ComputingRevision.net

4.2 Impacts of a Cybersecurity Attack

Some hackers break into or disrupt a system for the fun or challenge, but most have a strong motive for doing it. This section gives an overview of the problems a cyber attack can have on the victim.

Data Destruction

A smashed data icon

A person’s or businesses data is purposely deleted. This could be done manually by a hacker, or automatically by malware.

Why might someone want to do this?

  • To damage a business or organisation by deleting important files.
  • To cover their tracks after stealing or changing data.

Data Theft

A burglar

Data, such as passwords; personal data; or business secrets, are stolen by an attacker.

Why might someone want to do this?

  • To sell or use stolen data for profit.
  • To blackmail or embarrass individuals or companies.

Denial of Service

Bombs targetting a server

A system is overloaded with useless requests, overwhelming it. Legitimate requests cannot be processed, so genuine users cannot use the service.

Why might someone want to do this?

  • To damage a competitor
  • To blackmail a business

An example of blackmail: Pay us or we will take your business offline, which will cost you even more money

Identity Theft

Using fake ID

Someone uses another person’s personal information (e.g. name, address, or bank details) to pretend to be them

Why might someone want to do this?

  • To open bank accounts, buy goods, or commit fraud in the victim’s name.
  • To hide their real identity while committing other crimes.

Data Manipulation

1s and 0s on a mobile

Changing data to mislead others or produce false information.

Why might someone want to do this?

  • To gain money, power, or advantage, such as changing sales figures or exam results.
  • To spread false information to cause confusion or harm reputations.

Data Modification

A smashed data icon

Changing data on a system without the owner’s permission.

Why might someone want to do this?

  • To commit theft or fraud (e.g. changing the amount of money in a bank account).
  • To give themselves further access into a system (e.g. changing passwords or user permissions.

Misconception

Data manipulation and data modification are easily confused. Ensure you can fully describe the differences in an exam!

Data Manipulation

  • Changing data to mislead others or produce false information.
  • Often done with a long-term aim (e.g. changing a company’s figures in a financial report).

Data Modification

  • Changing data on a system without the owner’s permission
  • Often done with a short-term aim (e.g. changing a bank balance to withdraw money from an account).

Quick Quiz

Click the purple circle to select your answer

What impact could a DoS attack have on an online business?

Increased customer trust
Automatic data recovery
Improved website performance
Loss of sales and possible financial hardship