OCR IT National Level 2
4. Cyber-security and Legislation
4.1 Cyber-security Threats
4.1 Cyber-security Threats
Overview
Security Threats
Security threats are dangers that can harm computer systems, networks, and data. These threats can cause loss of information, damage to systems, or stop them from working. One example is a Denial of Service (DoS) attack, which floods a network or website with traffic so it cannot work properly.
Hacking is when someone gains access to a system without permission, often to steal or damage data. Malware is harmful software such as viruses, worms, or ransomware that can damage files or steal information.
Social engineering is when criminals trick people into giving away personal or security information, often by pretending to be someone they trust.
Understanding these threats helps people and organisations protect their systems and keep information safe. Using strong passwords, security software, and being careful online can reduce the risk of these attacks.
Overloads a network, website, or system with traffic.
Makes it slow or completely unavailable to users.
🎩 Black Hat
Hackers with bad intentions.
Steal, damage, or misuse information.
Hackers with mixed intentions.
May break rules but not always for harm.
🤍 White Hat
Ethical hackers.
Help organisations find and fix weaknesses.
Shows unwanted adverts on your device.
Can slow performance or track browsing.
Network of infected devices controlled remotely.
Often used for large-scale cyber-attacks.
Locks files and demands payment to unlock them.
Secretly collects information without permission.
Disguised as safe software but contains harmful code.
Spreads by attaching to files and programs.
Self-replicates and spreads through networks without needing to attach to files.
🎁Baiting
Offering something attractive to trick users into giving information or access.
Fake emails, texts, or websites that trick people into giving away personal details.
Pretending to be someone else to gain trust and get information.
Offering a benefit in exchange for sensitive information.
Scaring users with fake threats to make them download harmful software.
Watching someone’s screen or keyboard to steal information.