大象传媒

Internet and cybersecurity - EduqasCybersecurity

Networks operate on the principles of communication and sharing. Unfortunately, these principles mean that network traffic and data can be more easily accessed by people who have no authority to do so. Different vulnerabilities need to be identified and measures put in place to protect systems from them.

Part of Computer ScienceUnderstanding Computer Science

Cybersecurity

Threats to a can take many forms.

  • unpatched
  • and digital devices
  • eavesdropping
  • key loggers

Social engineering

Social engineering is where users are manipulated by cyber criminals into giving access to the network. This might be done with or without their knowledge. Some of the most common forms of social engineering are and shoulder surfing.

Phishing

In the most common form of phishing, a pretends to be somebody in order to trick the user into disclosing sensitive such as their user ID and password. For example, this might be an email pretending to be a genuine message from the user鈥檚 bank containing a link to a website that looks like the real bank鈥檚 website. When the user clicks on the link it takes them to a fake website, designed to catch data such as their ID and password.

Shoulder surfing

A hacker watches a user to record the password or PIN they enter. This might be by looking over their shoulder at a cashpoint before stealing their bank card and using it to withdraw money. It might involve watching a user as they enter a door code to allow the hacker to gain access to the physical network.

Unpatched software

Occasionally a software manufacturer identifies potential security breaches in their own software and sends out to their registered users. The patches update the software and fix the potential hazards. A network manager is responsible for keeping up to date with the latest patches. They must ensure that the patches are installed on the system before a cyber criminal can use the security loopholes to gain access to their data.

USB and digital devices

The network policy should identify if users are allowed to connect USB devices and digital devices to the network and how this can be done safely. These devices can contain , which may infect the network, causing damage to , software and data.

Eavesdropping

A hacker monitors a network in order to gain information. An example of this is wiretapping, where communications are monitored. The hacker can use this data later to gain access to the system by pretending to be an authorised user. This is also known as a 鈥榤an-in-the-middle鈥 attacks.

Key loggers

Key loggers are programs that capture user . This data is then sent on to people with malicious intent.