Computer Science GCES EDEXCEL
-
Decomposition And Abstraction Edexcel2 主题
-
Algorithms Edexcel11 主题
-
Follow And Write Algorithms Edexcel
-
Introduction To Programming Concepts Edexcel
-
Basic Programming Concepts Edexcel
-
Variables Constants And Assignments Edexcel
-
Data Structures And Arrays Edexcel
-
Arithmetic Relational And Logical Operations Edexcel
-
Determine Outputs Of An Algorithm Edexcel
-
Types Of Errors Edexcel
-
Standard Sorting Algorithms Edexcel
-
Standard Searching Algorithms Edexcel
-
Algorithm Efficiency Edexcel
-
Follow And Write Algorithms Edexcel
-
Truth Tables Edexcel3 主题
-
Binary Edexcel6 主题
-
Data Representation Edexcel4 主题
-
Data Storage And Compression Edexcel2 主题
-
Hardware Edexcel5 主题
-
Software Edexcel3 主题
-
Programming Languages Edexcel2 主题
-
Networks Edexcel7 主题
-
Network Security Edexcel2 主题
-
Environmental Issues Edexcel1 主题
-
Ethical And Legal Issues Edexcel3 主题
-
Cybersecurity Edexcel2 主题
-
Develop Code Edexcel6 主题
-
Constructs Edexcel4 主题
-
Data Types And Data Structures Edexcel5 主题
-
Operators Edexcel1 主题
-
Subprograms Edexcel2 主题
Developing Robust Software Edexcel
Exam code:1CP2
Developing Robust Software
What is robust software?
-
Robust software is software designed to withstand unexpected errors such as an input from a user or a calculation and continue to operate
-
Programmers must ensure the software has a way of dealing with the potential errors to ensure their software does not crash
-
Common vulnerabilities include:
-
weak authentication
-
lack of encryption
-
Authentication
-
Authentication is the process of ensuring that a system is secure by asking the user to complete tasks to prove they are an authorised user of the system
-
Authentication is done because bots can submit data in online forms
-
Authentication can be done in several ways, these include
-
Usernames and Passwords
-
CAPTCHA
-
-
Other methods that programmers can do to authenticate the user is include
-
Allowing users to recover passwords via email links and SMS codes
-
Encrypting data
-

Encryption
-
Encryption is a method of scrambling data before being transmitted across a network in order to protect the contents from unauthorised access
Identifying Vulnerabilities
-
Two techniques that can be used to help identify vulnerabilities are:
-
Code reviews
-
Audit trails
-
Code reviews
-
A code review can help to identify issues with software source code such as:
-
bad programming practice
-
vulnerabilities within the code itself
-
efficiency of code
-
Audit trails
-
An audit trail is a complete digital record of what has been:
-
opened
-
edited
-
deleted
-
copied
-
transferred etc.
-
-
The purpose of an audit trail is to:
-
aid the restoring of a software to a state before errors were identified
-
investigate security incidents
-
Ensure software compliance
-
Responses