5.3 Cyber Security
5.3 Cyber Security
There are certain signs a user can look out for to see if they have become a victim of a DDoS attack:
» slow network performance (opening files or accessing certain websites)
» inability to access certain websites
» large amounts of spam email reaching the user’s email account.
Hacking
• Hacking is generally the act of gaining illegal access to a computer system without the user’s permission.
• This can lead to identity theft or the gaining of personal information; data can be deleted, passed on,
changed or corrupted.
• Hacking can be prevented through the use of firewalls, user names and frequently changed strong
passwords. Anti-hacking software and intrusion-detection software also exists in the fight against hacking.
• However, universities and companies now run courses in ethical hacking. This occurs when companies
authorise paid hackers to check out their security measures and test how robust their computer systems
are to hacking attacks.
Malware
• Malware is one of the biggest risks to the integrity and security of data on a computer system.
There are many forms of malware;
Phishing
• Phishing occurs when a cybercriminal sends out legitimate-looking emails to users. The emails may contain
links or attachments that, when initiated, take the user to a fake website; or they may trick the user into
responding with personal data (for example, bank account details or credit/debit card details).
• The email usually appears to be genuine coming from a known bank or service provider
There are numerous ways to help prevent phishing attacks:
» users need to be aware of new phishing scams; those people in industry or commerce should undergo
frequent security awareness training to become aware of how to identify phishing (and pharming) scams
» it is important not to click on any emails links unless totally certain that it is safe to do so; fake emails can
often be identified by ‘Dear Customer ……’ or ‘Dear email [email protected] ………’ and so on
» it is important to run anti-phishing toolbars on browsers (this includes tablets and mobile phones) since
these will alert the user to malicious websites contained in an email
» always look out for https or the green padlock symbol in the address bar
» regular checks of online accounts are also advisable as well as maintaining passwords on a regular basis
» ensure an up-to-date browser is running on the computer device (which contains all of the latest security
upgrades) and run a good firewall in the background at all times
» be very wary of pop-ups and use the browser to block them
• Note: another term connected to phishing is spear phishing; this is where the cybercriminal targets specific
individuals or companies to gain access to sensitive financial information, regular phishing is not specific
regarding who the victims are.
Pharming
• Pharming is malicious code installed on a user’s computer or on an infected website.
• The code redirects the user’s browser to a fake website without the user’s knowledge.
• Unlike phishing, the user doesn’t actually need to take any action for it to be initiated. The creator of the
malicious code can gain personal data, such as bank details, from the user.
• Often the website appears to come from a trusted source and can lead to fraud and identity theft.
It is possible to mitigate against the risk of pharming:
» Use of anti-virus software can detect unauthorised alterations to a website address and warn the user of
the potential risks.
» However, if the DNS server itself has been infected (rather than the user’s computer) it is much more
difficult to mitigate the risk.
» Many modern browsers can alert users to pharming and phishing attacks.
» It is very important to check the spelling of websites to ensure the web address used is correct.
» As with phishing, use of https or the green padlock symbol in the address bar is an additional form of
defence.
Social engineering
• Social engineering occurs when a cybercriminal creates a social situation that can lead to a potential
victim dropping their guard.
• It involves the manipulation of people into breaking their normal security procedures and not following
best practice. There are five types of threat that commonly exist: