Save
AQA GCSE Computer Science
3.6 Cyber security
3.6.2 Methods to detect and prevent cyber security threats
Save
Share
Learn
Content
Leaderboard
Share
Learn
Cards (76)
Match the cybersecurity threat with its description:
Malware ↔️ Malicious software designed to disrupt or damage systems
Phishing ↔️ Attempts to trick users into revealing information
Denial-of-Service (DoS) ↔️ Overwhelms system resources to make them unavailable
Unauthorized Access ↔️ Gaining access to systems without permission
Antivirus software
uses
signature-based detection
to identify known virus patterns.
patterns
Using both antivirus and antimalware software is recommended for optimal
cybersecurity
protection.
True
A Denial-of-Service (DoS) attack overwhelms a system's
resources
Match the cybersecurity threat with its description:
Malware ↔️ Malicious software designed to disrupt systems
Phishing ↔️ Attempts to trick users into revealing information
DoS ↔️ Overwhelms system resources
Unauthorized Access ↔️ Gaining access without permission
Intrusion Detection Systems (IDS) monitor network traffic and system
logs
Order the steps involved in detecting an intrusion using a Network Intrusion Detection System (NIDS):
1️⃣ Monitor network traffic
2️⃣ Compare traffic to known attack patterns
3️⃣ Identify suspicious behavior
Match the type of IDS with its focus:
NIDS ↔️ Network-wide traffic
HIDS ↔️ Individual host activity
Signature-based detection identifies intrusions by comparing traffic to known
attack
patterns.
True
A Host Intrusion Detection System (HIDS) operates on individual
hosts
Antimalware software provides broader protection against various malicious
threats
Using both antivirus and antimalware software is recommended for comprehensive
cybersecurity
protection.
True
Order the main functions of a firewall:
1️⃣ Filtering network traffic
2️⃣ Controlling access
3️⃣ Protecting against cyber threats
What is the primary purpose of regular system backups?
Ensure data availability
Match the backup type with its description:
Full Backup ↔️ Complete copy of all data
Incremental Backup ↔️ Backs up only changed data since last backup
Differential Backup ↔️ Backs up all changed data since last full backup
Storing backups off-site is recommended to protect against physical disasters or
ransomware
attacks.
True
What is the main goal of employee security training?
Reduce human error
Phishing recognition is a key topic in
employee
security training.
True
Three main types of authentication factors in multi-factor authentication
1️⃣ Knowledge
2️⃣ Possession
3️⃣ Inherence
Why is MFA stronger than a single password?
It combines multiple factors
Cybersecurity threats aim to compromise the confidentiality, integrity, or
availability
What is malware designed to do?
Disrupt or damage systems
Detecting and preventing cybersecurity threats is crucial for protecting
digital assets
.
True
Match the type of IDS with its description:
NIDS ↔️ Monitors network traffic
HIDS ↔️ Operates on individual hosts
HIDS checks
system
logs and file integrity for suspicious actions.
True
What two detection methods does antivirus software use?
Signature-based and heuristic-based
Antimalware software often incorporates the capabilities of antivirus
software
Using both antivirus and
antimalware
software is crucial for comprehensive protection.
True
Match the type of software with its primary focus:
Antivirus ↔️ Viruses
Antimalware ↔️ Broad range of malware
A firewall filters network traffic based on source, destination, port, and
protocol
.
Why are regular system backups crucial for cybersecurity?
Ensuring data availability
Match the type of backup with its description:
Full Backup ↔️ Complete copy of all data
Incremental Backup ↔️ Backs up only changed data since last backup
Differential Backup ↔️ Backs up all changes since last full backup
Testing backups regularly is essential for ensuring data recovery in case of a
disaster
.
True
Match the security training topic with its description:
Phishing Recognition ↔️ Identifying phishing emails and scams
Password Hygiene ↔️ Creating and managing strong passwords
Cybersecurity threats
aim to compromise the
confidentiality
,
integrity
, or
availability
of computer systems, networks, or data.
data
Order the steps in detecting an intrusion using a Network Intrusion Detection System (NIDS):
1️⃣ Monitor network traffic
2️⃣ Compare traffic to known attack patterns
3️⃣ Identify deviations from normal behavior
4️⃣ Detect suspicious activity
Antimalware software
protects against a broader range of malicious threats than
antivirus
software.
True
Cybersecurity threats aim to compromise the
confidentiality
,
integrity
, or
availability
of computer systems, networks, or data.
integrity
Unauthorized access involves gaining access to systems or data without permission.
True
What is the primary aim of cybersecurity threats?
Compromise confidentiality, integrity, availability
See all 76 cards