Passwords, Double Authentication, and Encryption (4 marks)
Explain the significance of using strong passwords, double authentication, and encryption as security measures.
Passwords, Double Authentication, and Encryption (4 marks) Read More »
Explain the significance of using strong passwords, double authentication, and encryption as security measures.
Passwords, Double Authentication, and Encryption (4 marks) Read More »
Discuss how firewalls and user access levels can be used to protect a computer system.
Firewalls and User Access Levels (3 marks) Read More »
Compare the roles of network forensics and anti-malware software in protecting computer systems against security threats.
Network Forensics and Anti-Malware Software (4 marks) Read More »
Explain what penetration testing is and describe two benefits of incorporating it into the system development life cycle.
Penetration Testing (3 marks) Read More »
Explain the concepts of data interception and theft, and SQL injection, including their potential effects on computer systems.
Data Interception, Theft, and SQL Injection (4 marks) Read More »
Describe brute force attacks and denial of service attacks, highlighting how each impacts computer systems.
Brute Force and Denial of Service Attacks (4 marks) Read More »
Explain what phishing and social engineering are, and how they are used to compromise computer security.
Phishing and Social Engineering (4 marks) Read More »
Define malware and describe two types of malware that pose threats to computer systems.
Malware Threats (3 marks) Read More »
Describe the structure of a URL and discuss the role and function of a web browser in using URLs to access web content.
URL Structure and Function (4 marks) Read More »
Explain the purpose of Domain Name System (DNS) servers and describe how they function within a network.
Domain Name System (DNS) Servers (4 marks) Read More »
Notifications