Passwords, Double Authentication, and Encryption (4 marks)
Explain the significance of using strong passwords, double authentication, and encryption as security measures.
Passwords, Double Authentication, and Encryption (4 marks) Read More »
Explain the significance of using strong passwords, double authentication, and encryption as security measures.
Passwords, Double Authentication, and Encryption (4 marks) Read More »
Discuss how firewalls and user access levels can be used to protect a computer system.
Firewalls and User Access Levels (3 marks) Read More »
Compare the roles of network forensics and anti-malware software in protecting computer systems against security threats.
Network Forensics and Anti-Malware Software (4 marks) Read More »
Explain what penetration testing is and describe two benefits of incorporating it into the system development life cycle.
Penetration Testing (3 marks) Read More »
Explain the concepts of data interception and theft, and SQL injection, including their potential effects on computer systems.
Data Interception, Theft, and SQL Injection (4 marks) Read More »
Describe brute force attacks and denial of service attacks, highlighting how each impacts computer systems.
Brute Force and Denial of Service Attacks (4 marks) Read More »
Explain what phishing and social engineering are, and how they are used to compromise computer security.
Phishing and Social Engineering (4 marks) Read More »
Define malware and describe two types of malware that pose threats to computer systems.
Malware Threats (3 marks) Read More »
Give one example of a backup procedure and explain how it contributes to the recovery process in the event of data loss.
Backup and Recovery Procedures (2 marks) Read More »
What is the role of acceptable use policies in the context of cyber security, and how should they be implemented effectively?
Implementation of Acceptable Use Policies (3 marks) Read More »