Show understanding of the threats to computer and data security posed by networks and the internet

Resources | Subject Notes | Computer Science

Cambridge A-Level Computer Science 9618 - 6.1 Data Security

Data Security - Threats to Networks and the Internet

Introduction

This section explores the various threats to computer and data security that arise from the use of networks and the internet. Understanding these threats is crucial for implementing effective security measures.

Common Security Threats

Several types of threats can compromise the confidentiality, integrity, and availability of data transmitted over networks and the internet. These threats can be broadly categorized as follows:

  • Malware
  • Network Attacks
  • Social Engineering
  • Data Breaches
  • Denial of Service (DoS) Attacks

Malware

Malware is a broad term encompassing malicious software designed to harm computer systems. Common types of malware include:

  • Viruses: Self-replicating code that attaches to other files.
  • Worms: Self-replicating programs that spread across networks.
  • Trojans: Disguise themselves as legitimate software to trick users into installing them.
  • Ransomware: Encrypts a victim's files and demands a ransom for their decryption.
  • Spyware: Collects information about a user's activities without their knowledge.
  • Adware: Displays unwanted advertisements.

Network Attacks

Network attacks involve exploiting vulnerabilities in network protocols and devices to gain unauthorized access or disrupt network operations. Examples include:

  • Man-in-the-Middle (MitM) Attacks: An attacker intercepts communication between two parties.
  • Spoofing: Disguising a packet's source address to impersonate another device.
  • Session Hijacking: Taking over an active network session.
  • Packet Sniffing: Capturing and analyzing network packets.
  • SQL Injection: Exploiting vulnerabilities in database queries.

Social Engineering

Social engineering relies on manipulating human psychology to gain access to systems or information. Common techniques include:

  • Phishing: Deceptive emails or websites designed to steal credentials.
  • Pretexting: Creating a false scenario to trick victims into revealing information.
  • Baiting: Offering something enticing (e.g., a USB drive) to lure victims into a trap.
  • Quid Pro Quo: Offering a service in exchange for information.

Data Breaches

Data breaches occur when sensitive information is accessed or disclosed without authorization. These can result from various factors, including:

  • Weak passwords
  • Unsecured databases
  • Insider threats
  • Physical theft of devices containing data

Denial of Service (DoS) Attacks

DoS attacks aim to make a network resource unavailable to legitimate users by overwhelming it with traffic. Types of DoS attacks include:

  • Volumetric Attacks: Flooding the target with large amounts of traffic.
  • Protocol Attacks: Exploiting weaknesses in network protocols.
  • Application Layer Attacks: Targeting specific applications on the server.

Protecting Against Threats

Various security measures can be implemented to mitigate these threats:

Threat Mitigation Techniques
Malware Antivirus software, firewalls, regular software updates, user awareness training.
Network Attacks Firewalls, intrusion detection/prevention systems (IDS/IPS), strong authentication, encryption (e.g., HTTPS).
Social Engineering User awareness training, multi-factor authentication, strong password policies.
Data Breaches Data encryption, access controls, data loss prevention (DLP) systems, regular backups.
DoS Attacks Rate limiting, traffic filtering, content delivery networks (CDNs).

Conclusion

Protecting computer and data security in the age of networks and the internet requires a multi-layered approach. Understanding the common threats and implementing appropriate security measures are essential for safeguarding valuable information.