Methods of Protecting Against Malware (2 marks)
Discuss two methods of protecting digital systems and data from malware.
Methods of Protecting Against Malware (2 marks) Read More »
Discuss two methods of protecting digital systems and data from malware.
Methods of Protecting Against Malware (2 marks) Read More »
Explain how encryption can be used to protect sensitive data within a digital system.
Encryption for Data Protection (2 marks) Read More »
What is the role of acceptable use policies in the context of cyber security, and how should they be implemented effectively?
Implementation of Acceptable Use Policies (3 marks) Read More »
Give one example of a backup procedure and explain how it contributes to the recovery process in the event of data loss.
Backup and Recovery Procedures (2 marks) Read More »
Explain how hackers can exploit unpatched software to carry out cyberattacks. Include one example of such a vulnerability in your answer.
Exploitation of Technical Vulnerabilities by Hackers (3 marks) Read More »
Describe one social engineering technique used by cyber attackers to trick users into compromising their own security.
Social Engineering Techniques (2 marks) Read More »
Discuss the role of physical security measures in protecting a network’s hardware and data.
Physical Security (3 marks) Read More »
Identify and explain one method of non-physical network protection.
Non-Physical Network Protection (2 marks) Read More »
Outline two different ways in which malware such as ransomware can pose a threat to digital systems.
Understanding Malware Threats (2 marks) Read More »
What is ethical hacking, and how does it differ from malicious hacking?
Ethical Hacking (1 mark) Read More »