Back to 课程

Computer Science GCES OCR

0% Complete
0/0 Steps
  1. Cpu Architecture Performance And Embedded Systems Ocr
    5 主题
  2. Primary And Secondary Storage Ocr
    6 主题
  3. Data Storage And Compression Ocr
    12 主题
  4. Networks And Topologies Ocr
    6 主题
  5. Wired And Wireless Networks Protocols And Layers Ocr
    6 主题
  6. Identifying And Preventing Threats To Computer Systems And Networks Ocr
    2 主题
  7. Operating Systems And Utility Software Ocr
    2 主题
  8. Ethical Legal Cultural And Environmental Impact Ocr
    2 主题
  9. Computational Thinking Searching And Sorting Algorithms Ocr
    3 主题
  10. Designing Creating And Refining Algorithms Ocr
    5 主题
  11. Programming Fundamentals And Data Types Ocr
    5 主题
  12. Additional Programming Techniques Ocr
    7 主题
  13. Defensive Design And Testing Ocr
    6 主题
  14. Boolean Logic Diagrams Ocr
    2 主题
  15. Programming Languages And Integrated Development Environments Ides Ocr
    3 主题
  16. The Exam Papers Ocr
    2 主题
  17. Structuring Your Responses Ocr
    3 主题
课 Progress
0% Complete

Exam code:J277

Penetration Testing

What is penetration testing?

  • Penetration testing is a method of preventing vulnerabilities whereby a company employ people to try and hack their network and databases

  • This allows the ‘hackers’ to point out the parts of the system that are vulnerable 

  • The companies then use this information to fix the issues that are found

What form of attack would this help to prevent?

  • SQL injection

Anti-Malware Software

What is anti-malware software?

  • Anti-malware software is a term used to describe a combination of different software to prevent computers from being susceptible to viruses and other malicious software

  • The different software anti-malware includes are

    • Anti-virus 

    • Anti-spam 

    • Anti-spyware 

How does anti-malware work?

  • Anti-malware scans through email attachments, websites and downloaded files to search for issues

  • Anti-malware software has a list of known malware signatures to block immediately if they try to access your device in any way

  • Anti-malware will also perform checks for updates to ensure the database of known issues is up to date

What form of attack would this prevent?

  • Anti-malware would help prevent against any form of malicious software

Firewalls

What is a firewall?

  • A firewall is a barrier between a network and the internet

  • A firewall prevents unwanted traffic from entering a network by filtering requests to ensure they are legitimate

  • It can be both hardware and software and they are often used together to provide stronger security to a network

    • Hardware firewalls will protect the whole network and prevent unauthorised traffic

    • software firewalls will protect the individual devices on the network, monitoring the data going to and from each computer

What form of attack would this prevent?

  • Hackers

  • Malware

  • Unauthorised access to a network

  • DOS/DDOS attacks

User Access Levels & Passwords

What are user access levels?

  • User access levels ensure users of a network have designated roles on a network

  • Some examples of different levels of access to a school network include

    • Administrators: Unrestricted – Can access all areas of the network

    • Teaching Staff: Partially restricted – Can access all student data but cannot access other staff members’ data

    • Students: Restricted – Can only access their own data and files

What are passwords?

  • Passwords are a digital lock to prevent unauthorised access to an account

  • They are often stored as an encrypted/ciphered text entry in a database, ensuring that even with unauthorised access to a database, a hacker would not be able to gain access to the individual passwords of users

What form of attack would this prevent?

  • Data interception and theft

  • Physical security issues

Encryption

What is encryption?

  • Encryption is a method of converting plain text into ciphered text to be stored

  • Encryption uses complex mathematical algorithms to scramble the text

  • Asymmetric encryption, also known as private key, public key encryption is often used for web pages and other communication

What form of attack would this prevent?

  • Encryption plays a role in all forms of attack on a network

  • It is important to note that it does not prevent the attacks from occurring but it does stop the attacker from gaining access to the information

Physical Security

What is physical security?

  • Physical security is a method of physically preventing access to any part of a network

  • There are a range of physical security measures that can be implemented on a network

    • Locked doors: Preventing access to server rooms and cabinets of switches

    • Biometrics: Fingerprint scanners, facial recognition and retinal scans 

    • Surveillance Cameras: Monitoring the activity around the site where crucial networking hardware is located

What form of attack would this prevent?

  • Data interception and theft

  • Social engineering

Summary of attacks a preventative measures

Form of Attack

Preventative Measure

Malware

Anti-Malware Software
Firewalls
Encryption
Physical Security

Social Engineering

User Access Levels & Passwords
Physical Security

Brute-Force Attacks

User Access Levels & Passwords

Denial of Service Attacks

Firewalls

Data Interception & Theft

Encryption
Physical Security

SQL Injection

Penetration Testing
User Access Levels & Passwords

Worked Example

A web development company wants to protect their computer systems and data from unauthorised access.

Identify and describe two software-based security methods that the company can use to protect their computer systems and data. [6]

How to answer this question

  • You should give a security measure for one mark, then describe it for the additional two marks

  • You must do this for two different security measures to be able to achieve all 6 marks

Answers

  • Anti-malware

    • Scans for / identifies virus/spyware/malware

    • Compares data to a database of malware

    • Alerts user and requests action

    • Quarantines/deletes virus/spyware/malware

    • Stops the download of virus/spyware/malware

  • Firewall

    • Scans incoming and outgoing traffic

    • Compares traffic to a criteria

    • Blocks traffic that is unauthorised

    • Blocks incoming/outgoing traffic

  • Encryption

    • Scrambles data using an algorithm

    • So if intercepted it cannot be understood

    • Key needed to decrypt

  • User access levels

    • Data can be read/write/ read-write

    • Prevents accidental changes

    • Limits data users can access

  • Passwords/biometrics/authentication code/fingerprint

    • Has to be correctly entered to gain access

    • Strong password // letters, numbers, symbols // fingerprint is unique to individual

    • Harder/impossible for a brute-force attack to succeed

    • Lock after set number of failed attempts

Responses

您的邮箱地址不会被公开。 必填项已用 * 标注