OCR: Topic 20 Resources

Students need to understand:
  • identifying and preventing vulnerabilities:
    • penetration testing
    • network forensics
    • network policies
    • anti-malware software
    • firewalls
    • user access levels
    • passwords
    • encryption

Choose from the following to help you learn:


CAMBRIDGE Computer Science: 
Page 211 Section "Securing a network" which continues right through to Page 215 including "Identifying vulnerabilities".
ROBSON & HEATHCOTE Computer Science (9-1):
Page 41. Section "Identifying and preventing vulnerabilities" which continues right through to the bottom of Page 44.
SUSAN ROBSON GCSE Computing(3rd edition):
SUSAN ROBSON GCSE Computing(2012):
AXSIED GCSE Computer Science (3rd edition)
Page 39 - R20. Sections that mention prevention only, you looked at threats in an earlier activity
Page 41 - R21. Section "Anti-Virus software" and "Anti Malware software" bottom half of page

Page 43 - R22. Section "Firewalls" bottom half of page
Page 45 - R23. Section "Policies and user access levels" and "Penetration testing" bottom half of page

ROUSE & O'BYRNE GCSE(9-1) Computer Science:
Page 58-59. All sections.
Page 61. Section "Protecting against malware" which continues right through to the bottom of Page 62.
Page 66-67. Sections "Penetration testing" and "Firewalls".

Web Sites

BBC Bitesize: All of Page 1 Prevention measures and Page 2 "Network policies. AUP. Archiving"
Cambridge MOOC: Section 52 Security Measures and Section 53 Network Policies
Wikipedia: Penetration test, Network forensics, Network security policy, Anti-malware strategies, Firewall, Password and Encryption. (7 articles)
Simple Wikipedia: Firewall, How malware is stopped and Password (3 articles)
Techopedia: Penetration testing, Network forensics, Acceptable Use Policy, Anti-malware, Firewall and Encryption (3 articles)
Cambridge Digital:  n/a
Teach-ICT:  Preventing vulnerabilities


BBC WebWise - What is a Firewall: Watch all (1m09s) https://youtu.be/6UtiQwCX2wU

What is a pen-test:
Watch from 0:22 to 3:37
Watch from 21:50

Watch from 0:17 (Covers User Access Levels, Encryption, Passwords and Permissions)
Watch from 0:06 to 3:15
(Covers AUP,

Last modified: Sunday, 8 October 2017, 11:15 AM