Identifying & Preventing Vulnerabilities
Watch and follow the YouTube video, the lesson contains three parts:
Key Information and content - all you need to do here is watch and listen. We recommend you take some notes for this one!
Learning activity - You are to write an article, including all elements on the guidance sheet.
Consolidation - these are past exam question and are for deliberate practice to check your understanding.
Task - Article
Task - Exam Questions - Deliberate Practice
Virus / trojan / worm / malware
Piece of software/code/a program that replicates itself // causes damage e g editing/deleting files
Running anti-virus/anti-malware software // don't download from unknown sources // don't click on unknown links
Spyware / malware keylogger
Piece of software/code/a program that records actions/key presses and sends this data to a third part/ for analysis
Running anti-spyware/anti-malware software/firewall
Data interception / passive
Data is sent to another device and is intercepted by a third party Encryption
An e-mail has a link that when clicked directs the user to a fake website that collects personal data Network policy // firewall
A piece of code installed that redirects user to fake website
That collects personal data Anti-mahvare // firewall
Person attempting to gain unauthorised access to the network/computers/ data/files // unauthorised access and then deleting/editing data/files
Firewall / strong password / biometrics / penetration testing
Brute force attack
Person/software using every combination of passwords to gain access
Person being the weak point of the system (or an example)