Spyware (3 marks)
Describe spyware and how it can affect computer users.
Explain what a computer virus is and how it differs from a trojan.
Virus vs Trojan (3 marks) Read More »
Explain two methods that can be used to protect against malware.
Protecting Against Malware. (2 marks) Read More »
Explain how ‘shouldering’ can lead to a security breach, and provide one example of where it might occur.
Shouldering (2 Marks) Read More »
Phishing often involves the use of electronic communication. Describe a common characteristic of phishing emails that individuals should be aware of.
Phishing (2 Marks) Read More »
Explain the term ‘blagging’ as a form of social engineering.
Blagging (Pretexting) (1 Mark) Read More »
Discuss two methods that individuals or organisations can implement to protect against social engineering attacks.
Protecting Against Social Engineering (2 marks) Read More »
Describe the method by which social engineering can be used to compromise computer security.
Social Engineering Methodology (2 marks) Read More »
Define the term ‘social engineering’ in the context of computer security.
Define Social Engineering (1 mark) Read More »