Physical Security. (2 marks)
List and explain two physical security measures that can prevent unauthorised access to computer systems.
Physical Security. (2 marks) Read More »
List and explain two physical security measures that can prevent unauthorised access to computer systems.
Physical Security. (2 marks) Read More »
Explain how encryption can be used to secure data against threats like interception and unauthorised access.
Encryption and Data Security. (4 marks) Read More »
Discuss how firewalls can be configured to prevent SQL injection attacks. Include an explanation of what SQL injection is.
Firewalls and SQL Injection. (4 marks) Read More »
Explain how anti-malware software can prevent data interception and theft.
Anti-Malware Software. (2 marks) Read More »
Describe the process and purpose of penetration testing in the context of identifying and mitigating system vulnerabilities.
Penetration Testing. (3 marks) Read More »
What is a SQL injection, and how can it affect a database?
SQL Injections. (2 marks) Read More »
Explain how data interception can occur and outline two measures that can be implemented to prevent data theft.
Data Interception and Theft. (3 marks) Read More »
Describe a Denial of Service (DoS) attack and discuss one method an organisation can use to protect against such attacks.
Denial of Service Attacks. (2 marks) Read More »
What is a brute-force attack, and why is it effective against weak security systems?
Brute-force Attack. (2 marks) Read More »
Explain the concept of phishing and describe how it can be used to compromise computer security.
Social Engineering – Phishing. (3 marks) Read More »
Notifications