WJEC GCSE Computer Science

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Cyber X-Force-SMS alert system for threats.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Information Systems Design and Development Security Precautions Computing Science.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 40 Internet Security.
Botnets A collection of compromised machines
Edexcel GCSE Cyber security threats Computer Science 1CP1
3.6 Fundamentals of cyber security
3.6 Fundamentals of cyber security
IT Security  .
Social Engineering Charniece Craven COSC 316.
Instructor Materials Chapter 7 Network Security
ISYM 540 Current Topics in Information System Management
Secure Software Confidentiality Integrity Data Security Authentication
Answer the questions to reveal the blocks and guess the picture.
Protect Your Computer Against Harmful Attacks!
Botnets A collection of compromised machines
Teaching Computing to GCSE
Risk of the Internet At Home
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
Forensics Week 12.
Unit 1.6 Systems security Lesson 2
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Computer Security By: Muhammed Anwar.
Test 3 review FTP & Cybersecurity
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Marcial Quinones-Cardona
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Unit 1.6 Systems security Lesson 1
Presentation transcript:

WJEC GCSE Computer Science Unit 1 Cyber Security

Objectives Emerging Define different types of Security Issue Identify different types of cyber attack and how to search for system weaknesses Identify how to protect computer systems using Physical Methods Identify how to protect computer systems using Logical Methods Developing Explain with examples different methods of attacking computer systems and how to identify if an attack has happened. Explain different methods of how to protect computer systems by identifying vulnerabilities Secure Analyse different methods of attacking computer systems and discuss possible prevention methods

Keywords Cybersecurity refers to the range of measures that can be taken to protect computer systems, networks and data from unauthorised access or cyberattack. Cyberattacks are carried out using various types of malware (malicious software), Viruses. Viruses are programs that can replicate themselves and be spread from one system to another by attaching themselves to host files. They are used to modify or corrupt information on a targeted computer system.  Worms. Worms are self-replicating programs that identify vulnerabilities in operating systems and enable remote control of the infected computer. Spyware. Installed by opening attachments or downloading infected software. Spyware can be used to collect stored data without the user’s knowledge. Trojans. A Trojan is a program that appears to perform a useful function, but also provides a ‘backdoor’ that enables data to be stolen.

Protecting against Malware There are several simple methods that can be used to protect against malware: Install Virus protection software Use a Firewall Keep your operating system up to date Use the latest versions of web browsers Look out for phishing emails Regularly run a malicious software removal tool

Install Virus protection software Use a firewall Also called anti-virus software, is a program that can be loaded into memory when the computer is running. It monitors activity on a computer system for the signs of virus infection. Each virus has its own unique ‘signature’ that is known to virus protection software and stored in a database. It scans the computer for any of these known signatures. If it detects any they are quarantined or deleted. A firewall can be a software or hardware security system that controls the incoming and outgoing network traffic. The basic function of a firewall is to monitor where data has come from and where it is going and to determine if this communication is allowed.

Keep your operating system up to date Use the latest versions of web browsers New ways to bypass the operating system’s built-in security are often discovered and can be covered by installing the security patches issued by the operating system manufacturer. Updating your operating system will close some of these gaps. As with operating systems the manufacturers of web browsers seek to continually improve their products and remove possible security vulnerabilities. Most browsers will download updates automatically, but will need a restart for the update to be installed.

Look out for phishing emails Regularly run a malicious software removal tool Emails that ask you to confirm personal details are usually fakes. They should be caught by the spam filter, but be suspicious and do not provide any sensitive information. See Anti Malware!

Forms of Cyber Attack Internet protocols, operating systems and network equipment all present inherent technical weaknesses that must be recognised and protected against. User behaviour can also compromise security e.g. sending sensitive documents to unintended recipients, opening malicious attachments to scam emails, or using the same passwords for multiple systems. Specific forms of attack include; Shoulder surfing SQL Injection DoS Attack Password Based attacks IP Address Spoofing Social Engineering

Shoulder surfing SQL Injection Shoulder surfing is using direct observation to get information. It is relatively simple to stand next to someone and watch as they fill out a form, or enter a PIN number, but shoulder surfing can also be carried out long distance with the aid of binoculars or even CCTV. SQL injection is a technique where malicious users can inject SQL commands into an SQL statement, via web page input. Injected SQL commands can alter SQL statements and compromise the security of information held in a database.

Denial of Service Attacks Passwords! Denial of service (DoS) attacks do not attempt to break system security, they attempt to make your website and servers unavailable to legitimate users, by swamping a system with fake requests—usually in an attempt to exhaust server resources. A DoS attack will involve a single Internet connection. Distributed denial of service (DDoS) attacks are launched from multiple connected devices that are distributed across the Internet. These multi-person, multi-device attacks target the network infrastructure in an attempt to saturate it with huge volumes of traffic. Passwords are a good starting point, but are they secure? Cyber criminals have ways of finding out your password. Dictionar y attack This uses a simple file containing words found in a dictionary. This attack uses exactly the kind of words that many people use as their password. Brute force attack Similar to the dictionary attack but able to detect non-dictionary words by working through all possible alphanumeric combinations from aaa1 to zzz10. It’s not quick, but it will uncover your password eventually. Guess ??? A user-generated password is unlikely to be random. Passwords are likely to be based upon our interests, hobbies, pets, family etc. Educated guesses often work.

IP Spoofing Social Engineering A spoof is a hoax, or a trick. IP address spoofing involves an attacker changing the IP address of a legitimate host so that a visitor who types in the URL of a legitimate site is taken to a fraudulent or spoofed web page. The attacker can then use the hoax page to steal sensitive data, such as a credit card number, or install malware. Internet users frequently receive messages that request password or credit card information to “set up their account”. Social engineering involves tricking a user into giving out sensitive information such as a password, by posing as a legitimate system administrator. Examples of social engineering attacks carried out by deception include phishing, which is an attempt to acquire users’ details using fake emails and websites, and pharming, where users are unknowingly re-directed to a fake website, again with the intention of identity theft.

Identifying Vulnerabilities There are a variety of ways to identify security flaws in your network: Footprinting Footprinting is the first step in the evaluation of the security of any computer system. It involves gathering all available information about the computer system or network and the devices that are attached to it. Footprinting should enable a penetration tester to discover how much detail a potential attacker could find out about a system and allow an organisation to limit the technical information about its systems that is publicly available. Ethical Hacking Ethical hacking is carried out with the permission of the system owner to cover all computer attack techniques. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the system owner to improve system security. Penetration Testing Penetration testing is a sub set of ethical hacking that deals with the process of testing a computer system, or network to find vulnerabilities that an attacker could exploit. The tests can be automated with software applications or they can be performed manually. Penetration test strategies include; Targeted testing, testing carried out by the organization's IT team and the penetration testing team working together. External testing, to find out if an outside attacker can get in and how far they can get in once they have gained access. Internal testing, to estimate how much damage a dissatisfied employee could cause. Blind testing, to simulate the actions and procedures of a real attacker by severely limiting the information given to the team performing the test.

Exercises Describe the following forms of Cyber Attack: Define the following keywords: Cybersecurity Viruses Worms Spyware Trojans Explain the following methods of protecting against malware: Install Virus protection software Use a Firewall Keep your operating system up to date Use the latest versions of web browsers Look out for phishing emails Regularly run a malicious software removal tool Describe the following forms of Cyber Attack: Shoulder surfing SQL Injection DoS Attack Password Based attacks IP Address Spoofing Social Engineering Explain the following methods Identifying Vulnerabilities: Foot printing Ethical Hacking Penetration Testing

Workbook Complete section 9 Q1-3