Show Menu

Cyber Security - AQA Computer Science Cheat Sheet by [deleted]

aqa     it     computing     gcse

What is 'cyber security'?

Methods and techno­logies designed to protect networks, computers and data from attack, damage and unauth­orised access.

Threats

Weak­/de­fault passwo­rds
These are easily guessed or found through brute force decryp­tion.
Misc­onf­igured access rights
This means that system­s/files that should be secure can be accessed by other users.
Remo­vable media (e.g. USBs)
This can bypass security measures (like firewa­lls), so malware can be installed more easily.
Outdated software
Software that has not been patched is vulnerable to attackers.
In addition to this, mali­cious code and social engine­ering techniques also pose threats.

Cyber Security Threats

 

Methods of Protection

Identity authen­tic­ation: biometric, passwords, two-step authen­tic­ation
CAPTCHA (human or robot test)
Anti-Virus software (keep up-to-­date)
Updating software and installing patches

Social Engine­ering

Social engine­ering
The process of manipu­lating people into undert­aking certain actions or disclosing confid­ential inform­ation.
Blag­ging or Pret­ext­ing
Creating a fictional scenario in order to obtain a user’s personal inform­ation, then using this inform­ation for malicious purposes.
Phis­hing
Contacting users (usually through fraudulent emails that mimic a legitimate organi­sat­ions) to cause users to disclose personal inform­ation (e.g. usernames, passwords)
Phar­ming
Setting up and guiding users to a bogus website that is visually identical to a legitimate one, allowing the attacker to gain login details.
Shou­lde­ring or Shoulder surfing
Spying’ on people, usually while they’re logging in to accounts or using an ATM, to find sensitive inform­ation (e.g. passwords, PINs).

Phishing and Pharming

 

Penetr­ation Testing

What is pene­tration testing?
Attempting to gain access to resources without knowledge of login details and other normal means of access, in order to test defences.
What is the difference between blac­k-box and whit­e-box penetr­ation testing?
Whit­e-box penetr­ation is where the tester already has some knowledge of the target system. This simulates an attack by a malicious insider. Blac­k-box is where they have no prior knowledge. This simulates external hacking or cyber warfare.

Malware

Malw­are
Dangerous or intrusive software.
Virus
Malicious program that duplicates itself once inside a computer or network.
Trojan
A malicious program disguised as a legitimate one to trick users into installing it.
Spyw­are
Software enabling attackers to obtain inform­ation about another's computer activities by transm­itting data from their hard drive.
Ad ware
Software that automa­tically displays advert­isments when a user is online, generating revenue for the attacker.

Download the Cyber Security - AQA Computer Science Cheat Sheet

1 Page
//media.cheatography.com/storage/thumb/deleted-56036_cyber-security-aqa-computer-science.750.jpg

PDF (recommended)

Alternative Downloads

Share This Cheat Sheet!

 

Comments

No comments yet. Add yours below!

Add a Comment

Your Comment

Please enter your name.

    Please enter your email address

      Please enter your Comment.

          Related Cheat Sheets

          Bio Topic 1: Cell Biology Cheat Sheet
          Cloud Computing Cheat Sheet

          More Cheat Sheets by [deleted]