Computer-Science-A-level-Ocr
-
3-3-networks8 主题
-
3-2-databases7 主题
-
3-1-compression-encryption-and-hashing4 主题
-
2-5-object-oriented-languages7 主题
-
2-4-types-of-programming-language4 主题
-
2-3-software-development5 主题
-
2-2-applications-generation6 主题
-
2-1-systems-software8 主题
-
1-3-input-output-and-storage2 主题
-
1-2-types-of-processor3 主题
-
1-1-structure-and-function-of-the-processor1 主题
-
structuring-your-responses3 主题
-
the-exam-papers2 主题
-
8-2-algorithms-for-the-main-data-structures4 主题
-
8-1-algorithms10 主题
-
7-2-computational-methods11 主题
-
7-1-programming-techniques14 主题
-
capturing-selecting-managing-and-exchanging-data
-
entity-relationship-diagrams
-
data-normalisation
-
relational-databases
-
hashing
-
symmetric-vs-asymmetric-encryption
-
run-length-encoding-and-dictionary-coding
-
lossy-and-lossless-compression
-
polymorphism-oop
-
encapsulation-oop
-
inheritance-oop
-
attributes-oop
-
methods-oop
-
objects-oop
-
capturing-selecting-managing-and-exchanging-data
-
6-5-thinking-concurrently2 主题
-
6-4-thinking-logically2 主题
-
6-3-thinking-procedurally3 主题
-
6-2-thinking-ahead1 主题
-
6-1-thinking-abstractly3 主题
-
5-2-moral-and-ethical-issues9 主题
-
5-1-computing-related-legislation4 主题
-
4-3-boolean-algebra5 主题
-
4-2-data-structures10 主题
-
4-1-data-types9 主题
-
3-4-web-technologies16 主题
-
environmental-effects
-
automated-decision-making
-
computers-in-the-workforce
-
layout-colour-paradigms-and-character-sets
-
piracy-and-offensive-communications
-
analysing-personal-information
-
monitoring-behaviour
-
censorship-and-the-internet
-
artificial-intelligence
-
the-regulation-of-investigatory-powers-act-2000
-
the-copyright-design-and-patents-act-1988
-
the-computer-misuse-act-1990
-
the-data-protection-act-1998
-
adder-circuits
-
flip-flop-circuits
-
simplifying-boolean-algebra
-
environmental-effects
network-security-and-threats
Network Security & Threats
What are common network threats?
Hackers
-
Individuals or groups who exploit system vulnerabilities to gain unauthorised access to data
-
Hacking involves gaining unauthorised access to a system or network to steal or manipulate data, disrupt services, or cause damage
-
The aim of hacking can vary from personal gain to activism or cyber espionage
Viruses
-
Malicious software programs designed to spread from one computer to another and interfere with normal operations
-
A virus attaches itself to a legitimate program or file and then replicates itself to spread to other programs or files on the computer. It can cause damage to the system, including deleting data or damaging hardware
Malware
-
Malware is malicious software designed to harm or gain unauthorised access to a system or network. Types of malware include:
-
A worm is similar to a virus but is a standalone program that can spread and replicate itself over computer networks. It can take up storage space or bandwidth
-
A Trojan horse is a program that disguises itself as a legitimate program or file, but when installed, it can delete data or damage hardware
-
Spyware is software that records all key presses and transmits these to a third-party
-
Adware is software that displays unwanted advertisements on the computer without the user’s consent. Some of these may contain spyware, and some may link to viruses when clicked
-
Ransomware is malware that encrypts the user’s files and demands a ransom payment to decrypt them. It can cause data loss and financial damage and disrupt business operations
-
-
The aim of malware attacks can range from data theft to extortion or disruption of services
Denial of Service (DoS)
-
A DoS attack is where a computer floods a server with lots of requests at the same time, which the server can’t respond to, causing it to crash or become unavailable to users
-
A DoS attack aims to disrupt the normal functioning of a system or network by denying users access
Distributed Denial of Service (DDoS) Attack
-
A DDoS attack is where similar to a DoS attack but instead multiple computers are used as bots which send the requests to the server
SQL injection
-
An attack technique used to exploit security vulnerabilities in a website, where malicious SQL statements are inserted into an entry field for execution
-
This can potentially expose a company’s database to hackers
Phishing
-
Attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication
-
Phishing involves the user being sent an email that looks legitimate
-
This email contains a link to a fake website where the user is encouraged to enter their details
-
Phishing aims to steal sensitive information for personal gain or to use it for further cyber attacks
Pharming
-
This is a cyber attack intended to redirect a website’s traffic to another bogus site
-
Pharming involves malware being downloaded without the user’s knowledge
-
This redirects the user to a fake website where they’re encouraged to enter their personal details
-
Pharming aims to steal sensitive information for personal gain or to use it for further cyber attacks
Social engineering
-
Social engineering involves manipulating individuals to gain access to confidential information or to perform an action that benefits the attacker
-
This can include techniques such as:
-
Posing as someone else to gain trust or access to sensitive information – attackers might pretend to be a co-worker, IT support personnel, or a law enforcement officer to get people to divulge sensitive information or perform an action they wouldn’t otherwise do
-
Enticing a victim with the promise of a desirable item to extract sensitive information or gain access to a system
-
Leaving a USB drive with a tempting label, like “salary information,” in a public place and waiting for someone to pick it up and plug it into a computer – once the drive is connected to the computer, the attacker can access sensitive information or install malware
-
Posing as a bank representative and asking for personal information to “verify your account”
-
Network security
There are many different methods and techniques that have been developed to make networks more secure. Some of these include:
-
Firewalls: Network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules
-
Secure Passwords: Using strong, complex, and unique passwords helps to protect against unauthorised access
-
Anti-virus Software: Programs designed to detect and neutralise or remove malicious software like viruses, worms, and Trojans
-
Anti-spyware Software: Tools to detect and remove spyware and other kinds of malware
-
Two-factor Authentication (2FA): Adds an additional layer of security by requiring users to provide two forms of identification – usually a code sent to their phone or email as well as their password
-
Regular Software Updates: Keeping all systems and software up-to-date ensures you have the latest security patches
-
Employee training can be essential to instil a culture of security consciousness within the company
-
A strong security policy (e.g. insisting on regular password changes) can further help in maintaining a secure network environment
Responses