CALL OUR CLEARING HOTLINE 0800 009 3375 OR FIND OUT MORE

blog

Understanding the basics of cyber attacks

If you’re a computer science student and hoping to work in the field once you graduate then an understanding of how hackers think and operate is essential to a number of roles in the sector. Below we explore the basics of hacking and cyber attacks and how you can help limit and defend against these breaches in your chosen career.  

Written by Grant Longstaff. Published 2 August 2025.

How hackers think

One of the best ways to combat cyber attacks is to think like a hacker. It might seem like an odd idea at first, but if you’re already absorbed in the world of computing and technology there’s a good chance you’ll possess many of the skills used by hackers. You’ll identify and solve problems through creative thinking, logical reasoning and methodical testing. The outcomes may differ, but the methods are the same.

Many careers in computer science will require you to answer the same questions as a hacker. What are the weak points of a system, network, program or app? How can these weaknesses be abused? How likely is it to be exploited? What damage can be done as a result? The added challenge as a computer scientist is to not only find identify problems but to come up with solutions to protect against potential attacks.

Cyber attack methods

Cyber attacks come in many forms.  Understanding the basics of the most common attacks is essential for spotting and preventing them.

Malware

Malware takes many forms, such as viruses, trojans, ransomware and rootkits, but the idea is the same. Once it’s installed on a device it can run operations a user hasn’t authorised. They can do everything from collect user data and corrupt systems to hijacking a computer’s power to mine for cryptocurrency.

Phishing

Phishing involves sending emails or messages that appear to be from a trusted organisation with the aim of tricking people into clicking malicious links or sharing personal details.

SQL Injection

Structured query language (SQL) is a programming language used for storing and processing information in a relational database. An SQL Injection, or SQLI, can occur when a website doesn’t properly filter user input allowing a hacker to potentially slip malicious commands directly into the database. This can allow attackers to view, change or delete sensitive information.

Denial of Service (DoS)

Denial of Service attacks flood a system until it crashes. If this kind of attack is coordinated across many machines it becomes a Distributed Denial-of-Service (DDoS) attack and is far harder for a company to alleviate.

Man in the Middle

This involves hackers intercepting communication between two parties. For instance, if someone uses public Wi-Fi without encryption an attacker could potentially intercept personal details including usernames and passwords.

Hacking strategies

Recognising the methods of attack is only part of the challenge you’ll face. It’s also important to consider the steps a hacker will go through in order to better prevent cyber attacks.

A hacker will often gather as much information as possible about the system or organisation they’re targeting. This reconnaissance work includes strategies such as footprinting, which involves identifying a systems architecture or IP addresses of users, probing networks for open ports and even social engineering; a method of researching individuals through their online presence (social media channels etc.).

This highlights one of the most important considerations for individuals working in cyber security. Sometimes the weakness isn’t found in the technology, but in those using it. You might also find throughout your career you’ll be responsible for raising awareness and educating other users on successfully preventing cyber attacks.

Cyber security is an ongoing challenge to computer scientists. A system you make safe could potentially become vulnerable as hackers develop their techniques and improve technology. This means you’ll need to regularly test and retest your defences and stay up to date with the latest developments in the field. You’ll discover the intricacies of defence during your computer science degree, but the core principles of keeping software updated, secure coding and educating your fellow users is a good place to start.

The future of hacking

As we become increasingly reliant on technology the opportunities for cyber criminals will also increase. Similarly, the more sophisticated our defences against hackers becomes the threats we face will become more intricate and complex. The more devices we have, the more entry points we open to potential attacks.

It’s increasingly likely we’ll see more attacks on corporations and businesses with successful breaches costing companies a significant amount of money, damaging their reputations and ultimately failing their customers. As a computer scientist you’ll also have to consider how new technologies, such as our rising use of AI, will change how hackers operate. How can these tools be exploited by cyber criminals? What do we need to do to prevent this? We asked Dr Paul Sant, our Head of Computer Science, about the changes AI will bring to the sector:

We are beginning to see an increase in the use of Artificial Intelligence, both in terms of detecting and stopping attacks, but also its use by hackers to launch sophisticated attacks. Perhaps more worryingly, we are also seeing attackers try to manipulate and attack the AI in use, for example, by changing and manipulating Large Language Models that are the basis of many Generative-AI tools. 

We therefore need to develop a workforce that understands how to use AI in the workplace, but who can also develop the tools needed for cybersecurity over the next three to five years.”

 

If you’re looking to change careers into a role in tech our MSc in Computer Science conversion course is a perfect place to start.