Know and understand hacking, the threats to data, and the measures (technical and organisational) that must be taken to protect data and ensure safety.
Hacking is the unauthorised use, manipulation, or disruption of computer systems, networks, or data. Motives can include curiosity, financial gain, political protest, or the desire to demonstrate technical skill.
| Control | Purpose / Typical Use | How it Counters Threats | Advantages | Disadvantages / Limitations |
|---|---|---|---|---|
| Firewall (network‑level) | Filters inbound and outbound traffic based on rule‑sets. | Blocks unauthorised access, many DoS attempts, and inbound malware. | Low‑cost, easy to configure, provides a clear perimeter. | Can be bypassed with encrypted traffic or insider attacks; requires regular rule updates. |
| Intrusion Detection/Prevention System (IDS/IPS) | Monitors traffic for suspicious patterns; can alert (IDS) or block (IPS). | Detects malware, MitM attempts, port scans, and known exploit signatures. | Real‑time detection; can automatically block attacks. | False positives may disrupt legitimate traffic; needs signature updates. |
| Antivirus / Antimalware | Scans files and processes for known malicious code. | Stops viruses, worms, Trojans, ransomware before execution. | Widely available, integrates with OS, provides regular updates. | May miss zero‑day threats; performance impact on older hardware. |
| Encryption (AES, RSA, SSL/TLS) |
| Prevents eavesdropping, data theft, and tampering during storage or transmission. | Strong confidentiality; RSA enables secure key distribution; SSL/TLS is industry standard for web security. | Key management can be complex; performance overhead; weak implementation (e.g., outdated TLS versions) can be vulnerable. |
| Strong Password Policy & User‑ID Management | Requires complex, unique passwords and regular changes; enforces minimum length, mixed characters. | Reduces success of password‑cracking and credential‑stuffing attacks. | Simple to implement; raises overall password quality. | May lead to user fatigue or insecure work‑arounds (e.g., writing passwords down). |
| Two‑Factor / Multi‑Factor Authentication (2FA/MFA) | Combines something you know (password) with something you have (token, app) or are (biometric). | Mitigates impact of stolen credentials, phishing, and password reuse. | Significant security boost with modest cost; many free authenticator apps. | Requires additional devices or apps; can be inconvenient for some users. |
| Patch Management | Regularly applies security updates to OS, firmware, and applications. | Closes known vulnerabilities that could be exploited by malware, ransomware, or injection attacks. | Prevents many high‑profile incidents (e.g., WannaCry). | Needs disciplined schedule; occasional incompatibility issues after updates. |
| Secure Back‑ups (offline or encrypted cloud) | Creates regular copies of critical data stored separately from the primary system. | Provides recovery after ransomware, accidental deletion, or hardware failure. | Ensures business continuity; offline copies are immune to network‑based attacks. | Requires storage space and testing of restoration procedures. |
| Biometric Authentication (fingerprint, facial, iris) | Uses unique physiological traits to verify identity. | Adds a factor that cannot be easily guessed or shared. | Convenient for users; reduces reliance on passwords. | Potential for spoofing; privacy concerns; may not work in all environments. |
| Digital Certificates (PKI) | Provides cryptographic proof of identity for users, devices or services. | Prevents man‑in‑the‑middle attacks and ensures trusted communication. | Enables secure email, code signing, and VPN authentication. | Management of certificate lifecycle can be complex and costly. |
The ransomware exploited the unpatched Windows vulnerability “EternalBlue” (SMB v1). Once infected, it encrypted users’ files and demanded payment in Bitcoin. The outbreak affected hospitals, businesses and public services worldwide, highlighting the critical importance of:
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.