Back to Computer Science

Paper 2

Cybersecurity and Threats

Both
Practice this
Server room with blue lights

Security is about prevention, detection, and response.

Key Facts

  • Phishing uses fake messages to steal data.
  • Strong passwords combine length, symbols, and unpredictability.
  • Brute force attacks try every possible password.
  • Two-factor authentication adds a second layer of security.

Topics Covered

Threats

What you need to know

  • Know malware types: virus, worm, trojan, spyware, ransomware.
  • Understand social engineering and phishing.

Exam Tips

  • Describe the impact as well as the definition.

Prevention

What you need to know

  • Use anti-malware, firewalls, and secure passwords.
  • Apply updates and patches regularly.

Exam Tips

  • Explain why updates reduce vulnerabilities.

Encryption

What you need to know

  • Encryption scrambles data using a key.
  • Understand symmetric and asymmetric encryption.

Exam Tips

  • Explain how HTTPS protects data in transit.

Key Terms

malware

Malicious software designed to harm systems.

phishing

Tricking users into revealing sensitive information.

encryption

Scrambling data so only authorised users can read it.

Loading practice drills...

Common Exam Questions

Explain two methods to reduce the risk of phishing.

4 marksmediumPaper 2

Model Answer

Use spam filters and train users to check sender addresses and links.

What examiners want to see

  • Two methods
  • Explanation

Related Topics

Other topics you might find useful

Ready to test your knowledge?

Try exam-style questions on this topic in exam mode

Start Exam Mode