TopMyGrade

GCSE/Computer Science/AQA

CS6.1Cyber-security threats: malicious code, weak/default passwords, misconfigured access rights, removable media, unpatched software

Notes

Cyber-security threats

A threat is anything that could harm a system or its data. AQA's GCSE focuses on a handful of common technical threats that cause most real incidents: malicious code, weak/default passwords, misconfigured access rights, removable media and unpatched / out-of-date software.

1. Malicious code (malware)

Software designed to harm or exploit a system. Detailed in CS6.3, but headline categories:

  • Viruses — attach to files; spread when files run.
  • Worms — self-spreading across networks.
  • Trojans — disguised as legitimate software.
  • Spyware — silently collects information.
  • Ransomware — encrypts files and demands payment.

How attackers introduce malware: phishing emails, infected websites, USB drops, malicious downloads.

2. Weak and default passwords

The single most common vulnerability. Attackers exploit:

  • Default passwords — devices shipped with "admin / admin" that are never changed.
  • Common passwords — "123456", "password", names, dates of birth.
  • Reused passwords — same password across many sites; one breach compromises all.

Defences: long unique passphrases, password managers, 2FA, force change of defaults.

3. Misconfigured access rights

Users or processes given more permissions than they need. If their account is compromised, the attacker inherits all those permissions.

Examples:

  • Every user in an admin group "for convenience".
  • A web service running as the all-powerful root/admin account.
  • Files left world-readable in cloud storage.

Defence: principle of least privilege — grant only what's needed for the job, nothing more. Audit regularly.

4. Removable media

USB sticks, external drives and DVDs can carry malware between systems. Even an air-gapped machine can be infected by an infected USB drive (Stuxnet famously did this in 2010).

Risks:

  • USB sticks plugged in by curious staff who found one in the car park.
  • Personal USBs carrying files between home and work, possibly infected at home.
  • Loss of a USB containing sensitive data.

Defences: ban or restrict removable media, scan all media on insertion, encrypt removable storage, use secure file-sharing platforms instead.

5. Unpatched software

Software has bugs; attackers exploit known bugs to break in. Patches fix these — but only if installed.

Examples:

  • A web server running an old library with a known vulnerability.
  • A user ignoring browser updates.
  • An unpatched router with a public exploit.

Defences: enable automatic updates, retire unsupported systems, monitor vulnerability advisories.

Threats vs vulnerabilities vs attacks

  • Vulnerability — a weakness (e.g. weak password).
  • Threat — a potential bad event (e.g. attacker guesses password).
  • Attack — an actual attempt to exploit (e.g. brute-force login).

A vulnerability without a threat is unexploited; a threat without a vulnerability is harmless.

Worked exampleWorked example — assess a system

A small charity uses:

  • Wi-Fi with WPA2 and password "Charity2020".
  • All staff have admin rights on their PCs.
  • Volunteers bring USB sticks from home.
  • Computers running Windows 7.

List threats:

  • Weak password ("Charity2020" — guessable).
  • Misconfigured access rights — all staff admin (over-privileged).
  • Removable media — uncontrolled USBs.
  • Unpatched software — Windows 7 unsupported since 2020.

Recommendations: stronger Wi-Fi password / certificate-based auth; remove admin rights; block USBs or scan them; upgrade OS.

Common mistakesPitfalls

  1. Treating all malware as "viruses". Worms, trojans and ransomware are different.
  2. Saying "we use HTTPS" as full defence. HTTPS doesn't protect against weak passwords or unpatched servers.
  3. Forgetting people. Phishing, social engineering and insider threats need user education.
  4. Treating "no breach so far" as "secure". Many breaches go undetected for months.
  5. Patching only one system. A network is as weak as its weakest device.

Try thisQuick check

Identify the threat category for each:

  • Pupils share a teacher's password: weak password / misconfigured access rights.
  • Office worker plugs in a found USB: removable media (and possibly malware).
  • Webmail running on a 5-year-old unpatched server: unpatched software.
  • An old worm spreading through unpatched PCs: malware (worm) and unpatched software.

AI-generated · claude-opus-4-7 · v3-deep-computer-science

Practice questions

Try each before peeking at the worked solution.

  1. Question 15 marks

    Five threat categories

    State five common cyber-security threats AQA expects you to know.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  2. Question 24 marks

    Default password risk

    Explain why default passwords on networked devices are a major security risk.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  3. Question 33 marks

    Misconfigured access rights

    Explain what is meant by misconfigured access rights and the principle that defends against it.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  4. Question 42 marks

    Removable media risks

    Give two ways removable media can pose a security risk.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  5. Question 53 marks

    Why update?

    Explain why software updates / patches are important for security.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  6. Question 63 marks

    Threat vs vulnerability

    State the difference between a vulnerability and a threat.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  7. Question 74 marks

    Assess and recommend

    A small business has staff using personal USBs at work, default Wi-Fi password "admin", and unpatched Windows 7 PCs. Identify two threats and recommend a defence for each.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

Flashcards

CS6.1 — Cyber-security threats

12-card SR deck for AQA GCSE Computer Science topic CS6.1

12 cards · spaced repetition (SM-2)