Computer Science (2210)
Topic 4 of 10Cambridge O Levels

Cybersecurity

Understanding digital threats and the methods to secure computer systems and data.

What You'll Learn
Malware types: virus, worm, trojan, ransomware, spywarePhishing uses fake emails/sites to steal personal infoProtection: firewalls, encryption, strong passwords, 2FA,…Encryption scrambles data — only authorized users can dec…

Introduction to Cybersecurity


Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks, theft, and damage. As our daily activities, from banking and communication to education and entertainment, increasingly rely on digital infrastructure, understanding these threats and how to mitigate them is essential for everyone.


Section 1: Types of Threats and Attacks


Cyber threats are actions intended to disrupt, damage, or gain unauthorized access to a computer system. They can be broadly categorized into malware, social engineering, and direct attacks on network infrastructure.


#### 1.1 Malware (Malicious Software)

Malware is an umbrella term for any software intentionally designed to cause harm to a computer, server, client, or network. It is crucial to understand the distinctions between different types:


  • Virus: A piece of malicious code that attaches itself to a legitimate program or file. It requires human action (like opening the infected file) to spread. Once active, it can replicate and infect other files on the system.
  • Worm: A standalone malware program that replicates itself to spread to other computers. Unlike a virus, it does not need to attach to a program and can spread automatically through a network, exploiting vulnerabilities.
  • Trojan Horse: Malware disguised as legitimate software. A user is tricked into installing it, thinking it's a useful application (e.g., a game or utility). Once installed, it creates a 'backdoor' for attackers to access the system, steal data, or install other malware.
  • Ransomware: A type of malware that encrypts the victim's files, making them inaccessible. The attacker then demands a ransom payment, often in cryptocurrency, in exchange for the decryption key.
  • Spyware: Malware that secretly observes the user's computer activities without their consent and reports this data to the software's author. A common type is a **keylogger**, which records every keystroke made by the user, capturing passwords and other sensitive information.

#### 1.2 Social Engineering and Deception

Social engineering is the art of manipulating people into performing actions or divulging confidential information.


  • Phishing: The most common form, where attackers send fraudulent emails or messages that appear to be from a reputable source (e.g., a bank or a service like Netflix). These messages aim to trick the recipient into clicking a malicious link and entering personal information like passwords or credit card details on a fake website. A classic Pakistani example involves SMS messages pretending to be from a bank, asking for an OTP (One-Time Password) to 'verify' an account.
  • Pharming: A more technical attack where a user is redirected to a fraudulent website even if they type the correct URL. This is achieved by compromising the Domain Name System (DNS) server or the user's own computer, making it difficult to spot.

#### 1.3 Direct Attacks

These attacks target the technical vulnerabilities of systems and networks.


  • Brute-force Attack: A trial-and-error method used to guess login credentials. The attacker systematically tries all possible combinations of characters until the correct password is found. A **dictionary attack** is a more refined version that uses a list of common words and phrases.
  • Denial-of-Service (DoS) Attack: An attempt to make an online service unavailable to its intended users. This is done by overwhelming the target server with a flood of internet traffic or requests. A **Distributed Denial-of-Service (DDoS)** attack is a larger-scale version where the attack traffic comes from many different sources (often a network of infected computers called a **botnet**), making it much harder to block.
  • SQL Injection: A code injection technique used to attack data-driven applications. Malicious SQL statements are inserted into an entry field (like a search bar or login form) for execution. If successful, this can allow an attacker to view, modify, or delete data from the database that they would not normally be able to access.
  • Data Interception and Theft (Man-in-the-Middle): An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. This is a major risk on unsecured public Wi-Fi networks.

Section 2: Methods of Protection


Protecting against these threats requires a layered approach, combining technology and user awareness.


  • Authentication: The process of verifying a user's identity. This is the first line of defense.
  • Passwords: The most common method. Strong passwords are long, complex, and unique.
  • Two-Factor Authentication (2FA): A more secure method that requires two different types of proof of identity (e.g., a password and a code sent to your phone).
  • Firewall: A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network (like the internet).
  • Proxy Server: An intermediary server that separates end users from the websites they browse. It can be used to hide the user's IP address, bypass content filters, or log traffic for security analysis.
  • Encryption: The process of converting data into a code (ciphertext) to prevent unauthorized access. Only authorized parties can decipher it with a key.
  • SSL/TLS (Secure Sockets Layer/Transport Layer Security): These are cryptographic protocols that provide secure communication over a computer network. You can identify a secure website by the `https` in the URL and the padlock icon in the browser's address bar. This is crucial for online banking and e-commerce in Pakistan.
  • Anti-malware Software (Antivirus): A program designed to prevent, detect, and remove malware infections on individual computing devices. It works by scanning files against a database of known malware signatures and using heuristic analysis to identify suspicious behavior from new, unknown malware.

Common Exam Trap: Do not confuse a firewall with an antivirus program. A firewall prevents unauthorized *access* to a network by filtering traffic, while an antivirus detects and removes malicious *software* that is already on a device.

Key Points to Remember

  • 1Malware types: virus, worm, trojan, ransomware, spyware
  • 2Phishing uses fake emails/sites to steal personal info
  • 3Protection: firewalls, encryption, strong passwords, 2FA, backups
  • 4Encryption scrambles data — only authorized users can decrypt it

Pakistan Example

Online Banking Safety in Pakistan

With HBL, Meezan, and other banks offering online banking, cybersecurity is critical. In 2018, almost all Pakistani banks were hit by a data breach — thousands of credit card details were leaked. How to protect yourself: Use 2FA (the OTP that HBL sends to your phone is the second factor). Never click links in SMS saying 'your account is blocked' — that's phishing. Use unique passwords for each bank app. Enable transaction alerts so you know immediately if someone uses your card. The bank encrypts your data using HTTPS, but YOU are often the weakest link in security!

Quick Revision Infographic

Computer Science — Quick Revision

Cybersecurity

Key Concepts

1Malware types: virus, worm, trojan, ransomware, spyware
2Phishing uses fake emails/sites to steal personal info
3Protection: firewalls, encryption, strong passwords, 2FA, backups
4Encryption scrambles data — only authorized users can decrypt it

Formulas to Know

hishing uses fake emails/sites to steal personal info
Pakistan Example

Online Banking Safety in Pakistan

With HBL, Meezan, and other banks offering online banking, cybersecurity is critical. In 2018, almost all Pakistani banks were hit by a data breach — thousands of credit card details were leaked. How to protect yourself: Use 2FA (the OTP that HBL sends to your phone is the second factor). Never click links in SMS saying 'your account is blocked' — that's phishing. Use unique passwords for each bank app. Enable transaction alerts so you know immediately if someone uses your card. The bank encrypts your data using HTTPS, but YOU are often the weakest link in security!

SeekhoAsaan.com — Free RevisionCybersecurity Infographic

Test Your Knowledge!

10 Beginner10 Intermediate10 Advanced
Start 30-Question Quiz