Cybersecurity
Cybersecurity
Cybersecurity Threats
When using the internet, it is important to understand the threats that may occur.
Technology is rapidly evolving and as a result, the way that criminals are using the
internet is also changing.
There are a number of different threats to computer systems that include:
Social Engineering
Malicious code
Human error
Any risk posed to a computer system from an internet source is considered a cyber-threat.
These threats are often combined to increase the probability of harm to a system.
By taking steps to understand what the potential risks are, people and businesses are able to
better protect their systems and data.
Social Engineering Techniques
Social engineering is manipulating people into handing over confidential
information such as a PIN or password. The different Social Engineering
techniques are as follows:-
Blagging
Blagging is when someone makes up a story to gain a person’s interest and uses this to
encourage them to give away information about themselves, or even send money.
For example, a person may receive an email that appears to be from a friend telling
them that they’re in trouble and asking them to send money.
Phishing
Similar to blagging, a phishing email will ask a person to send personal details, but
pretends to be from a business.
They can often look convincing, but may contain spelling errors or URLs that do not
match the business's website.
Pharming
Pharming is a type of cyber-attack that redirects a user from a genuine website to a
fake one.
The fake website will often look like the genuine one.
When a person logs in, it sends their username and password to someone who will
use it to access their real accounts.
Shouldering
This is the simplest form of taking personal details.
Shouldering is looking at someone’s information over their shoulder, for example
looking at someone enters their PIN in a shop or at a cashpoint.
Malicious code
Malicious code is software written to harm or cause issues with a computer. This is also
referred to as malware and comes in a number of different forms. In all its forms, the code
has been written to either harm or steal data from your computer system. The different
forms of malicious code are as follows:-
Viruses
A virus is a piece of malware that infects a computer, and then replicates itself to be
passed onto another computer.
Anti-virus software holds a large database of known viruses.
If a program that is installing, or file that is being opened, appears to be similar to
one of these, the anti-virus software will warn the user and, depending on the type of
anti- virus, place all related files into a secure folder until it is confirmed that it is
safe.
Trojans
A Trojan appears to be a piece of harmless software, often given away for free, that
contains malicious code hidden inside.
This only appears once the gifted software is installed.
It was named after the Greek myth of the Trojan horse.
Ransomware
Ransomware hijacks the data on a computer system by encrypting it and
demanding that the owners pay money for it to be decrypted.
Having up-to-date anti-virus software and educating users to not open
suspicious attachments will help protect from ransomware.
Spyware
Spyware is a type of malware that collects the activity on a computer system and
sends the data it collects to another person without the owner being aware.
If a computer has been infected by spyware, it could be sending back everything that
is typed, or the sites that are visited, or even where the user is clicking on their screen.
Adware
Adware is software that either causes pop-ups or windows that will not close.
Generally, the pop-ups or windows display advertisements.
Many anti-virus programs will detect and prevent adware infecting a computer
system, but specialist anti-adware programs also exist.
3. Why is it not advisable for a person to plug in a USB memory stick they found?
a. It would be illegal
b. It might not fit their device
c. It might contain malware
9. Which type of threat attempts to blackmail a user into making a payment to a hacker?
a. Ransomware b. Trojan c. Spyware
10. Which social engineering technique uses emails to try to trick users into giving
away personal details?
a. Shouldering b. Phishing c. Spying