Cybersecurity CS Thinking Example 1

Follow the full solution, then compare it with the other examples linked below.

Example 1

easy
Name three common cyber threats and describe how each works.

Solution

  1. 1
    Step 1: Malware โ€” malicious software (viruses, worms, ransomware) that damages systems or steals data. Often spreads through infected downloads or email attachments.
  2. 2
    Step 2: Phishing โ€” fake emails or websites that trick users into revealing passwords or personal information by impersonating trusted organisations.
  3. 3
    Step 3: Brute force attack โ€” an attacker tries every possible password combination until finding the correct one. Strong, long passwords make this impractical.

Answer

Malware (malicious software), Phishing (fake communications), Brute force (password guessing). Each exploits different vulnerabilities.
Understanding threats is the first step in cybersecurity. Many attacks exploit human behaviour (phishing) rather than technical vulnerabilities, making user awareness essential.

About Cybersecurity

The practice of protecting computing systems, networks, and data from unauthorized access, attacks, and damage. Cybersecurity encompasses three core goals: confidentiality (only authorized users can access data), integrity (data is not tampered with), and availability (systems remain operational).

Learn more about Cybersecurity โ†’

More Cybersecurity Examples