100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Summary

Summary AQA GCSE Computer Science Revision Notes - 3.6 Cyber Security

Rating
-
Sold
-
Pages
18
Uploaded on
28-12-2023
Written in
2023/2024

Detailed revision notes for section 3.6 (Cyber Security) of the AQA GCSE Computer Science (8525) syllabus. Contains icons, images and interesting facts and figures so you don't get bored! Contents: - 3.6.1 Fundamentals of cyber security - 3.6.2 Cyber security threats - 3.6.2.1 Social engineering - 3.6.2.2 Malware - 3.6.3 Methods to detect and prevent cyber security threats

Show more Read less
Institution
GCSE










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Document information

Uploaded on
December 28, 2023
File latest updated on
December 28, 2023
Number of pages
18
Written in
2023/2024
Type
Summary

Subjects

Content preview

3.6.1 Fundamentals of cyber
security
What is cyber security?
Purposes of cyber security
What is a cyber crime?
Facts and Figures
Top 5 Cyber Crimes this year




What is cyber security?

Cyber security consists of the processes, practices and
technologies designed to protect networks, computers, programs
and data from attack, damage or unauthorised access.



Purposes of cyber security
Protect networks and computers from attack, damage or unauthorised access

Protect programs and data from attack, damage or unauthorised access



3.6.1 Fundamentals of cyber security 1

, What is a cyber crime?

A cyber crime refers to any illegal activity carried out using
computers or the internet, such as planting viruses, acquiring and
using personal or confidential data and disrupting a website or
service.



Facts and Figures
$6 trillion - the damage that cybercrime caused in 2022 (greater than all drug
markets combined)

The vast majority (74%) of botnet attacks target the financial sector

33 billion accounts will be be breached in 2023

The number of ransomware attacks increased by 350% in 2018

97.2% of malware that was blocked in 2018 was targeted at PCs and laptops
running Microsoft Windows

70% of cryptocurrency transactions are used for illegal activity




Top 5 Cyber Crimes this year
Phishing Scams

Pharming Scams

Ransomware

Malware

IOT Hacking




3.6.1 Fundamentals of cyber security 2

, 3.6.2 Cyber security threats
Types of cyber security threats
Threats and Prevention Methods
Removable Media
Weak and Default Passwords
Misconfigured Access Rights
Unpatched or outdated software
Penetration Testing
What is penetration testing?
Goals of penetration testing
Types of attacks
Two types of penetration testing




Types of cyber security threats
Social engineering techniques

Malicious code (malware)

Pharming

Weak and default passwords

Misconfigured access rights

Removable media



3.6.2 Cyber security threats 1
£4.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
zilofone

Get to know the seller

Seller avatar
zilofone
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
2 year
Number of followers
0
Documents
3
Last sold
8 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions