Cyber Security – Categorization of Cyber Attacks
ACTIVE VS PASSIVE
INTERNAL VS EXTERNAL
SYSTEMS AS TARGET & TOOL
PEARSON BTEC LEVEL 4
UNIT: CYBER SECURITY
HAWA
What is a Cyber Attack?
 A cyberattack is a deliberate exploitation of
computer systems, technology-dependent
enterprises, and networks.
 Purpose: Steal, alter, or destroy data or systems.
 Examples: Phishing, DDoS, ransomware.
Categories of Cyber
Attacks
 Cyber attacks are broadly categorised into:
 Active Attacks
 Passive Attacks
https://www.geeksforgeeks.org/computer-
networks/difference-between-active-attack-and-passive-
attack/
Active Attacks
 Definition: Attempt to alter system resources or
affect operations.
 Examples:
 • Virus injection
 • Ransomware
 • Website defacement
 • Denial of Service (DoS/DDoS)
 Impact: Changes data, interrupts services,
damages reputation.
Passive Attacks
 Definition: Attempt to gather information without
altering resources.
 Examples:
 • Wiretapping
 • Traffic analysis
 • Shoulder surfing
 • Network sniffing
 Impact: Breaches confidentiality without
damaging data.
Source of Attacks
 Internal Attacks: Initiated by insiders (employees,
misuse of privileges).
 External Attacks: Originates from outside (hackers,
cybercriminals).
 Discussion: Can insiders perform external-style
attacks?
Digital Systems as a Target
 When attackers aim to damage or exploit the
system itself.
 Examples:
 • Viruses & Worms
 • Ransomware
 • DDoS
 • Pagejacking
 • Mail Bombing
Digital Systems as a Tool
 When systems are used to commit or support
crimes.
 Examples:
 • Cyber-enabled crimes
 • Crimes against children
 • Financial crimes
 • Information warfare
 • Spam & phishing
 • Distribution of offensive content
Case Study – WannaCry
Ransomware
 Type: Active, External
 Impact: Encrypted NHS data, disrupted operations
 Lesson: Importance of system patching and backups.
https://www.cloudflare.com/learning/security/ransomware/w
annacry-ransomware/
Activity
 Activity 1: Categorise these into Active/Passive &
Internal/External:
 1. Wiretapping
 2. Ransomware
 3. Insider data theft
 4. DDoS attack
 Activity 2: Pick a recent cyberattack and identify:
 • Type
 • Origin
 • Impact
 • Mitigation
Reflection / Homework
 Research a recent cyberattack (past 2 years):
 • Identify its category, tools used, and damage
caused
 • Submit a short paragraph for discussion next
class

Categorisation_of_Cyber_Attacks for hnd pearson level 4 students

  • 1.
    Cyber Security –Categorization of Cyber Attacks ACTIVE VS PASSIVE INTERNAL VS EXTERNAL SYSTEMS AS TARGET & TOOL PEARSON BTEC LEVEL 4 UNIT: CYBER SECURITY HAWA
  • 3.
    What is aCyber Attack?  A cyberattack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks.  Purpose: Steal, alter, or destroy data or systems.  Examples: Phishing, DDoS, ransomware.
  • 4.
    Categories of Cyber Attacks Cyber attacks are broadly categorised into:  Active Attacks  Passive Attacks https://www.geeksforgeeks.org/computer- networks/difference-between-active-attack-and-passive- attack/
  • 5.
    Active Attacks  Definition:Attempt to alter system resources or affect operations.  Examples:  • Virus injection  • Ransomware  • Website defacement  • Denial of Service (DoS/DDoS)  Impact: Changes data, interrupts services, damages reputation.
  • 7.
    Passive Attacks  Definition:Attempt to gather information without altering resources.  Examples:  • Wiretapping  • Traffic analysis  • Shoulder surfing  • Network sniffing  Impact: Breaches confidentiality without damaging data.
  • 9.
    Source of Attacks Internal Attacks: Initiated by insiders (employees, misuse of privileges).  External Attacks: Originates from outside (hackers, cybercriminals).  Discussion: Can insiders perform external-style attacks?
  • 11.
    Digital Systems asa Target  When attackers aim to damage or exploit the system itself.  Examples:  • Viruses & Worms  • Ransomware  • DDoS  • Pagejacking  • Mail Bombing
  • 13.
    Digital Systems asa Tool  When systems are used to commit or support crimes.  Examples:  • Cyber-enabled crimes  • Crimes against children  • Financial crimes  • Information warfare  • Spam & phishing  • Distribution of offensive content
  • 15.
    Case Study –WannaCry Ransomware  Type: Active, External  Impact: Encrypted NHS data, disrupted operations  Lesson: Importance of system patching and backups. https://www.cloudflare.com/learning/security/ransomware/w annacry-ransomware/
  • 16.
    Activity  Activity 1:Categorise these into Active/Passive & Internal/External:  1. Wiretapping  2. Ransomware  3. Insider data theft  4. DDoS attack  Activity 2: Pick a recent cyberattack and identify:  • Type  • Origin  • Impact  • Mitigation
  • 17.
    Reflection / Homework Research a recent cyberattack (past 2 years):  • Identify its category, tools used, and damage caused  • Submit a short paragraph for discussion next class