Published by Patrick Mutisya · 14 days ago
This set of notes covers the main threats to data that candidates need to know for the Cambridge IGCSE ICT (0417) syllabus. Understanding the characteristics, how each threat works and the possible effects helps learners to develop appropriate security measures.
Definition: Unauthorized access to a computer system or network, usually with the aim of stealing, altering or destroying data.
Effects: Data loss, loss of confidentiality, damage to reputation, financial loss.
Deceptive emails or messages that appear to be from a trusted source, asking the recipient to reveal personal information (e.g., passwords, bank details).
Effects: Identity theft, unauthorised transactions, compromise of corporate accounts.
Redirecting users from a legitimate website to a fraudulent one without their knowledge.
Effects: Large‑scale theft of login credentials, financial fraud.
Phishing conducted via SMS (text) messages.
Effects: Same as phishing – identity theft, unauthorised account access.
Voice phishing – fraudulent phone calls where the caller pretends to be a trusted organisation.
Effects: Direct financial loss, compromise of personal data.
Malicious programmes that attach themselves to legitimate files and spread when the infected file is opened.
Effects: Data corruption, loss of productivity, possible system failure.
Umbrella term for any software designed to cause harm, including viruses, worms, trojans, ransomware and spyware.
Effects: Data loss, unauthorised data collection, financial extortion, system downtime.
Unauthorised use of credit or debit card details to make purchases or withdraw cash.
Effects: Direct monetary loss, damage to credit rating, cost of dispute resolution.
| Threat | Key Characteristics | Typical Effects | Common Prevention Measures |
|---|---|---|---|
| Hacking | Unauthorised system access; exploits weak passwords, unpatched software | Data loss, confidentiality breach, financial loss | Strong passwords, regular updates, firewalls, intrusion detection |
| Phishing | Deceptive emails/websites; social engineering, urgent language | Identity theft, unauthorised transactions | Verify sender, avoid clicking unknown links, use anti‑phishing filters |
| Pharming | DNS or hosts file manipulation; redirects to fake sites | Mass credential theft, financial fraud | Secure DNS, anti‑malware tools, check URL certificates |
| Smishing | SMS messages with malicious links or requests | Identity theft, unauthorised account access | Do not click links in texts, verify via official channels |
| Vishing | Phone calls impersonating trusted organisations | Financial loss, data compromise | Never give personal info over unsolicited calls, use call‑back verification |
| Viruses | Attach to files, spread via opening infected files | Data corruption, system slowdown | Antivirus software, avoid unknown attachments, regular backups |
| Malware (Worms, Trojans, Ransomware, Spyware) | Varied delivery methods; self‑replicating, disguise as legitimate, encrypt data | Data loss, extortion, privacy invasion | Update software, use anti‑malware, restrict admin rights, backup data |
| Card Fraud | Skimming, data breaches, phishing, malware | Monetary loss, credit damage | Secure payment gateways, monitor statements, use chip‑and‑pin cards |