gcse 8525 paper 2 | slr4 cyber security year 12 ict
TRANSCRIPT
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
Name:
Specification & learning objectives
By the end of this topic you will be able to:
Be able to define the term cyber security and be able to describe the main purposes of cyber security.Understand and be able to explain the following cyber security threats: • social engineering techniques • malicious code (malware) • pharming • weak and default passwords• misconfigured access rights • removable media • unpatched and/or outdated software
Explain what penetration testing is and what it is used forDefine the term social engineeringDescribe what social engineering is and how it can be protected againstExplain the following forms of social engineering: • blagging (pretexting) • phishing • shouldering (or shoulder surfing).
Define the term malwareDescribe what malware is and how it can be protected againstDescribe the following forms of malware: • computer virus • trojan • spyware.
Understand and be able to explain the following security measures: • biometric measures (particularly for mobile devices) • password systems • CAPTCHA (or similar)• using email confirmations to confirm a user’s identity • automatic software updates
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
Cyber security
Definition of the main purpose of cyber security:
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
The Hackers Handbook: front cover
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
The Hackers Handbook: page 1 – cyber security threats
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
The Hackers Handbook: page 2 – social engineering: blagging (pretexting)
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
The Hackers Handbook: page 3 – social engineering: phishing
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
The Hackers Handbook: page 4 – social engineering: pharming
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
The Hackers Handbook: page 5 – social engineering: shouldering (or shoulder surfing)
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
The Hackers Handbook: page 6 - Malware
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
The Hackers Handbook: page 7 – Computer virus
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
The Hackers Handbook: page 8 – trojan
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
The Hackers Handbook: page 9 – spyware
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
The Hackers Handbook: back cover
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
Social engineering techniques
Social engineering refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access. It is often one of many steps in a more complex fraud operation.
List of mistakes that people make with system security:
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
Penetration testing
Pentation testing is the process of:
White BoxPenetration
Testing
Black BoxPenetration
Testing
GCSE 8525 Paper 2 | SLR4 Cyber security Craig’n’DaveYear 12 ICT – Cyber Security
Security measures
Common security measures which are often used to help prevent unauthorised access include:
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks
Name:
Specification & learning objectives
By the end of this topic you will be able to:Define what a computer network isDiscuss the advantages and disadvantages of computer networksDescribe the main types of computer network including: • Personal Area Network (PAN) • Local Area Network (LAN) • Wide Area Network (WAN)Understand that networks can be wired or wireless.Discuss the advantages and disadvantages of wireless networks as opposed to wired networks.Describe the following common LAN topologies: • star • busUnderstand the need for, and importance of, network securityExplain the following methods of network security: • authentication • encryption • firewall • MAC address filtering
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks
The advantages of computer networks include:
A computer network is:
About networks
The disadvantages of networks computer include:
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks
Types of networks
Representation of a Local Area Network (LAN): Representation of a Wide Area Network (WAN):
Description of a local area network: Description of a wide area network:
Computers that are not connected to a network are called stand-alone computers.
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks
Types of networks
A Personal Area Network (PAN) is:
The most common technology used in a wireless PAN is:
The major limitation with this technology is:
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks
Hardware for a local area network
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks
Advantages and disadvantages of wired versus wireless connection
Green indicates advantages, red indicates disadvantages.
Advantages: Advantages:
Disadvantages: Disadvantages:
Wired networks Wireless networks
Transfer speeds tend to be faster on this type of network.
More secure / easier to secure this type of network.
Connections and connection speeds tend to be more reliable.
Users location is limited by need for a cable connection.
Lots of cables, connections, ports and more physical hardware needed.
Generally less convenient to share files as physical connection required.
Users can access network from anywhere within range.
Far less complicated physically, less disruptive to set up.
Tends to be easier to share files as physical connections not required.
Transfer speeds to be slower on this type of network.Less secure / more steps need to be taken to make sure its secure.
Connection tends to be less reliable and can easily be blocked by walls and other physical infrastructure.
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks
Star network topology
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks
Bus network topology
Terminator
Server
Printer
Workstation
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks
Star vs Bus network topology
Advantages Disadvantages
Star network:
Advantages Disadvantages
Bus network:
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks
Wireless networks
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks
Network security
Making sure any network is secure is an essential task. Networks by their very nature are much more vulnerable to than a
system. This is because a potential hacker could have the ability to access any device of an unsecure network via a single
of entry.
Once a way into a network has been found the potential implications are serious from the installation of causing corruption
and damage through to .
There are many goals to network security, but they two mains ones are to make sure are able to access everything they need
and on the flip side to prevent to any area of the network.
Various methods and techniques can be used to help increase and maintain a networks security, important ones include using ,
files and data traffic, implementing a robust and strong and setting up
.
GCSE 8525 Paper 2 | SLR3 Computer networks, protocols and layers Craig’n’DaveYear 12 ICT – Networks
Methods of network security
Authentication Firewall
Encryption MAC address filtering
[picture here]
When it would be used:
[picture here]
When it would be used:
[picture here]
When it would be used:
[picture here]
When it would be used: