TopMyGrade

GCSE/Computer Science/OCR

1.4.1Threats: malware, social engineering (phishing, blagging), brute-force attacks, denial-of-service, data interception, SQL injection

Notes

Network security threats

OCR J277 Paper 1 regularly tests cybersecurity. Expect 4–6 mark "describe" and "explain" questions on specific threats, and evaluation questions on countermeasures. You must know the name, method and impact of each threat.

Malware (malicious software)

TypeMethodEffect
VirusAttaches to legitimate files; spreads when files are shared/openedCorrupts/deletes data; spreads to other systems
WormSelf-replicating; spreads through networks without user actionConsumes bandwidth; can install other malware
Trojan horseDisguised as legitimate softwareCreates back-doors; downloads other malware; allows remote access
RansomwareEncrypts victim's files; demands payment for the decryption keyData loss; financial loss; reputational damage
SpywareRuns silently; records keystrokes (keylogger) or captures dataCredential theft; financial fraud
AdwareDisplays unwanted advertsSlows system; may redirect browser; privacy violation

Social engineering

Manipulating people rather than systems:

  • Phishing: sending fraudulent emails pretending to be from a trusted source (e.g. bank, HMRC) — trick user into revealing credentials or clicking a malicious link.
  • Spear phishing: targeted phishing using personal details to seem more credible.
  • Smishing: phishing via SMS text messages.
  • Vishing: phishing via voice calls (phone).
  • Blagging (pretexting): inventing a scenario to extract information. E.g. calling IT support pretending to be an employee locked out of their account.
  • Shouldering (shoulder surfing): watching someone enter a PIN or password.

Technical attacks

Brute-force attack

  • Automated trial of all possible password combinations until the correct one is found.
  • Effectiveness: depends on password length and complexity. An 8-character password with only lowercase takes seconds; a 16-character mixed-case+symbols password could take centuries.
  • Defences: account lockout after N failed attempts; long, complex passwords.

Denial-of-Service (DoS) and Distributed DoS (DDoS)

  • DoS: overwhelming a server with requests so it cannot respond to legitimate users.
  • DDoS: a coordinated attack from thousands of devices (a botnet of compromised computers) — much harder to block because the traffic comes from many sources.
  • Effect: website/service goes offline; financial loss; reputational damage.

SQL injection

  • A web form accepts user input that is passed directly to a database query without sanitisation.
  • An attacker enters SQL code (e.g. ' OR '1'='1) as input — the database executes it as a command.
  • Effect: bypass login; read, modify or delete database contents; steal user data.
  • Defence: input validation; parameterised queries (prepared statements); least-privilege database access.

Data interception (packet sniffing)

  • Data transmitted over a network can be captured by a third party using a packet sniffer.
  • Particularly effective on unencrypted connections (e.g. HTTP vs HTTPS).
  • Defence: encryption (HTTPS, VPN, TLS); avoid using public Wi-Fi for sensitive operations.

Common OCR exam mistakes

  1. Confusing virus and worm — a virus needs a host file and user action to spread; a worm spreads by itself over networks.
  2. Saying phishing is a technical attack — it is social engineering (it targets people, not systems directly).
  3. Forgetting that SQL injection requires unsanitised input — the vulnerability is in the code, not the database itself.
  4. Not distinguishing DoS (single source) from DDoS (distributed — botnet of many sources).

AI-generated · claude-opus-4-7 · v3-ocr-computer-science

Practice questions

Try each before peeking at the worked solution.

  1. Question 14 marks

    Types of malware

    Describe two types of malware and explain the threat each poses. [4 marks]

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-ocr-computer-science

  2. Question 24 marks

    SQL injection

    Explain how an SQL injection attack works and how it can be prevented. [4 marks]

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-ocr-computer-science

  3. Question 34 marks

    DoS vs DDoS

    Explain the difference between a DoS attack and a DDoS attack. [4 marks]

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-ocr-computer-science

  4. Question 43 marks

    Social engineering vs technical attack

    Give one example of a social engineering attack and explain why it is harder to defend against than a technical attack. [3 marks]

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-ocr-computer-science

Flashcards

1.4.1 — Threats: malware, social engineering (phishing, blagging), brute-force attacks, denial-of-service, data interception, SQL injection

10-card SR deck for OCR Computer Science (J277) topic 1.4.1

10 cards · spaced repetition (SM-2)