gcse 8525 paper 2 | slr4 cyber security year 12 ict

28
Craig’n’Dave Year 12 ICT – Cyber Security Name: Specification & learning objectives By the end of this topic you will be able to: Be able to define the term cyber security and be able to describe the main purposes of cyber security. Understand and be able to explain the following cyber security threats: • social engineering techniques • malicious code (malware) • pharming • weak and default passwords • misconfigured access rights • removable media • unpatched and/or outdated software Explain what penetration testing is and what it is used for Define the term social engineering Describe what social engineering is and how it can be protected against Explain the following forms of social engineering: • blagging (pretexting) • phishing • shouldering (or shoulder surfing). Define the term malware Describe what malware is and how it can be protected against Describe the following forms of malware: • computer virus • trojan • spyware. Understand and be able to explain the following security measures: • biometric measures (particularly for mobile devices) • password systems • CAPTCHA (or similar) • using email confirmations to confirm a user’s identity • automatic software updates

Upload: others

Post on 12-Jan-2022

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

Name:

Specification & learning objectives

By the end of this topic you will be able to:

Be able to define the term cyber security and be able to describe the main purposes of cyber security.Understand and be able to explain the following cyber security threats: • social engineering techniques • malicious code (malware) • pharming • weak and default passwords• misconfigured access rights • removable media • unpatched and/or outdated software

Explain what penetration testing is and what it is used forDefine the term social engineeringDescribe what social engineering is and how it can be protected againstExplain the following forms of social engineering: • blagging (pretexting) • phishing • shouldering (or shoulder surfing).

Define the term malwareDescribe what malware is and how it can be protected againstDescribe the following forms of malware: • computer virus • trojan • spyware.

Understand and be able to explain the following security measures: • biometric measures (particularly for mobile devices) • password systems • CAPTCHA (or similar)• using email confirmations to confirm a user’s identity • automatic software updates

Page 2: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

Cyber security

Definition of the main purpose of cyber security:

Page 3: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

The Hackers Handbook: front cover

Page 4: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

The Hackers Handbook: page 1 – cyber security threats

Page 5: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

The Hackers Handbook: page 2 – social engineering: blagging (pretexting)

Page 6: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

The Hackers Handbook: page 3 – social engineering: phishing

Page 7: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

The Hackers Handbook: page 4 – social engineering: pharming

Page 8: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

The Hackers Handbook: page 5 – social engineering: shouldering (or shoulder surfing)

Page 9: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

The Hackers Handbook: page 6 - Malware

Page 10: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

The Hackers Handbook: page 7 – Computer virus

Page 11: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

The Hackers Handbook: page 8 – trojan

Page 12: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

The Hackers Handbook: page 9 – spyware

Page 13: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

The Hackers Handbook: back cover

Page 14: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

Social engineering techniques

Social engineering refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access. It is often one of many steps in a more complex fraud operation.

List of mistakes that people make with system security:

Page 15: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

Penetration testing

Pentation testing is the process of:

White BoxPenetration

Testing

Black BoxPenetration

Testing

Page 16: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security

Security measures

Common security measures which are often used to help prevent unauthorised access include:

Page 17: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks

Name:

Specification & learning objectives

By the end of this topic you will be able to:Define what a computer network isDiscuss the advantages and disadvantages of computer networksDescribe the main types of computer network including: • Personal Area Network (PAN) • Local Area Network (LAN) • Wide Area Network (WAN)Understand that networks can be wired or wireless.Discuss the advantages and disadvantages of wireless networks as opposed to wired networks.Describe the following common LAN topologies: • star • busUnderstand the need for, and importance of, network securityExplain the following methods of network security: • authentication • encryption • firewall • MAC address filtering

Page 18: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks

The advantages of computer networks include:

A computer network is:

About networks

The disadvantages of networks computer include:

Page 19: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks

Types of networks

Representation of a Local Area Network (LAN): Representation of a Wide Area Network (WAN):

Description of a local area network: Description of a wide area network:

Computers that are not connected to a network are called stand-alone computers.

Page 20: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks

Types of networks

A Personal Area Network (PAN) is:

The most common technology used in a wireless PAN is:

The major limitation with this technology is:

Page 21: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks

Hardware for a local area network

Page 22: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks

Advantages and disadvantages of wired versus wireless connection

Green indicates advantages, red indicates disadvantages.

Advantages: Advantages:

Disadvantages: Disadvantages:

Wired networks Wireless networks

Transfer speeds tend to be faster on this type of network.

More secure / easier to secure this type of network.

Connections and connection speeds tend to be more reliable.

Users location is limited by need for a cable connection.

Lots of cables, connections, ports and more physical hardware needed.

Generally less convenient to share files as physical connection required.

Users can access network from anywhere within range.

Far less complicated physically, less disruptive to set up.

Tends to be easier to share files as physical connections not required.

Transfer speeds to be slower on this type of network.Less secure / more steps need to be taken to make sure its secure.

Connection tends to be less reliable and can easily be blocked by walls and other physical infrastructure.

Page 23: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks

Star network topology

Page 24: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks

Bus network topology

Terminator

Server

Printer

Workstation

Page 25: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks

Star vs Bus network topology

Advantages Disadvantages

Star network:

Advantages Disadvantages

Bus network:

Page 26: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks

Wireless networks

Page 27: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks

Network security

Making sure any network is secure is an essential task. Networks by their very nature are much more vulnerable to than a

system. This is because a potential hacker could have the ability to access any device of an unsecure network via a single

of entry.

Once a way into a network has been found the potential implications are serious from the installation of causing corruption

and damage through to .

There are many goals to network security, but they two mains ones are to make sure are able to access everything they need

and on the flip side to prevent to any area of the network.

Various methods and techniques can be used to help increase and maintain a networks security, important ones include using ,

files and data traffic, implementing a robust and strong and setting up

.

Page 28: GCSE 8525 Paper 2 | SLR4 Cyber security Year 12 ICT

GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks

Methods of network security

Authentication Firewall

Encryption MAC address filtering

[picture here]

When it would be used:

[picture here]

When it would be used:

[picture here]

When it would be used:

[picture here]

When it would be used: