Please enable JavaScript.
Coggle requires JavaScript to display documents.
System Attacks The Threads (Botnet (Common users for botnets are (Denial…
System Attacks The Threads
Pharming
Pharming is a way of redirecting a legitimate websites visitors to a fake website run by a hacker
The hacker can then use this site to discover usernames and passwords or other personal information.
A Domain Name system (DNA) server is what translates a web address into an IP address
The hacker changes the entry to point to their server instead
Hacking
A hacker is a person who gets access to a computer system without permission
They can use access to...
Damage files by corrupting or deleting them
Steal information
Making the computer run different programs such as a virus or a botnet
A hacker who misuses computers is known as a 'Black hacker'
Hacking a friends password
Remember- back hat hacking is against the law
Imagine you need to find out a friend's password by tomorrow morning
In pairs
For at least one of these, your friend mustn't know that you have attempted to find out their password
Come up with three different ways that you could get their password
Denial of service
In a denial of service attack, a hacker will use or infect a computer so that
It sends as many requests to the server as it can ( know as a flood)
The server cant respond fast enough so slows down or goes offline
In a distributed dental of service attack (DDoS), many computers are used to send the requests
Social Engineering
Social engineering is the ability to obtain
Botnet
Botnet comes from robot network
In a botnet, a hacker will first infect machines to make zombie devices
These computers can then be controlled by one central computer
This gives a hacker free and anonymous access to computers
Common users for botnets are
Denial of service attacks
Common spam
Shoulder Surfing
Shoulder surfing is the ability to get information or password by observing as someone types them in
The following are two examples:
Using a CCTV camera
Looking over someones shoulder
Whatare two other ways that shoulder surfing could be carried out
Phishing
These messages will try to get personal information such as
Credit cards dentails
Other personal information
Password
Usernames
Emails, texts or phone calls are sent to users commonly pretending to be from a bank or websites
The 'From' email address may be forged
Phishing is a type of social engineering technique
Malware
Malware comes from two words
Software
Malicious- to cause an act of halm
Malware are executable programs that run on a computer
One type of malware that exists is a computer virus
What are two other types of malware