Chapter 5.
3 – Cyber Security (Enhanced Exam-Focused Notes)
5.3.1 Cyber Security Threats
Brute-force attack
An attacker uses automated software to try every possible password or encryption key until access is gained. Weak or short passwords are especially vulnerable. Used to break into
accounts or decrypt files.
Data interception (Packet Sniffing)
Data travelling across a network can be captured using packet-sniffing tools. These tools read data packets as they move between devices. If data is unencrypted, attackers can steal:
- passwords
- bank details
- messages
- personal data
This attack often occurs on public Wi-Fi or poorly secured networks.
Distributed Denial of Service (DDoS) attack
A DDoS attack floods a server with massive amounts of traffic from multiple computers (botnets). The server becomes overloaded and cannot respond to legitimate users. Used to crash
websites, gaming servers, or company systems.
Hacking
Unauthorised access to data or systems. Hackers may alter, steal, or delete data. Often involves exploiting software vulnerabilities or weak security controls.
Malware
Malicious software designed to damage systems or steal information. Types include:
- Virus – attaches to files; spreads when files are shared/executed.
- Worm – self-replicates across networks without attaching to files.
- Trojan horse – disguised as legitimate software; gives attackers access.
- Spyware – monitors user activity, keystrokes, browsing habits.
- Adware – displays unwanted adverts; tracks activity.
- Ransomware – encrypts data; demands payment for unlocking.
Phishing
A fake email/message pretending to be from a trusted organisation. Tricks the user into clicking a malicious link or submitting personal data. Clues: urgent tone, spelling errors, suspicious
links.
Pharming
A user is redirected from a genuine website to a fake one— even when typing the correct URL. Often caused by DNS poisoning or malware. Used to steal passwords and bank details.
Social Engineering (Detailed Examples)
Instant messaging scams
Malicious links sent via chat/IM apps pretending to be software upgrades. Relies on user curiosity.
Scareware
Fake antivirus pop-ups warning of infections. Encourages user to download harmful software. Relies on fear.
Emails / phishing scams
Fake emails leading to fraudulent websites. Relies on trust in well-known companies.
Baiting
Attacker leaves an infected USB drive purposely. User plugs it in out of curiosity, installing malware.
Phone call scams
Attacker pretends to be IT support. Claims device is compromised and asks user to install remote-access malware. Relies on fear.
5.3.2 Keeping Data Safe – Protection Methods
Access levels
Users are assigned permission levels. Only authorised users can read, edit, delete, or manage sensitive data. Prevents accidental or malicious damage.
Anti-malware (anti-virus and anti-spyware)
Anti-virus removes viruses; anti-spyware removes monitoring software. Modern tools scan, quarantine, and remove threats automatically.
Authentication
Methods used to verify identity:
- Username and password: basic login method.
- Biometrics: fingerprints, facial recognition.
- Two-step verification: requires second form of authentication (SMS code, app code).
Automating software updates
Updates patch vulnerabilities that attackers could exploit. Automated updating ensures fixes are installed promptly.
Checking spelling and tone of communications
Phishing often includes poor grammar, urgent requests, unusual tone. Recognising these signs helps avoid social engineering attacks.
Checking the URL attached to a link
Legitimate secure sites begin with [Link] Fake sites may have unusual spellings, extra characters or no SSL encryption.
Firewalls (Detailed Explanation)
A firewall monitors all incoming and outgoing network traffic. It blocks suspicious or unauthorised connections. Firewalls can be:
- Hardware firewalls (physical devices between network & internet)
- Software firewalls (installed on computers)
How a firewall protects:
1. Examines each data packet using filtering rules.
2. Blocks traffic from unknown or dangerous sources.
3. Prevents malware connecting to external servers.
4. Stops hackers from gaining unauthorised access.
5. Can block specific websites or applications.
Privacy settings
Allow a user to control who can see their data, posts, contact information. Helps protect identity and reduces risk of targeted attacks.
Proxy servers
A proxy server acts as an intermediary (middle layer) between the user’s device and the websites they access. Instead of the user connecting directly to a website, all requests first go to the
proxy server, which then forwards the request on their behalf.
How a Proxy Server Protects and Helps Users
1. Hides the user’s IP address
▪ Websites only see the IP address of the proxy server, not the user’s real address.
▪ This protects user identity and location.
2. Filters web traffic
o Proxy servers can block access to unsafe or restricted websites (e.g., malware sites, social media in schools).
o Useful for schools, workplaces, and parental controls.
3. Prevents direct exposure to threats
o Because all communication passes through the proxy, harmful content can be blocked before reaching the user.
o Reduces risk of malware, phishing pages, and harmful scripts.
4. Caches (stores) frequently visited websites
o The proxy stores local copies of popular websites.
o When a user requests one, the proxy retrieves it from cache instead of the internet.
o This speeds up browsing and reduces network traffic.
5. Monitors user activity
o Organisations can track and log what websites users visit.
o Helps enforce acceptable use policies and detect suspicious behaviour.
6. Bypasses geographical restrictions
o Because websites see the proxy server’s location, not the user’s, a proxy can access blocked or region-restricted content (e.g., websites unavailable in certain countries).
7. Adds a layer of security
o Proxy servers can scan outgoing and incoming requests for malicious elements.
o Often used with firewalls for stronger network protection.
Summary (Key Points for Exams)
• Acts as a gateway between user and internet.
• Masks user identity (IP address).
• Filters, blocks, and monitors web traffic.
• Caches websites to improve speed.
• Helps bypass restrictions.
• Increases security by controlling data entering/exiting the network.
Secure Socket Layer (SSL) – Detailed Steps
SSL encrypts the connection between the browser and the web server. Used on websites handling bank card details, passwords and logins.
How an SSL-secure connection (HTTPS) is created (SSL Handshake):
1. The web browser requests a secure connection and asks the server for its digital certificate.
2. The web server sends its SSL certificate to the browser.
3. The browser checks whether the certificate is valid and issued by a trusted Certificate Authority (CA).
4. If the certificate is authentic, the browser and server exchange encryption keys.
5. A secure encrypted connection is created; data is transmitted safely.
If a certificate is NOT authentic, the browser will warn the user that the website is not secure.