Identifying & Preventing Vulnerabilities

Lesson Instructions

Watch and follow the YouTube video, the lesson contains three parts:

  1. Key Information and content - all you need to do here is watch and listen. We recommend you take some notes for this one!

  2. Learning activity - You are to write an article, including all elements on the guidance sheet.

  3. Consolidation - these are past exam question and are for deliberate practice to check your understanding.

Task - Article

Identifying and preventing vulnerabilities activity

Task - Exam Questions - Deliberate Practice

Exam Questions - Web

Mark Scheme

Question 1

  • Virus / trojan / worm / malware

    • Piece of software/code/a program that replicates itself // causes damage e g editing/deleting files

    • Running anti-virus/anti-malware software // don't download from unknown sources // don't click on unknown links

  • Spyware / malware keylogger

    • Piece of software/code/a program that records actions/key presses and sends this data to a third part/ for analysis

    • Running anti-spyware/anti-malware software/firewall

  • Data interception / passive

    • Data is sent to another device and is intercepted by a third party Encryption

  • Phishing

    • An e-mail has a link that when clicked directs the user to a fake website that collects personal data Network policy // firewall

  • Pharming

    • A piece of code installed that redirects user to fake website

    • That collects personal data Anti-mahvare // firewall

  • Hacker

    • Person attempting to gain unauthorised access to the network/computers/ data/files // unauthorised access and then deleting/editing data/files


Question 2

  • Firewall / strong password / biometrics / penetration testing

  • Brute force attack

  • Person/software using every combination of passwords to gain access

  • Firewall/Strong passwords

  • Social engineering

  • Person being the weak point of the system (or an example)

  • Strong passwords