Show understanding of the threats to computer and data security posed by networks and the internet
6.1 Data Security
Why Data Security Matters
Data is like the treasure in a video game. If you lose it, you lose progress, reputation, and sometimes even your future. On the internet, this treasure is constantly at risk from thieves, bugs, and bad actors. Understanding the threats helps you protect your digital world. 🔒
Common Threats on Networks and the Internet
- 🕵️♂️ Phishing – fake emails that trick you into giving away passwords.
- 💻 Malware – software that secretly steals or damages data.
- 🌐 Man‑in‑the‑Middle (MitM) – an attacker intercepts data between you and the server.
- 🔓 Unencrypted Transmission – data sent in plain text can be read by anyone on the same network.
- 🚫 Denial of Service (DoS) – flooding a service so legitimate users can’t access it.
- 🛠️ Zero‑Day Exploits – unknown software bugs that attackers use before a patch is released.
How Attacks Work (Analogy)
Imagine your computer is a house.
- Phishing is like a fake key‑tapper who convinces you to hand over your house key.
- Malware is a burglar who hides inside the house and steals valuables.
- MitM is a sneaky neighbour who copies every letter you send.
- Unencrypted traffic is like shouting your secrets in a crowded square.
Encryption Basics
Encryption is the lock on your digital door. The formula is simple: Encrypted data = Encrypt(plain text, key) or $C = E(P, K)$. The key is like a secret password that only you and the intended receiver know. Without the key, the data looks like gibberish. 🔑
Preventing Attacks – Best Practices
- 🔐 Use Strong Passwords – mix letters, numbers, and symbols. Avoid common words.
- 📧 Verify Email Sources – check the sender’s address and look for spelling mistakes.
- 🛡️ Keep Software Updated – install patches that fix security holes.
- 🔒 Use HTTPS – ensure the lock icon appears in the browser when visiting websites.
- 🗝️ Enable Two‑Factor Authentication (2FA) – add an extra lock on your accounts.
- 🚫 Beware of Public Wi‑Fi – use a VPN or avoid sensitive transactions on open networks.
Real‑World Example: The WannaCry Attack
In 2017, WannaCry spread like a wildfire across hospitals and businesses worldwide. It exploited a Windows vulnerability (a zero‑day) and demanded ransom. The lesson? Regular updates and backups can stop a disaster. 🌍💥
Summary Table – Threat vs. Prevention
| Threat | Prevention |
|---|---|
| Phishing | Verify sender, use spam filters, avoid clicking unknown links. |
| Malware | Install reputable antivirus, keep OS updated, avoid suspicious downloads. |
| MitM | Use HTTPS, VPN on public Wi‑Fi, avoid open networks for sensitive data. |
| Unencrypted Transmission | Enable TLS/SSL, use secure protocols (SFTP, SSH). |
| DoS | Use firewalls, rate limiting, and content delivery networks (CDNs). |
Takeaway
Think of data security as a fortress. Every wall, gate, and guard is a practice you can adopt today. By staying informed, updating regularly, and using strong passwords, you keep the digital treasure safe from the many threats that roam the internet. 🌐🛡️
Revision
Log in to practice.