TGGS Computer Science

📘 Reading Guide: Cyber Security

These slides will help you gather the ideas and vocabulary needed to answer extended-response questions.

As you read, think about:

  • What is happening?
  • Why does it work?
  • How do user choices affect risk?

🦠 What Is Malware?

Malware is software designed to harm a device, steal information, or allow attackers to gain control.

  • Viruses
  • Trojans
  • Spyware
  • Ransomware

✅ Preventing Malware

Malware infections often happen because of user behaviour.

  • Downloading software
  • Opening emails or attachments
  • Clicking links
  • Keeping software up to date

When writing your answer, explain how these behaviours can reduce the chance of infection.

🕵️ Man-in-the-Middle (MITM) Attacks

A man-in-the-middle attack happens when an attacker secretly positions themselves between a user and a service.

The user believes they are communicating directly.

📶 Fake Wi-Fi Hotspots

A common way to carry out a MITM attack is by using a fake Wi-Fi hotspot.

  • The network may look genuine
  • It may use a familiar or trusted name
  • Users connect without realising it is unsafe

🤔 User Choices and Risk

User behaviour affects whether a MITM attack is successful.

  • Which Wi-Fi network is chosen
  • Whether sensitive data is sent
  • If the connection is secure or encrypted

Strong answers link choices to possible consequences.

🔓 Brute Force Attacks

A brute force attack involves repeatedly trying passwords until the correct one is found.

This process is usually automated.

🔢 Password Length

Longer passwords are harder to crack.

  • Passwords should be at least 8 characters
  • Each extra character increases the number of combinations

Think about why this makes brute force attacks less effective.

🔤 Password Complexity

Using a wide range of characters increases password strength.

  • Lowercase letters
  • Uppercase letters
  • Numbers
  • Symbols

When writing, explain how variety increases security.

✍️ Writing Strong Answers

High-quality responses usually:

  • Describe the attack clearly
  • Explain how it works
  • Link user behaviour to risk
  • Explain how protections reduce success