ComputingRevision.net

4.1a Threats: Hacking & Social Engineering

Cybersecurity Threats

This page covers two of the four main categories of cybersecurity threat: hacking and social engineering. To understand malware and denial of service attacks, click here.


What is Hacking?

Hacking is when someone tries to gain access to a computer or data without permission of the owner. This could be by…

  • using sophisticated techniques to find flaws in software, allowing access
  • guessing someone's password
  • using malicious software
  • repeatedly trying different passcodes until the correct one is found (a brute-force attack

Different types of hacker

There are three types of hacker. One is illegal, one is not illegal, and the other…?

Black hat hackers

Black hat hacker

These are the bad guys!

  • They are non-ethical and hack maliciously
  • Make money by selling stolen data or blackmailing the data owner
  • May cause damage for fun or to prove a point
  • They act illegally and can be prosecuted!

White hat hackers

White hat hacker

These are the good guys!

  • They are ethical
  • Hired by the organisation they’re trying to break in to
  • Act professionally and do not cause damage
  • They perform penetration testing, checking a system to see if a malicious hacker could gain access and, if they can, how much damage they could potentially cause
  • They act legally because they have permission from the system owner

Grey hat hackers

Grey hat hacker

These are somewhere between black and white hat hackers

  • They are ethical
  • They will hack into a system without permission, but won't cause any damage or steal data
  • Their motivation is to claim a "bug bounty" for reporting vulnerabilities to the system owner
  • They act illegally and can be prosecuted (but probably won't be)

Social Engineering

Computer systems are usually very well protected against hackers. Often, the easiest way to get into a system is to trick a legitimate user into giving them access. This is called social engineering, and there are lots of sneaky techniques!

Types of Social Engineering

Click a button to reveal information about each technique.

Phishing
Baiting
Pretexting
Quid Pro Quo
Scareware
Shoulder Surfing

Phishing

Phishing

Fake messages (like an email or text) pretending to be a real company to try to trick you into giving personal information.

Example:

  • An email which looks like its from your bank, saying you need to urgently check your account – but the link takes you to a fake website

Baiting

Baiting

Attackers give victims the opportunity to get something for nothing, or for a reward – this is the bait!

Examples:

  • A malware-infected USB stick, labelled “confidential”, is left in a public place. Someone plugs it into their computer and unknowingly installs malware
  • A fake website offers a mod for a game. Users install it, but it really gives the attacker access to their system

Pretexting

Pretexting

A person pretends to be someone they’re not to get private information from you.

They make up a fake story (a pretext) to trick you into trusting them.

Examples:

  • Someone pretends to be from IT support and says they need your password to "fix your account.".
  • A person calls saying they’re from the bank and asks you to "confirm your details".

Quid Pro Quo

Quid Pro Quo

Quid pro quo is when a person offers you something, like help or a reward, but they secretly want information or access in return.

It means "something for something".

Examples:

  • A hacker pretends to be tech support, saying: "I’ll fix your computer if you tell me your login details".
  • A person says they’ll give you exam answers if you send them private files from the school network.

Scareware

Scareware

Scareware is a trick that tries to frighten you into doing something, like downloading a fake program or paying money.

It uses scary messages to make you think your computer is infected, even when it’s not.

Examples:

  • A big red pop-up says: "Your computer has 57 viruses! Click here to fix it!", but the link actually downloads malware
  • A fake website shows a warning that looks like it’s from Windows or antivirus software, asking you to buy or download something to "remove the threat."

Shoulder Surfing

Shoulder Surfing

Looking over someone’s shoulder to see them typing passwords or other sensitive information

More high-tech examples include:

  • Cameras hidden above keypads
  • Card skimmers, which copy your bank card details, placed over cash machine card slots

Quick Quiz

Click the purple circle to select your answer

What kind of hacker is someone who breaks in without permission but claims they are helping?

Black hat
White hat
Grey hat
Red hat