Save
Computer Science GCSE WJEC
Unit 1
Security and Data Management
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Evan Crecraft
Visit profile
Cards (28)
What is network security?
The measures to
protect
network data
View source
What is encryption?
Conversion of data into
cyphertext
View source
Why is compression used?
To reduce file size and increase
transfer speeds
View source
What is a backup?
A copy of
data
for recovery purposes
View source
What is archiving?
Storing
data
not in current use
View source
What does cybersecurity protect against?
Cyberattacks
on computer systems
View source
What is a cyberattack?
An attempt to gain
unauthorized
data access
View source
What is malware?
Software enabling a
cyberattack
View source
What are vulnerabilities in software?
Security flaws fixed by
patches
View source
What are cookies in web browsing?
Data identifying a
computer
for
websites
View source
What measures control network security risks?
Limiting
levels of access
Using
strong passwords
Encryption
View source
How is encryption demonstrated using the XOR operator?
By converting original data to
cyphertext
View source
What does a Disaster Recovery Plan cover?
Before:
risk analysis
,
preventative measures
, staff training
During: staff response,
contingency plans
After:
replacing hardware
, reinstalling software,
restoring data
View source
What are the types of compression?
Lossless
compression: no data loss
Lossy
compression: some data discarded
View source
What is the compression ratio formula?
Compression ratio =
Original size
/
Compressed size
View source
Why is lossy compression used for multimedia?
To reduce file size for
streaming
View source
What are the consequences of cyberattacks on businesses?
Loss of
reputation
and potential business failure
View source
What types of malware are used in cyberattacks?
Viruses
,
spyware
, and
trojans
View source
What are protections against malware?
Install
anti-virus software
Use a
firewall
Keep OS updated
Use latest browsers
Watch for
phishing emails
View source
What are common forms of cyberattacks?
Shoulder surfing
SQL Injection
Denial of Service (DoS)
Password attacks
IP Spoofing
Social engineering
View source
What is shoulder surfing?
Direct observation
to obtain information
View source
What is SQL Injection?
Injecting
commands
to
alter
SQL
statements
View source
What is a Denial of Service (DoS) attack?
Making a website
unavailable
to users
View source
What are password attacks?
Brute force
or
dictionary attacks
for passwords
View source
What is social engineering in cybersecurity?
Deception to trick
users
into revealing data
View source
What strategies identify vulnerabilities?
Footprinting
Ethical
hacking
Penetration testing
(targeted, internal, external, blind)
View source
What is IP Spoofing?
Changing IP address to
mislead users
View source
What is the secure by design approach?
Minimize vulnerabilities
Continuous testing
Adherence to
best programming practices
View source