Cybersecurity CS Thinking Example 1
Follow the full solution, then compare it with the other examples linked below.
Example 1
easyName three common cyber threats and describe how each works.
Solution
- 1 Step 1: Malware โ malicious software (viruses, worms, ransomware) that damages systems or steals data. Often spreads through infected downloads or email attachments.
- 2 Step 2: Phishing โ fake emails or websites that trick users into revealing passwords or personal information by impersonating trusted organisations.
- 3 Step 3: Brute force attack โ an attacker tries every possible password combination until finding the correct one. Strong, long passwords make this impractical.
Answer
Malware (malicious software), Phishing (fake communications), Brute force (password guessing). Each exploits different vulnerabilities.
Understanding threats is the first step in cybersecurity. Many attacks exploit human behaviour (phishing) rather than technical vulnerabilities, making user awareness essential.
About Cybersecurity
The practice of protecting computing systems, networks, and data from unauthorized access, attacks, and damage. Cybersecurity encompasses three core goals: confidentiality (only authorized users can access data), integrity (data is not tampered with), and availability (systems remain operational).
Learn more about Cybersecurity โMore Cybersecurity Examples
Example 2 medium
Explain three methods of protecting against cyber attacks: encryption, authentication, and firewalls
Example 3 mediumExplain what social engineering is and give two examples. Why is it effective even against systems w
Example 4 hardA company suffers a data breach exposing customer emails and hashed passwords. Explain why hashing p