Back to 课程

Computer Science GCES EDEXCEL

0% Complete
0/0 Steps
  1. Decomposition And Abstraction Edexcel
    2 主题
  2. Algorithms Edexcel
    11 主题
  3. Truth Tables Edexcel
    3 主题
  4. Binary Edexcel
    6 主题
  5. Data Representation Edexcel
    4 主题
  6. Data Storage And Compression Edexcel
    2 主题
  7. Hardware Edexcel
    5 主题
  8. Software Edexcel
    3 主题
  9. Programming Languages Edexcel
    2 主题
  10. Networks Edexcel
    7 主题
  11. Network Security Edexcel
    2 主题
  12. Environmental Issues Edexcel
    1 主题
  13. Ethical And Legal Issues Edexcel
    3 主题
  14. Cybersecurity Edexcel
    2 主题
  15. Develop Code Edexcel
    6 主题
  16. Constructs Edexcel
    4 主题
  17. Data Types And Data Structures Edexcel
    5 主题
  18. Operators Edexcel
    1 主题
  19. Subprograms Edexcel
    2 主题
课 Progress
0% Complete

Exam code:1CP2

Developing Robust Software

What is robust software?

  • Robust software is software designed to withstand unexpected errors such as an input from a user or a calculation and continue to operate

  • Programmers must ensure the software has a way of dealing with the potential errors to ensure their software does not crash

  • Common vulnerabilities include:

    • weak authentication

    • lack of encryption

Authentication

  • Authentication is the process of ensuring that a system is secure by asking the user to complete tasks to prove they are an authorised user of the system

  • Authentication is done because bots can submit data in online forms

  • Authentication can be done in several ways, these include

    • Usernames and Passwords

    • CAPTCHA

  • Other methods that programmers can do to authenticate the user is include

    • Allowing users to recover passwords via email links and SMS codes

    • Encrypting data

authentication-recaptcha

Encryption

  • Encryption is a method of scrambling data before being transmitted across a network in order to protect the contents from unauthorised access

Identifying Vulnerabilities

  • Two techniques that can be used to help identify vulnerabilities are:

    • Code reviews

    • Audit trails

Code reviews

  • A code review can help to identify issues with software source code such as:

    • bad programming practice

    • vulnerabilities within the code itself

    • efficiency of code

Audit trails

  • An audit trail is a complete digital record of what has been:

    • opened

    • edited

    • deleted

    • copied

    • transferred etc.

  • The purpose of an audit trail is to:

    • aid the restoring of a software to a state before errors were identified

    • investigate security incidents

    • Ensure software compliance

Responses

您的邮箱地址不会被公开。 必填项已用 * 标注