Fundamentals of cyber security - AQAExploitation techniques

Computer systems are at risk of intrusion, theft, and deletion. Cybercrime is evolving at the same rate as the technology around us.

Part of Computer ScienceTheoretical knowledge

Exploitation techniques

Social engineering techniques

is manipulating people into handing over confidential information such as a PIN or password. There are several forms:

Blagging

Blagging is when someone makes up a story to gain a person’s interest and uses this to encourage them to give away information about themselves, or even send money.

For example, a person may receive an email that appears to be from a friend telling them that they’re in trouble and asking them to send money.

Computer screen with blagging email open.

Phishing

Similar to blagging, a phishing email will ask a person to send personal details, but pretends to be from a business. They can often look convincing, but may contain spelling errors or that do not match the business's website.

When a person clicks on these links and logs in, it sends their username and password to someone who will use it to access their real accounts. This information might be used to steal a person’s money or identity, or the email may contain .

Banks will never send emails asking for personal information or usernames and passwords. If someone receives an email that they think might be phishing, they should report it to the business the sender is claiming to be.

Computer screen with phishing email open.

Pharming

Pharming is a type of cyberattack that redirects a user from a genuine website to a fake one. The fake website will often look like the genuine one. When a person logs in, it sends their username and password to someone who will use it to access their real accounts.

There are several ways that a pharming cyberattack can redirect traffic from a genuine website to a fake one. One example is if the Domain Name Servers () of the website, which match the website address with the of the webserver, are and the IP address is changed to become the address of the pharming site.

Shouldering

This is the simplest form of taking personal details. Shouldering is looking at someone’s information over their shoulder, for example looking at someone enter their PIN in a shop or at a cashpoint.

A person can prevent this by using their hand to cover the keypad as they type their PIN, or being aware of people around them when typing in PINs. helps protect against shouldering by masking what is typed, showing an asterisk on the screen instead of the symbol that was entered.

  翻译: