Admin Panel AccessUser ManagementSystem SettingsExport DatabaseDownload BackupUser Credentials ListAPI Keys ManagementAccess TokensEnvironment ConfigConfiguration FileWordPress AdminWordPress LoginphpMyAdminJoomla AdminEnvironment FileGit ConfigDatabase BackupDebug InterfaceTest EndpointInternal API
LearnlyAILibraryPodcasts
DashboardMy ShelfAll NotesAI ChatCreate AI NoteEssay AssistantAI PresentationTo-DoCalendar
Courses

Log in to view your courses

Referral & Rewards
Revision Notes
AS-Level
Cambridge International Examinations
Computer Science
6. Security, Privacy & Data Integrity
Threats
AI Assistant

Threats to Data Security

Summary

Digital threats encompass a wide range of malicious activities designed to compromise the confidentiality, integrity, and availability of data. These threats range from direct technical exploits like hacking and malware to psychological manipulation known as social engineering, requiring a multi-layered approach to defense that combines technical safeguards with user education.

1. Definition & Core Concepts

  • Threats are potential causes of an unwanted incident, which may result in harm to a system or organization. In computer science, these are typically categorized by their method of delivery and their intended impact on data.

  • Cybercriminals are individuals or groups who conduct illegal activities online, such as stealing sensitive information, gaining unauthorized control of systems, or causing large-scale disruption.

  • Vulnerabilities are weaknesses in a system that threats exploit. Common examples include unpatched software, which lacks the latest security fixes, and weak passwords that are easily guessed or cracked by automated tools.

2. Hacking & Unauthorized Access

  • Hacking is the act of gaining unauthorized access to a computer system or network. While not always malicious, in a security context, it usually involves exploiting technical flaws to bypass security barriers.

  • Motivations for Hacking: Attackers may seek to steal sensitive personal or financial data, gain administrative control over systems to use them for further attacks, or simply cause damage to an organization's reputation.

  • Prevention Mechanisms: Effective defense against hacking includes the use of Firewalls to filter network traffic, Two-Factor Authentication (2FA) to verify user identity, and maintaining a rigorous schedule for software updates to close known security holes.

3. Social Engineering: Phishing & Pharming

UserDNS ServerReal SiteFake SiteAttackerPhishing EmailDNS PoisoningRedirection

Diagram comparing Phishing (direct lure via email) and Pharming (indirect redirection via DNS poisoning).

4. Malware: Malicious Software Categories

5. Key Distinctions

6. Prevention & Mitigation Strategies

7. Exam Strategy & Tips

  • Social Engineering refers to the psychological manipulation of people into performing actions or divulging confidential information. It exploits human error rather than technical software flaws.

  • Phishing: This involves sending fraudulent communications (usually emails) that appear to be from a reputable source. The goal is to coax the user into clicking a malicious link or providing login credentials on a fake interface.

  • Pharming: A more technical form of social engineering where an attacker redirects a user to a fraudulent website even if the user types the correct URL. This is achieved by altering DNS (Domain Name System) settings or poisoning the local host file.

  • Key Differences: Phishing requires the user to take a specific action based on a message, whereas Pharming can happen silently in the background of a web session.

  • Malware is a broad term for any software created with malicious intent to cause harm, steal data, or disrupt system operations. It is often delivered via illegitimate downloads or infected attachments.

  • Computer Virus: A program that can replicate itself by attaching to other files. It is designed to spread across systems and perform unwanted actions like corrupting or deleting data.

  • Trojan Horse: A type of malware that disguises itself as legitimate or useful software. Unlike viruses, Trojans do not replicate; they rely on users being tricked into installing them to open a 'backdoor' for attackers.

  • Spyware: Software that secretly monitors and records user activity. It can capture keystrokes (keylogging), record screens, and access sensitive files to send them to a third party.

Feature Phishing Pharming Hacking
Primary Vector Fraudulent Communication Infrastructure Redirection Technical Exploitation
User Interaction High (Must click/respond) Low (Automatic redirection) Variable (Often silent)
Target Human Psychology Network Configuration System Vulnerabilities
Prevention Staff Training/Filters DNS Security/URL Checks Firewalls/Patching
  • Technical Controls: Installing and regularly updating anti-malware software is critical for detecting known threat signatures. Firewalls act as a barrier to block unauthorized incoming traffic.

  • Administrative Controls: User education is the most effective defense against social engineering. Training staff to recognize suspicious URLs and verify email senders can prevent most phishing attacks.

  • System Hygiene: Keeping all software up to date with security patches ensures that hackers cannot exploit known bugs. Implementing User Access Levels ensures that even if one account is compromised, the damage is contained.

  • Identify the Trigger: In exam scenarios, if the attack starts with an email or message, it is almost certainly Phishing. If the user types a correct address but ends up on a fake site, it is Pharming.

  • Replication vs. Disguise: Always distinguish between a Virus (which replicates and spreads) and a Trojan (which hides inside something else but does not self-replicate).

  • Check the Impact: If the question mentions recording passwords or monitoring habits, the answer is likely Spyware. If it mentions deleting files or crashing the system, look toward Viruses or Hacking.

  • Multi-Layered Defense: When asked for prevention, always provide a mix of technical (e.g., firewalls) and human (e.g., training) solutions for full marks.