Computer Science
Grade 10
20 min
2. Common Network Attacks: Malware, Phishing, and Denial-of-Service
Learn about common network attacks, such as malware, phishing, and denial-of-service attacks, and how they work.
Tutorial Preview
1
Introduction & Learning Objectives
Learning Objectives
Define malware, phishing, and Denial-of-Service (DoS) attacks.
Differentiate between various types of malware, including viruses, worms, and trojans.
Identify the key characteristics and red flags of a phishing attempt in an email or message.
Explain the goal and impact of a Denial-of-Service (DoS) and a Distributed Denial-of-Service (DDoS) attack.
Analyze a given scenario to determine the type of network attack being described.
Describe basic preventative measures against these common attacks.
Ever received a suspicious email promising a free prize or a warning about your account? 🤔 What if clicking one link could bring down your entire school's network?
In this lesson, we will explore three of the most common threats you'll encounter online:...
2
Key Concepts & Vocabulary
TermDefinitionExample
MalwareShort for 'malicious software,' it is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, or deprive users access to information.A keylogger program that secretly records every key you press, capturing your passwords and private messages, and sends them to an attacker.
PhishingA type of social engineering attack where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information or to deploy malicious software on the victim's infrastructure.An email that looks like it's from your bank, asking you to 'verify your account' by clicking a link. The link leads to...
3
Core Syntax & Patterns
Phishing Red Flag Pattern
(Urgency || Threat) + Generic Greeting + Suspicious Link -> High Probability of Phishing
Use this pattern to analyze suspicious messages. If a message creates a sense of urgency (e.g., 'Act now!'), uses a generic greeting ('Dear Customer'), and contains a link that doesn't match the sender's official domain, it is very likely a phishing attempt.
DoS vs. DDoS Identification
IF (Source_Count <= Small_Number) THEN DoS ELSE DDoS
When analyzing a service outage caused by a flood of traffic, the key differentiator is the number of sources. If the traffic comes from one or a few IP addresses, it's a DoS attack. If it comes from hundreds or thousands of distributed IP addresses, it's a DDoS attack.
Malware P...
4 more steps in this tutorial
Sign up free to access the complete tutorial with worked examples and practice.
Sign Up Free to ContinueSample Practice Questions
Challenging
An accountant receives an email that appears to be from her boss, the CFO. The email uses the CFO's name, references a real project, and asks her to urgently wire money. This highly targeted attack (spear phishing) bypasses which common red flag from the `Phishing Red Flag Pattern`?
A.The Generic Greeting
B.The sense of Urgency or Threat
C.The Suspicious Link
D.The request for sensitive information
Challenging
An attacker controls a botnet of 10,000 computers. Their goal is to take a well-protected corporate server offline. Why would they choose a DDoS attack over a DoS attack from a single, powerful machine?
A.DoS attack is more expensive to launch.
B.DoS attack cannot take a server offline.
C.DDoS is harder to block because the traffic comes from many legitimate-seeming sources.
D.DDoS attack steals data more effectively.
Challenging
A mobile game is free, but requires permissions to access your photos and contacts, which it then sells. How does this align with the core concept of a Trojan Horse?
A.It replicates itself onto other devices in your contact list.
B.It makes your device unavailable to you.
C.It is a standalone program that spreads across the network.
D.It presents itself as a desirable program to trick the user into allowing it to perform hidden, malicious actions.
Want to practice and check your answers?
Sign up to access all questions with instant feedback, explanations, and progress tracking.
Start Practicing Free