π Cyber Security β CIE IGCSE Computer Science Notes
1οΈβ£ What is Cyber Security?
π Definitionβ
Cyber security is:
The protection of computer systems, networks and data from theft, damage or unauthorised access.
π― Main Aim of Cyber Securityβ
To ensure:
- Confidentiality β data is kept private
- Integrity β data is accurate and not altered
- Availability β systems and data are accessible when needed
(These are often called the CIA triad.)
2οΈβ£ Cyber Security Threats
You must be able to:
β Describe the processes involved
β Explain the aim of each attack
π¨ 1. Brute-Force Attackβ
π Process:β
- The attacker tries many password combinations repeatedly.
- Uses automated software to guess passwords.
π― Aim:β
- To gain unauthorised access to an account.
π‘ Prevention:β
- Strong passwords
- Account lockout after failed attempts
- Two-step verification
π‘ 2. Data Interceptionβ
π Process:β
- Data is captured while being transmitted across a network.
- Often happens on unsecured Wi-Fi networks.
π― Aim:β
- To steal sensitive information (passwords, banking details).
π‘ Prevention:β
- Use SSL encryption
- Use secure Wi-Fi
- Use VPNs or proxy servers
π 3. Distributed Denial of Service (DDoS) Attackβ
π Process:β
- Many computers flood a server with traffic.
- The server becomes overloaded.
π― Aim:β
- To make a website or service unavailable.
π‘ Prevention:β
- Firewalls
- Traffic monitoring
- Server redundancy
π§βπ» 4. Hackingβ
π Process:β
- Exploiting weaknesses in systems.
- Gaining unauthorised access.
π― Aim:β
- Steal data
- Modify data
- Cause disruption
π» 5. Malware
π Definitionβ
Malware is malicious software designed to harm systems or steal data.
π¦ Types of Malwareβ
1. Virusβ
- Attaches to files.
- Spreads when the file is opened.
2. Wormβ
- Self-replicates.
- Spreads across networks automatically.
3. Trojan Horseβ
- Disguised as legitimate software.
- Contains hidden malicious code.
4. Spywareβ
- Secretly collects user data.
5. Adwareβ
- Displays unwanted advertisements.
6. Ransomwareβ
- Encrypts files.
- Demands payment to unlock them.
π― Aim of Malwareβ
- Steal information
- Damage systems
- Extort money
- Monitor activity
π 6. Phishingβ
π Process:β
- Fake emails or messages pretending to be legitimate.
- Trick users into giving personal information.
π― Aim:β
- Steal passwords or financial information.
π 7. Pharming
π Process:β
- Redirects users to fake websites without their knowledge.
- Often via DNS manipulation.
π― Aim:β
- Capture login details.
π§ 8. Social Engineeringβ
π Process:β
- Manipulating people into revealing information.
- Exploits human psychology rather than technical weakness.
π― Aim:β
- Obtain confidential information.
Example:
Pretending to be IT support.
3οΈβ£ Cyber Security Solutions
You must explain how each protects data.
π 1. Access Levelsβ
Different users have different permissions.
Example:
- Admin β Full access
- User β Limited access
Prevents unauthorised modification of data.
π‘ 2. Anti-Malware Softwareβ
Includes:
- Anti-virus
- Anti-spyware
How It Works:β
- Scans files
- Detects suspicious behaviour
- Removes threats
π 3. Authentication Methodsβ
a) Username and Passwordβ
Basic method of verifying identity.
b) Biometricsβ
Uses:
- Fingerprint
- Facial recognition
- Retina scan
c) Two-Step Verification (2FA)β
Requires:
- Password
- Additional code (e.g., SMS)
Provides stronger security.
π 4. Automating Software Updatesβ
Keeps systems protected against:
- Newly discovered vulnerabilities.
βοΈ 5. Checking Spelling and Toneβ
Phishing emails often:
- Contain spelling errors
- Sound urgent or threatening
Always check carefully.
π 6. Checking the URLβ
Before clicking a link:
- Check domain name carefully.
- Look for misspellings.
- Look for HTTPS.
π₯ 7. Firewallsβ
π Definition:β
A firewall monitors and controls incoming and outgoing network traffic.
Blocks suspicious traffic.
βοΈ 8. Privacy Settingsβ
Control:
- Who can see your information
- What data apps can access
Reduces risk of data exposure.
π 9. Proxy Serversβ
Acts as an intermediary between user and internet.
- Hides IP address.
- Improves security.
π 10. Secure Socket Layer (SSL)β
SSL:
- Encrypts data between browser and website.
- Prevents interception.
Indicated by:
π HTTPS in address bar.
π Summary Table
| Threat | Prevention |
|---|---|
| Brute-force | Strong passwords, 2FA |
| Data interception | SSL, encryption |
| DDoS | Firewalls |
| Malware | Anti-virus |
| Phishing | Check email tone and URL |
| Social engineering | Staff training |
| Hacking | Authentication + firewalls |
π― Exam Tips
β When describing a threat β explain process + aim
β When explaining a solution β explain how it protects data
β Use technical terms correctly
β Avoid vague answers like βit protects the systemβ
π¨ Common Exam Mistakes
β Confusing phishing and pharming
β Saying firewall removes viruses
β Forgetting to mention encryption in SSL
β Saying 2FA replaces passwords (it adds to them)
β Not explaining the aim of the attack
π Example 6-Mark Question Structure
Question:
Describe phishing and explain how it can be prevented.
Answer Structure:
- Phishing involves sending fake emails pretending to be legitimate organisations.
- It tricks users into revealing personal information.
- It aims to steal passwords or financial details.
- Prevention includes checking email tone and spelling.
- Checking the URL before clicking links.
- Using two-step verification.
π§ Key Concepts to Remember
Cyber security β Protect data
Threat β What causes harm
Vulnerability β Weakness
Authentication β Proving identity
Encryption β Scrambling data
Firewall β Controls traffic