Encryption and Data Security. (4 marks)
Explain how encryption can be used to secure data against threats like interception and unauthorised access.
Encryption and Data Security. (4 marks) Read More »
Explain how encryption can be used to secure data against threats like interception and unauthorised access.
Encryption and Data Security. (4 marks) Read More »
List and explain two physical security measures that can prevent unauthorised access to computer systems.
Physical Security. (2 marks) Read More »
Explain the importance of user interface design in operating systems. Include two features that enhance user experience.
User Interface. (2 marks) Read More »
Describe how an operating system manages memory and how this contributes to multitasking.
Memory Management. (2 marks) Read More »
Explain how anti-malware software can prevent data interception and theft.
Anti-Malware Software. (2 marks) Read More »
Discuss how firewalls can be configured to prevent SQL injection attacks. Include an explanation of what SQL injection is.
Firewalls and SQL Injection. (4 marks) Read More »
Explain how data interception can occur and outline two measures that can be implemented to prevent data theft.
Data Interception and Theft. (3 marks) Read More »
What is a SQL injection, and how can it affect a database?
SQL Injections. (2 marks) Read More »
Describe the process and purpose of penetration testing in the context of identifying and mitigating system vulnerabilities.
Penetration Testing. (3 marks) Read More »
What is a brute-force attack, and why is it effective against weak security systems?
Brute-force Attack. (2 marks) Read More »