OCR: Topic 20 Resources
Completion requirements
View
Students need to understand:
Choose from the following to help you learn:
SUSAN ROBSON GCSE Computing(3rd edition):
SUSAN ROBSON GCSE Computing(2012):
AXSIED GCSE Computer Science (3rd edition)
Cambridge MOOC: Section 52 Security Measures and Section 53 Network Policies
Wikipedia: Penetration test, Network forensics, Network security policy, Anti-malware strategies, Firewall, Password and Encryption. (7 articles)
Simple Wikipedia: Firewall, How malware is stopped and Password (3 articles)
Techopedia: Penetration testing, Network forensics, Acceptable Use Policy, Anti-malware, Firewall and Encryption (6 articles)
Cambridge Digital: n/a
Teach-ICT: Preventing vulnerabilities
What is a pen-test: Watch from 0:22 to 3:37
TheNewBoston: n/a
CraignDave: n/a
ComputerScienceTutor: Watch from 21:50
MrMDKnight:
Watch from 0:17
Watch from 0:06 to 3:15
identifying and preventing vulnerabilities:
penetration testing
network forensics
network policies
anti-malware software
firewalls
user access levels
passwords
encryption
Choose from the following to help you learn:
Books
CAMBRIDGE Computer Science:
Page 211 Section "Securing a network" which continues right through to Page 215 including "Identifying vulnerabilities".
ROBSON & HEATHCOTE Computer Science (9-1):Page 41. Section "Identifying and preventing vulnerabilities" which continues right through to the bottom of Page 44.
n/a
n/a
Page 39 - R20. Sections that mention prevention only, you looked at threats in an earlier activity
Page 41 - R21. Section "Anti-Virus software" and "Anti Malware software" bottom half of page
Page 43 - R22. Section "Firewalls" bottom half of page
Page 45 - R23. Section "Policies and user access levels" and "Penetration testing" bottom half of page
Page 41 - R21. Section "Anti-Virus software" and "Anti Malware software" bottom half of page
Page 43 - R22. Section "Firewalls" bottom half of page
Page 45 - R23. Section "Policies and user access levels" and "Penetration testing" bottom half of page
ROUSE & O'BYRNE GCSE(9-1) Computer Science:
Page 58-59. All sections.
Page 61. Section "Protecting against malware" which continues right through to the bottom of Page 62.
Page 66-67. Sections "Penetration testing" and "Firewalls".
Page 61. Section "Protecting against malware" which continues right through to the bottom of Page 62.
Page 66-67. Sections "Penetration testing" and "Firewalls".
Web Sites
BBC Bitesize: Pages 3 & 4 Identifying and preventing vulnerabilities
Cambridge MOOC: Section 52 Security Measures and Section 53 Network Policies
Wikipedia: Penetration test, Network forensics, Network security policy, Anti-malware strategies, Firewall, Password and Encryption. (7 articles)
Simple Wikipedia: Firewall, How malware is stopped and Password (3 articles)
Techopedia: Penetration testing, Network forensics, Acceptable Use Policy, Anti-malware, Firewall and Encryption (6 articles)
Cambridge Digital: n/a
Teach-ICT: Preventing vulnerabilities
YouTube
BBC WebWise - What is a Firewall: Watch all (1m09s)
What is a pen-test: Watch from 0:22 to 3:37
TheNewBoston: n/a
CraignDave: n/a
ComputerScienceTutor: Watch from 21:50
MrMDKnight:
Watch from 0:17
(Covers User Access Levels, Encryption, Passwords and Permissions)
Watch from 0:06 to 3:15
(Covers AUP,
Last modified: Wednesday, 23 September 2020, 7:04 AM