Students need to understand:
  • identifying and preventing vulnerabilities:
    • penetration testing
    • network forensics
    • network policies
    • anti-malware software
    • firewalls
    • user access levels
    • passwords
    • encryption


Choose from the following to help you learn:

Books

CAMBRIDGE Computer Science:  
Page 211 Section "Securing a network" which continues right through to Page 215 including "Identifying vulnerabilities".
ROBSON & HEATHCOTE Computer Science (9-1):
Page 41. Section "Identifying and preventing vulnerabilitieswhich continues right through to the bottom of Page 44.
SUSAN ROBSON GCSE Computing(3rd edition): 
n/a
SUSAN ROBSON GCSE Computing(2012): 
n/a
AXSIED GCSE Computer Science (3rd edition) 
Page 39 - R20. Sections that mention prevention only, you looked at threats in an earlier activity
Page 41 - R21. Section "Anti-Virus software" and "Anti Malware software" bottom half of page

Page 43 - R22. Section "Firewalls" bottom half of page
Page 45 - R23. Section "Policies and user access levels" and "Penetration testing" bottom half of page

ROUSE & O'BYRNE GCSE(9-1) Computer Science:
Page 58-59. All sections.
Page 61. Section "Protecting against malwarewhich continues right through to the bottom of Page 62.
Page 66-67. Sections "Penetration testingand "Firewalls".

Web Sites

BBC Bitesize: Pages 3 & 4 Identifying and preventing vulnerabilities 
Cambridge MOOC: Section 52 Security Measures and Section 53 Network Policies
Wikipedia: Penetration testNetwork forensicsNetwork security policyAnti-malware strategiesFirewallPassword and Encryption(7 articles)
Simple Wikipedia: FirewallHow malware is stopped and Password (3 articles)
Techopedia: Penetration testingNetwork forensicsAcceptable Use PolicyAnti-malwareFirewall and Encryption (6 articles)
Cambridge Digital:  n/a
Teach-ICT:  Preventing vulnerabilities

YouTube

BBC WebWise - What is a Firewall: Watch all (1m09s) 
What is a pen-test: 
Watch from 0:22 to 3:37  
TheNewBoston: 
n/a
CraignDave: 
n/a
ComputerScienceTutor: 
Watch from 21:50 

MrMDKnight:  
Watch from 0:17  (Covers User Access Levels, Encryption, Passwords and Permissions)
Watch from 0:06 to 3:15 
 (Covers AUP, 


Last modified: Wednesday, 23 September 2020, 7:04 AM