Back to Computer SciencePractice this
Paper 2
Cybersecurity and Threats
BothSecurity is about prevention, detection, and response.
Key Facts
- Phishing uses fake messages to steal data.
- Strong passwords combine length, symbols, and unpredictability.
- Brute force attacks try every possible password.
- Two-factor authentication adds a second layer of security.
Topics Covered
Threats
What you need to know
- •Know malware types: virus, worm, trojan, spyware, ransomware.
- •Understand social engineering and phishing.
Exam Tips
- Describe the impact as well as the definition.
Prevention
What you need to know
- •Use anti-malware, firewalls, and secure passwords.
- •Apply updates and patches regularly.
Exam Tips
- Explain why updates reduce vulnerabilities.
Encryption
What you need to know
- •Encryption scrambles data using a key.
- •Understand symmetric and asymmetric encryption.
Exam Tips
- Explain how HTTPS protects data in transit.
Key Terms
malware
Malicious software designed to harm systems.
phishing
Tricking users into revealing sensitive information.
encryption
Scrambling data so only authorised users can read it.
Loading practice drills...
Common Exam Questions
Explain two methods to reduce the risk of phishing.
4 marksmediumPaper 2
Model Answer
Use spam filters and train users to check sender addresses and links.
What examiners want to see
- ✓Two methods
- ✓Explanation
Related Topics
Other topics you might find useful