TopMyGrade

Notes

Cyber security

Cyber security is the practice of protecting computer systems, networks and data from digital attacks, unauthorised access and damage. As society depends increasingly on digital infrastructure, cyber security has become one of the most important areas of computing.

Cyber-security threats (CS6.1)

Attackers exploit many different weaknesses:

  • Malicious code (malware) — viruses, worms, Trojans, ransomware, spyware
  • Weak or default passwords — easy to guess or brute-force; default router passwords left unchanged
  • Misconfigured access rights — users given more permissions than they need
  • Removable media — USB drives can introduce malware or exfiltrate data
  • Unpatched software — security vulnerabilities in old software versions that haven't been updated

Social engineering (CS6.2)

Social engineering exploits human psychology rather than technical vulnerabilities — attackers manipulate people into revealing information or performing actions.

Key methods:

  • Phishing — fraudulent emails pretending to be a trusted source, tricking users into entering credentials on a fake website
  • Pharming — redirecting users to a fake website even when they type the correct address (corrupts DNS)
  • Blagging — fabricating a scenario to extract information (e.g. pretending to be IT support)
  • Shoulder surfing — physically observing someone enter a PIN or password

Malware types (CS6.3)

MalwareHow it worksHarm caused
VirusAttaches to a file; spreads when file is sharedCorrupts/deletes files
WormSelf-replicates across networks without user actionConsumes bandwidth; installs payloads
TrojanDisguised as legitimate softwareOpens backdoor; downloads other malware
RansomwareEncrypts victim's files; demands paymentData loss; financial harm
SpywareRuns silently; records keystrokes/activitySteals credentials and personal data

Detection and prevention (CS6.4)

Layered defences:

  • Biometrics — fingerprint/face unlock; hard to fake
  • Strong password policies — minimum length, complexity, regular changes
  • CAPTCHA — distinguishes humans from automated bots
  • Email confirmation — verifies account ownership during registration
  • Automatic software updates — patches known vulnerabilities quickly

Penetration testing (CS6.5)

Penetration testing (pen testing) is authorised simulated attack to find vulnerabilities before real attackers do.

  • White-box testing — tester has full knowledge of the system (architecture, source code). Thorough but may miss "realistic" attacker paths.
  • Black-box testing — tester has no prior knowledge; simulates a genuine external attack. More realistic but may miss internal weaknesses.

Both types help organisations identify and fix security gaps before they are exploited.

Defence in depth

No single measure is sufficient. Good security uses layers:

  1. Physical security (lock server rooms)
  2. Network security (firewalls, encrypted connections)
  3. System security (access rights, patching)
  4. User education (recognise phishing, strong passwords)
  5. Monitoring and incident response (detect attacks quickly)

Why cyber security matters

A successful attack can mean:

  • Financial loss — ransomware payments, fraud, fines (ICO)
  • Reputational damage — loss of customer trust
  • Legal liability — DPA 2018 requires organisations to protect personal data
  • National security risk — attacks on critical infrastructure (power grids, hospitals)

AI-generated · claude-opus-4-7 · v3-deep-computer-science

Practice questions

Try each before peeking at the worked solution.

  1. Question 14 marks

    Types of malware

    Describe the difference between a computer virus and a worm.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  2. Question 24 marks

    Social engineering

    Explain what is meant by phishing and describe how a user can protect themselves from a phishing attack.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  3. Question 34 marks

    Ransomware

    Explain how ransomware attacks a computer system and state two measures that could reduce the impact of a ransomware attack.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  4. Question 44 marks

    Pen testing

    Compare white-box and black-box penetration testing, giving one advantage of each.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  5. Question 53 marks

    Unpatched software risk

    Explain why running unpatched software is a cyber security risk.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  6. Question 63 marks

    Defence in depth

    Explain what is meant by "defence in depth" in cyber security and give two examples of different layers of defence.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

Flashcards

CS6 — Cyber security

12-card SR deck for AQA GCSE Computer Science topic CS6

12 cards · spaced repetition (SM-2)