You are on page 1of 3

Homework 4 Cybersecurity

Unit 5 Issues and impact

Answers
1. A company employee downloads a free program from the Internet. The program appears to
work well, however, a hacker has installed some malicious code inside it.
(a) Name the type of malware used in this cyberattack.
Trojan (horse)
(b) The malicious code contains a keylogger.
Explain two features of a keylogger.
Award 1 mark for the identification of a way (1) with a linked justification/exemplification
(1), up to a maximum of 2 marks.
Key presses are recorded/logged (1) so that a hacker can read them (1)
by recording key presses directly (1) encryption will not prevent a hacker reading them
(1).
The recorded/logged key presses (1) can be sent to a remote location (via the Internet)
(1).
The plaintext key presses will contain passwords (1) that the hacker can use in other
attacks (1).
(c) The company that the employee works for doesn’t have an Acceptable Use Policy.
Explain two ways this could have reduced the risk of the malware entering the
computer system or causing any damage.
Award 1 mark for the identification of a way (1) with a linked justification/exemplification
(1), up to a maximum of 2 marks.
The policy could state that users are not allowed to install software (1) which would
reduce the number of cases of users trying to install software they have downloaded
(1).
The policy could prevent users from installing software (in the user policies) (1) which,
(if set up correctly) would make it very difficult to install the malicious code (1).
The policy could have expected users to use two-factor authentication for access to
systems (1). This would mean that even if a hacker obtained a password, they would
not have access to the second factor (such as a fingerprint or ID card) (1).
The policy could ask users to report any suspicious activity. (1) If the Trojan had any
strange activities that it caused (such as warnings from the operating
system/antimalware) then this would be reported for investigation (1).
The policy could expect administrators/users to use antimalware software (1). This
could have detected the Trojan before it was installed (1).
(d) Explain two ways that systems can be vulnerable to cyberattacks when the
company’s system administrators do not properly maintain the software used
on their computer systems.
Award 1 mark for the identification of a way (1) with a linked justification/exemplification
(1), up to a maximum of 2 marks.
The system may have unpatched software (1). This will leave security holes open
(which can be exploited by hackers) (1).
The system may have out-of-date anti-malware (1). This means that the latest
virus/malware definitions will not be available (1) so the software won’t be able to be
able to detect newer viruses (1).
Or any other appropriate response.

1
Homework 4 Cybersecurity
Unit 5 Issues and impact

2. Computer systems used in a company can be protected by the use of encryption and anti-
malware software.
(a) Name one other way that systems can be protected.
Having an Acceptable Use Policy / AUP (1)
Having a password policy (1)
Using backups (1)
Using locks/CCTV/security guards (1)
Or any other reasonable method.
(b) Discuss the advantages of the company using encryption and anti-malware
software to protect their systems.
Advantages of using encryption
 The data will be encoded in a form that cannot be read without a key
 This means that if a hacker gains access to the physical hard drive / removable
media, they won’t be able to read the information
 By encrypting sensitive data such as passwords within the database, if a hacker
gains access to the password table/database, they will not be able to read the
actual password
 Encrypting communications such as email will prevent them from being read by
someone who it wasn’t intended for
 Encrypting connections such as Wi-Fi will prevent an eavesdropper from seeing
any communications
 Encrypting web access with HTTPS (secure HTTP) will mean that an
eavesdropper won’t be able to see sensitive/personal data that has been
written, such as credit card numbers
Advantages of using anti-malware software
 The software can detect malware such as Trojans/keyloggers/viruses/worms
 It can scan downloads as they are downloaded and prevent them being run /
quarantined if malware is detected
 Regular scans of an entire hard disk can be made to detect any malware that
may be stored on them
 If malware is detected in files, they can be quarantined. This prevents the file
from running and causing any damage to the system, whilst it makes available
the original data for a user/specialist to recover
 Modern malware can use heuristics to detect the signs of a virus. This helps to
detect new viruses that haven’t yet got a virus definition written.
 Anti-malware can be set to auto-update so that the virus definitions are updated
to the latest versions and will detect the newest viruses

2
Homework 4 Cybersecurity
Unit 5 Issues and impact

0 No rewardable content.

Level 1 1-2 Basic, independent points are made, showing elements of


understanding of key concepts/principles of computer science.
(AO1)
The discussion will contain basic information with little linkage
between points made or application to the context.
(AO2)

Level 2 3-4 Demonstrates adequate understanding of key concepts/principles


of computer science. (AO1)
The discussion shows some linkages and lines of reasoning with
some structure and application to the context.
(AO2)

Level 3 5-6 Demonstrates comprehensive understanding of key


concepts/principles of computer science to support the discussion
being presented. (AO1)
The discussion is well developed, with sustained lines of
reasoning that are coherent and logically structured, and which
clearly apply to the context. (AO2)

[Total 20 marks]

You might also like