Computer Science GCES EDEXCEL
-
Decomposition And Abstraction Edexcel2 主题
-
Algorithms Edexcel11 主题
-
Follow And Write Algorithms Edexcel
-
Introduction To Programming Concepts Edexcel
-
Basic Programming Concepts Edexcel
-
Variables Constants And Assignments Edexcel
-
Data Structures And Arrays Edexcel
-
Arithmetic Relational And Logical Operations Edexcel
-
Determine Outputs Of An Algorithm Edexcel
-
Types Of Errors Edexcel
-
Standard Sorting Algorithms Edexcel
-
Standard Searching Algorithms Edexcel
-
Algorithm Efficiency Edexcel
-
Follow And Write Algorithms Edexcel
-
Truth Tables Edexcel3 主题
-
Binary Edexcel6 主题
-
Data Representation Edexcel4 主题
-
Data Storage And Compression Edexcel2 主题
-
Hardware Edexcel5 主题
-
Software Edexcel3 主题
-
Programming Languages Edexcel2 主题
-
Networks Edexcel7 主题
-
Network Security Edexcel2 主题
-
Environmental Issues Edexcel1 主题
-
Ethical And Legal Issues Edexcel3 主题
-
Cybersecurity Edexcel2 主题
-
Develop Code Edexcel6 主题
-
Constructs Edexcel4 主题
-
Data Types And Data Structures Edexcel5 主题
-
Operators Edexcel1 主题
-
Subprograms Edexcel2 主题
The Importance Of Network Security Edexcel
Exam code:1CP2
What is network security?
-
Network security is any activity designed to protect a network and it’s data from internal and external threats
-
A network vulnerability is a weakness that can be exploited by a criminal to gain unauthorised access to information or resources
Identifying Network Vulnerabilities
What are common network vulnerabilities?
-
Examples of common network vulnerabilities are:
-
Weak passwords
-
Outdated software
-
Malware
-
Poorly configured firewalls
-
Weak passwords
-
A week password is a password with less than 8-12 characters and does not contain a combination of:
-
Upper case characters
-
Lower case characters
-
Numbers
-
Special characters (*, #. ! etc.)
-
-
Predictable patterns make a weak password, for example, using birthdays, names and/or keyboard patterns (qwerty)
-
Weak passwords can lead to hackers deploying brute force attacks, which can lead to:
-
Data theft
-
Access to private information
-
Further attacks
-
Outdated software
-
Outdated software is software that has not been patched or updated regularly
-
Outdated software can lead to hackers exploiting vulnerabilities in source code
Malware
-
Malware is malicious software designed to cause harm to a network or computer system
-
Examples of issues that malware can cause are:
-
File deletion/corruption
-
Use system resources – slow down performance/internet
-
Logging key strokes
-
Poorly configured firewalls
-
A firewall is designed to monitor incoming and outgoing traffic from a network
-
A poorly configured firewall can lead to malicious software getting in or cause it to spread
Penetration Testing & Ethical Hacking
What is penetration testing?
-
Penetration testing is the process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access
-
A company will employ penetration testers to test a networks security and use any information gained to to fix any issues that are found
-
There are two main types of penetration testing:
-
Internal (white-box)
-
External (black-box)
-
Internal (white-box)
-
When the person or team testing the system has knowledge of and possibly basic credentials for the target system, simulating an attack from inside the system
External (black-box)
-
When the person or team testing the system has no knowledge of any credentials for the target system, simulating an attack from outside the system
What is ethical hacking?
-
Ethical hacking is attempting to gain unauthorised access to a network or computer system with the intention of helping to fix any vulnerabilities
-
Ethical hackers have permission from the system owner
-
There are 3 categories of hackers:
|
White-hat hackers |
Grey-hat hackers |
Black-hat hackers |
|---|---|---|
|
|
|
Responses