Computer Science GCES EDEXCEL
-
Decomposition And Abstraction Edexcel2 主题
-
Algorithms Edexcel11 主题
-
Follow And Write Algorithms Edexcel
-
Introduction To Programming Concepts Edexcel
-
Basic Programming Concepts Edexcel
-
Variables Constants And Assignments Edexcel
-
Data Structures And Arrays Edexcel
-
Arithmetic Relational And Logical Operations Edexcel
-
Determine Outputs Of An Algorithm Edexcel
-
Types Of Errors Edexcel
-
Standard Sorting Algorithms Edexcel
-
Standard Searching Algorithms Edexcel
-
Algorithm Efficiency Edexcel
-
Follow And Write Algorithms Edexcel
-
Truth Tables Edexcel3 主题
-
Binary Edexcel6 主题
-
Data Representation Edexcel4 主题
-
Data Storage And Compression Edexcel2 主题
-
Hardware Edexcel5 主题
-
Software Edexcel3 主题
-
Programming Languages Edexcel2 主题
-
Networks Edexcel7 主题
-
Network Security Edexcel2 主题
-
Environmental Issues Edexcel1 主题
-
Ethical And Legal Issues Edexcel3 主题
-
Cybersecurity Edexcel2 主题
-
Develop Code Edexcel6 主题
-
Constructs Edexcel4 主题
-
Data Types And Data Structures Edexcel5 主题
-
Operators Edexcel1 主题
-
Subprograms Edexcel2 主题
Methods Of Protecting Digital Systems Edexcel
Exam code:1CP2
Anti-Malware
What is anti-malware software?
-
Anti-malware software is a term used to describe a combination of different software to prevent computers from being susceptible to viruses and other malicious software
-
The different software anti-malware includes are
-
Anti-virus
-
Anti-spam
-
Anti-spyware
-
How does anti-malware work?
-
Anti-malware scans through email attachments, websites and downloaded files to search for issues
-
Two ways anti malware can approach the task are:
-
Use a list of known unique malware fingerprints (signatures) to block immediately if they try to access your device in any way
-
Monitor the behaviour of programs to identify suspicious activities that might indicate malware such as;
-
Rapid deletion/modification of files
-
Attempts to access sensitive data/resources
-
Communicating with known malicious servers
-
-
-
Anti-malware will also perform checks for updates to ensure the database of signatures is up to date
Encryption
What is encryption?
-
Encryption is the process of encoding data so that it cannot be read by anyone not in possession of the decryption key
-
Encryption uses complex mathematical algorithms to scramble the text
-
Asymmetric encryption, also known as private key, public key encryption is often used for web pages and other communication
When can encryption be used?
-
Encryption should be used in any situation where sensitive data is being transmitted across a network
-
Examples include:
-
Passwords
-
Bank details
-
Personal information
-
Acceptable Use Policies (AUP)
What is an acceptable use policy (AUP)?
-
An acceptable use policy is a document that outlines what is and isn’t acceptable behaviour when using a computer on a network
-
AUPs are typically used by organisations to make expectations of responsible technology use clear
-
AUPs do not stop the misuse of computes, however they provide a way of holding people accountable if rules are violated
-
It is often a requirement of a business or school for employees/students to sign, signifying acceptance of the terms and conditions for using the network
-
An AUP can cover aspects such as:
-
Acceptable file downloads
-
Restrictions on personal use of company resources
-
Data security practices etc.
-
Backup & Recovery Procedures
What are backup & recovery procedures?
-
Backup and recovery procedures are put in place by organisations to set out the steps to take in case of a situation that could lead to data loss
-
Situations include:
-
Hardware failure
-
Software issues
-
Cyberattacks
-
Natural disasters
-
-
Information relating to backups can be found here (opens in a new tab)
-
Example recovery procedures that can be put in to place include:
-
RAID – Redundant Array of Independent Disks (RAID) is a method of combining multiple hard drives to keep copies of data, if one drive fails it is safe because you have copies on other drives
-
Off-site storage – Storing data off-site, using remote data centres (cloud) to safeguard data from events such as fire/flood
-
Stand-by equipment/premises – Spare computers or components that can be used to replace primary equipment in the event of failure or buildings that can be used temporarily in the event of the main building becoming unusable
-
Worked Example
Explain TWO reasons why schools or businesses might have an Acceptable Use Policy (AUP) for their computers and networks [2]
Answer
-
To protect their IT systems
-
To ensure responsible user behaviour
Responses