Cybersecurity Examples in CS Thinking

Start with the recap, study the fully worked examples, then use the practice problems to check your understanding of Cybersecurity.

This page combines explanation, solved examples, and follow-up practice so you can move from recognition to confident problem-solving in CS Thinking.

Concept Recap

The practice of protecting computing systems, networks, and data from unauthorized access, attacks, and damage.

Cybersecurity is like locking your doors and windows โ€” but for your digital life. It's about keeping the bad guys out of your systems and data.

Read the full concept explanation โ†’

How to Use These Examples

  • Read the first worked example with the solution open so the structure is clear.
  • Try the practice problems before revealing each solution.
  • Use the related concepts and background knowledge badges if you feel stuck.

What to Focus On

Core idea: Security involves three goals: confidentiality (only authorized access), integrity (data isn't tampered with), and availability (systems stay running).

Common stuck point: No system is 100% secure. Cybersecurity is about managing risk, not eliminating it completely.

Worked Examples

Example 1

easy
Name three common cyber threats and describe how each works.

Solution

  1. 1
    Step 1: Malware โ€” malicious software (viruses, worms, ransomware) that damages systems or steals data. Often spreads through infected downloads or email attachments.
  2. 2
    Step 2: Phishing โ€” fake emails or websites that trick users into revealing passwords or personal information by impersonating trusted organisations.
  3. 3
    Step 3: Brute force attack โ€” an attacker tries every possible password combination until finding the correct one. Strong, long passwords make this impractical.

Answer

Malware (malicious software), Phishing (fake communications), Brute force (password guessing). Each exploits different vulnerabilities.
Understanding threats is the first step in cybersecurity. Many attacks exploit human behaviour (phishing) rather than technical vulnerabilities, making user awareness essential.

Example 2

medium
Explain three methods of protecting against cyber attacks: encryption, authentication, and firewalls.

Practice Problems

Try these problems on your own first, then open the solution to compare your method.

Example 1

medium
Explain what social engineering is and give two examples. Why is it effective even against systems with strong technical security?

Example 2

hard
A company suffers a data breach exposing customer emails and hashed passwords. Explain why hashing passwords (rather than storing them in plain text) limits the damage. What is the difference between hashing and encryption?

Related Concepts

Background Knowledge

These ideas may be useful before you work through the harder examples.

networkprotocol