week 4

Individual Report Task: Describing the Ways Devices Are Compromised

 

Task Overview

 

In this task, you will research and write a short report on how devices are compromised by cybercriminals. Understanding how attacks happen helps individuals and organisations take the necessary steps to improve security and prevent breaches.

 

Your report should be 200–300 words and cover different methods used to compromise devices.

 

 

Title Page

 

Include your name, date, and a title (e.g., Describing the Ways Devices Are Compromised).

 

 

1. Outline the Methods Used to Compromise Devices

 

Describe different techniques that cybercriminals use to gain access to or take control of devices.

 

Suggested areas to cover:

 • Email-Based Attacks (Phishing, Malicious Attachments, and Links)

 • Password Crackers and Credential Attacks

 • Exploiting Weak or Unsecured Encryption (OpenPGP Vulnerabilities)

 • Malware and Keyloggers

 

 

2. Explain How These Attacks Work

 

For each method, explain how cybercriminals use it to compromise a device and what the consequences might be.

 

For example:

 • Email-Based Attacks (e.g., Phishing and Malicious Attachments)

 • Attackers send fraudulent emails pretending to be legitimate companies.

 • Clicking a malicious link or opening an infected attachment can install malware or steal credentials.

 • Password Crackers and Credential Attacks (e.g., Hashcat, John the Ripper)

 • Hackers use tools to guess weak passwords or crack encrypted passwords.

 • Brute force and dictionary attacks can quickly compromise accounts using weak passwords.

 • Exploiting Weak or Unsecured Encryption (e.g., OpenPGP Vulnerabilities)

 • OpenPGP is used for secure email encryption, but if improperly configured, attackers can intercept or decrypt messages.

 • Weak encryption keys make it easier for attackers to spoof or manipulate email content.

 • Malware and Keyloggers (e.g., Remote Access Trojans, Spyware)

 • Malicious software records keystrokes or takes control of a device.

 • Often distributed via infected downloads, email attachments, or compromised websites.

 

 

3. Recommended Prevention Methods

 

Discuss how individuals and organisations can protect their devices from these attacks.

 • How can phishing emails be identified?

 • Why is strong password security essential?

 • How can users improve encryption security?

 

Example:

“Using multi-factor authentication (MFA) can protect against password-cracking attacks, as even if a hacker guesses a password, they won’t have the second verification factor.”

 

 

4. Additional Resources and Further Reading

 

Provide useful links for learning more about device security and attack prevention.

 

Example:

 • UK NCSC Guide on Phishing Attacks – https://www.ncsc.gov.uk/

 • How Password Crackers Work – https://www.cyber.gov.au/

 

 

Submission and Marking Criteria

 

Your report should be 200–300 words and must be clearly structured, well-researched, and easy to understand.

 

✔️ Accuracy of Research – Are the methods correctly described?

✔️ Technical Understanding – Are attack techniques clearly explained?

✔️ Presentation and Clarity – Is the report well-organised and readable?

 

 

Final Note

 

This task will help you understand how devices are compromised and the importance of cyber security best practices. Take your time to research and provide clear explanations.


Last Updated
2025-05-12 10:29:21

English and Maths

English


Maths


Stretch and Challenge

Stretch and Challenge


  • Fast to implement
  • Accessible by default
  • No dependencies
Homework

Homework


Equality and Diversity Calendar
How to's

How 2's Coverage




Links to Learning Outcomes

Links to Assessment criteria

 


Files that support this week


| | | | |
Week 3
Prev
Week 4
Prev
Week 5
Prev

Next