Hacking techniques exploit weaknesses such as outdated software, weak passwords, or badly configured networks to access data. Attackers often use automated tools and scripts, making prevention reliant on strengthening system defences.
Phishing methods deceive users through fake messages that imitate legitimate organisations. These messages often create urgency or fear to trick users into revealing sensitive information through fraudulent links or forms.
Pharming attacks redirect users from legitimate websites to fake ones by tampering with browser or DNS settings. This makes verification of web addresses and secure connections essential for preventing credential theft.
Smishing and vishing techniques extend phishing to SMS and voice calls, using crafted messages or impersonated calls to trick victims. These methods exploit trust and real-time communication, requiring users to verify identities before sharing information.
Malware deployment involves embedding harmful software into attachments, fake apps, or compromised websites. Each type—virus, trojan, spyware—operates differently, but all aim to infiltrate devices and harvest or damage data.
| Feature | Hacking | Phishing | Malware | Pharming |
|---|---|---|---|---|
| Primary method | Technical exploitation | Social manipulation | Malicious software | Redirecting websites |
| User interaction required | Usually low | High | Medium | Low |
| Main target | Systems & networks | Personal information | Device integrity | Login credentials |
| Prevention focus | Hardening systems | Training users | Protective software | Checking secure URLs |
Active vs. passive threats differentiate whether the attacker directly manipulates systems or simply observes. Spyware and keylogging are passive in nature, silently collecting information, whereas viruses and trojans actively disrupt systems.
Social engineering vs. technical exploitation distinguishes attacks based on their primary entry point. Social engineering preys on human error, while technical exploitation targets system vulnerabilities, requiring different prevention strategies.
Identify the attack vector by looking for clues about whether the threat targets humans or technology. Exam questions often embed these hints in scenarios, and recognizing them helps in choosing the correct threat category.
Look for specific symptoms such as redirected websites, fake messages, or system slowdowns. Linking symptoms to threat types is a common exam task and helps in giving precise answers.
Match the prevention method correctly by pairing security solutions with threats they best mitigate. For example, firewalls address external intrusions, while anti-malware tools protect against malicious software.
Use terminology precisely such as 'unauthorised access', 'identity theft', or 'malicious redirection'. Formal vocabulary is expected in exam responses and improves clarity and accuracy.
Confusing phishing with pharming is common because both aim to steal credentials. The key difference is that phishing relies on fake communication, while pharming uses website redirection, and mixing them up leads to incorrect explanations.
Assuming all malware behaves the same leads to vague or incorrect answers. Each type—virus, trojan, spyware—has distinct behaviours, and mixing them weakens technical accuracy in responses.
Believing strong passwords alone stop hacking oversimplifies security. Passwords help, but hacking often exploits unpatched software or misconfigured systems, so answers must show understanding of multi-layered defence.
Overlooking human error leads to incomplete solutions. Many threats succeed because of user actions, so prevention strategies must include user education, not just technical tools.
Data protection practices such as encryption and authentication directly mitigate the risks posed by data threats. Understanding threats helps explain why these protective methods are necessary and how they are applied in real systems.
Cybersecurity policies build on knowledge of threat behaviour to create protocols such as password requirements, network monitoring, and software update schedules. These policies translate theory into organisational practice.
Emerging threats evolve from the same fundamental principles but use more advanced technologies such as AI-driven phishing or automated malware. Recognising core concepts helps students adapt to evolving cybersecurity landscapes.