to users commonly pretending to be from a bank or website
The ‘From’ email address may be forged
These messages will try to get
personal information such as:
Passwords
Credit card details
Usernames
Other personalinformation
Phishing is a type of social engineering trick
Denial of Service
In a denial of service attack, a hacker will use or infect a computer so that:
the server can’t respond fast enough
so slows down or goes offline
it sends as many requests to the server
as it can (known as a flood)
In a distributed denial of service attack (DDoS), many computers are used to send the requests
Shoulder Surfing
Shoulder surfing is the ability to get information or passwords by observing as someone types them in
Two other ways shoulder surfing can be carried out is:
Direct observation attacks
Recording attacks
The following are two examples:
Looking over someone’s shoulder
Using a CCTV camera
Botnet
These computers can then be controlled by one central computer
This gives a hacker free and anonymous access to computers
In a distributed denial of service attack (DDoS), many computers are used to send the requests
Common uses for botnets are:
Denial of service attacks
Sending spam
Botnet comes from robot network
Man-in-the-middle attack
A man-in-the-middle attack (MITM) allows the attacker to intercept communications between the user and server. The attacker can then:
eavesdrop to find passwords and personal information
add different information to a web page or other
communication such as email
Connecting to unencrypted Wi-Fi makes it easy
to perform a MITM attack