Firewalls and SQL Injection. (4 marks)
Discuss how firewalls can be configured to prevent SQL injection attacks. Include an explanation of what SQL injection is.
Firewalls and SQL Injection. (4 marks) Read More »
Discuss how firewalls can be configured to prevent SQL injection attacks. Include an explanation of what SQL injection is.
Firewalls and SQL Injection. (4 marks) Read More »
Explain how anti-malware software can prevent data interception and theft.
Anti-Malware Software. (2 marks) Read More »
Describe the process and purpose of penetration testing in the context of identifying and mitigating system vulnerabilities.
Penetration Testing. (3 marks) Read More »
What is a SQL injection, and how can it affect a database?
SQL Injections. (2 marks) Read More »
Explain how data interception can occur and outline two measures that can be implemented to prevent data theft.
Data Interception and Theft. (3 marks) Read More »
Describe a Denial of Service (DoS) attack and discuss one method an organisation can use to protect against such attacks.
Denial of Service Attacks. (2 marks) Read More »
What is a brute-force attack, and why is it effective against weak security systems?
Brute-force Attack. (2 marks) Read More »
Explain the concept of phishing and describe how it can be used to compromise computer security.
Social Engineering – Phishing. (3 marks) Read More »
Describe how malware can pose a threat to computer systems. Include in your answer an example of a specific type of malware and the impact it can have on a device.
Malware. (2 marks) Read More »
Explain the four-layer TCP/IP model used in networking. Describe each layer and its primary function.
TCP/IP Model. (4 marks) Read More »