Transcript
Page 1: Forms of computer attacks Watch the video below of an

Y8 Formsofcomputerattacks

Watchthevideobelowofanoverviewofthetopic

Readtheslidesandwatchthevideostogiveyouabetterunderstandingonthetopic

https://www.youtube.com/watch?v=bPVaOlJ6ln0

Page 2: Forms of computer attacks Watch the video below of an

•  Understand forms of attack and threats posed to a network:

•  Malware

•  Phishing

•  Social engineering

•  Brute force attacks

•  Denial of service attacks

•  Data interception and theft

•  SQL injection

•  Poor network policy

Objectives

Page 3: Forms of computer attacks Watch the video below of an

Forms of cyber attack •  https://www.youtube.com/results?search_query=what+is+a+cyber+attack

•  Cybercrime can take many forms including planting viruses, acquiring and using personal or confidential data and disrupting a website or service

•  Cyber attacks take advantage of: •  Human weakness or gullibility

•  Technical weaknesses in computer systems, networks or digital devices

Page 4: Forms of computer attacks Watch the video below of an

Social engineering •  https://www.youtube.com/watch?v=Vo1urF6S4u0

•  Humans are often the weakest point in security

•  Social engineering is the art of manipulating or ‘conning’ individuals into giving away private information or login IDs and passwords

•  Two common techniques are: •  Phishing

•  Shoulder surfing

Page 5: Forms of computer attacks Watch the video below of an

Phishing – what’s this? •  https://www.youtube.com/watch?v=9TRR6lHviQc

•  A phishing email is one that tricks you into handing over sensitive or personal information (login details, bank details, etc.)

•  You receive what looks like a legitimate email, for example from a bank or an organisation such as PayPal or eBay

•  The website urges you to visit a bogus website and enter your personal details, which are then captured by the phishers

Page 6: Forms of computer attacks Watch the video below of an

Does it work? •  Phishers send out hundreds of thousands

of emails that look as though they are from legitimate companies

•  For phishing to be successful, the criminals must get you to click on a link in the email to go to a website

•  A successful phishing campaign has around a 5% response rate – meaning 5% of recipients are conned!

Page 7: Forms of computer attacks Watch the video below of an

A typical phishing email

Page 8: Forms of computer attacks Watch the video below of an

Protecting yourself against email scams

•  Use a SPAM filter to prevent common scams ever reaching your inbox

•  Be suspicious! If you aren’t completely certain it’s genuine, NEVER click any links or download attachments

Page 9: Forms of computer attacks Watch the video below of an

Brute force attacks •  https://www.youtube.com/watch?v=SaAwW-6wV_Q

•  In a brute force attack, a hacker may go through a list of different passwords until access to an account is gained

•  Alternatively, the attacker may try every combination of characters until the correct password is found

Page 10: Forms of computer attacks Watch the video below of an

Setting a secure password •  Validation checks on a new password may specify

that it must be: •  between 10 and 15 characters (length check)

•  a mixture of numbers, lower and uppercase characters and symbols (format check)

•  You should never include your name, DOB or personal details

Page 11: Forms of computer attacks Watch the video below of an

Worst passwords of 2015 •  The top ten most commonly used passwords in 2015 in the USA were:

1.  123456

2.  Password

3.  12345678

4.  Qwerty

5.  12345

6.  123456789

7.  Football

8.  1234

9.  1234567

10.  baseball

One in six people in Britain use their pet’s name as a password!

Page 12: Forms of computer attacks Watch the video below of an

Default passwords •  Most devices come with a default password or PIN to gain access

•  The default PIN is frequently 0000 or 1234

•  Research has shown that 20% of all passwords and PINs have never been changed

•  Do you always change default passwords and PINs?

Page 13: Forms of computer attacks Watch the video below of an

Always change the default! •  The mobile phone hacking scandal, concluded in 2012, involved the

use of default PIN numbers •  Journalists used the mobile phone numbers of prominent people to gain access to

their voicemail remotely, using a public voicemail access number

•  When asked for a PIN to listen to their messages, they tried the default PIN number which was frequently unchanged

Page 14: Forms of computer attacks Watch the video below of an

Technical weaknesses •  Technical weaknesses can make computer

systems vulnerable to: •  Malware

•  Denial of Service (DoS) attacks

•  Data interception and theft

Page 15: Forms of computer attacks Watch the video below of an

Viruses https://www.youtube.com/watch?v=fKxuKWsA_JI •  A computer virus is one type of malware (malicious software) which is

installed without your knowledge, with the purpose of doing harm

•  A virus is a program which infects (embeds itself in) other programs or data files

•  It is easily spread if a user innocently sends an infected file to someone else

•  It is commonly found in email attachments with macros

Page 16: Forms of computer attacks Watch the video below of an

Worms •  A worm is another type of

malware

•  It is a standalone program that does need to attach itself to an existing program in order to spread

•  It may scan the Internet looking for vulnerable computers to infect

Page 17: Forms of computer attacks Watch the video below of an

How do systems become infected?

•  Technical weaknesses in a computer or a network can open the door to cybercrime

•  Common sources and forms of attack include: •  USB devices

•  digital devices

•  eavesdropping

Page 18: Forms of computer attacks Watch the video below of an

Found – a USB stick! •  Criminals sometimes leave a USB

stick contaminated with a virus lying, for example, in the car park of a company that they wish to infect with a virus or steal data from

•  An unsuspecting employee may pick it up and insert it into their computer

Page 19: Forms of computer attacks Watch the video below of an

Viruses •  It is estimated that 25% of malware is spread through USB storage

devices

•  Other portable devices such as mobile phones, memory cards and SSD drives also create risk

•  How can you minimise these risks?

•  Scan all devices, never use a found device and disable the autorun facility for removable media

Page 20: Forms of computer attacks Watch the video below of an

Protect your mobile phone! •  Use the password feature and choose a

strong password

•  Do not follow links in suspicious emails

•  Think carefully before posting your mobile phone number on public websites

•  Don’t install apps without researching them first – if they require extra permissions, don’t install them

•  Delete all information stored on your mobile before discarding


Top Related