Revise Computingrevisecomputing.co.uk
At a glanceFeaturesStudentsPricingHow it worksFree GCSE notesExam dates
At a glanceFeaturesStudentsPricingHow it worksFree GCSE notesExam dates

Knowledge organisers / Threats to computer systems and networks

Forms of attack: Data interception and theft

All topicsPractise exam questions
Knowledge organiser

Threats to computer systems and networks

1.4.1a.v

What you need to know

Data interception and theft occurs when data being transmitted over a network is captured by unauthorised third parties. This often happens on unsecured networks using software that 'listens' for unencrypted data.

Key points

  • Definition:Data Interception and Theft: capturing data being transmitted over a network without permission, often using special eavesdropping software.
  • Often targets unencrypted data on unsecured networks (e.g. public Wi-Fi).
  • Stolen data can include login details, credit card numbers, personal information.
  • Can lead to identity theft, fraud, or unauthorised access to systems.
  • Exam Tip:Encryption is the main defence — even if data is intercepted, encryption makes it UNREADABLE without the decryption key.
  • Common Mistake:Saying a firewall or penetration testing can stop data interception. If data is being transmitted between computers on the Internet, there is no firewall in between — only ENCRYPTION protects against interception.