Revision tools
			
				You can print this page for a quick reference guide or you can use the tools below to create printable test sheets
			
		
		 
		3a: Explain the difference between data and information
| Keyword | Definition | 
|---|
| data | raw facts and figures | 
| information | processed data with added meaning | 
3b: Critique online services in relation to data privacy
| Keyword | Definition | 
|---|
| critique | closely analyse in a way that finds any problems | 
| data | facts and figures | 
| data breach | where personal data has been shared without permission | 
| online service | website, app or web server | 
| personal information | data that might be used to identify someone | 
| privacy | keeping personal information private | 
3c: Identify what happens to data entered online
| Keyword | Definition | 
|---|
| access | who is allowed to view data once it's stored | 
| backup | storing additional copies of data in case it needs to be recovered | 
| data | facts and figures that a web service might need to store | 
| removal | if and when data is deleted | 
| retention | how long data is stored for | 
| storage | where and how data is stored | 
3d: Explain the need for the Data Protection Act
| Keyword | Definition | 
|---|
| accuracy | keeping data up to date | 
| consent | permission to collect and store data | 
| Data Protection Act | legislation (law) which determines how personal data is collected, stored and used | 
| retention | how long data is stored before it's removed | 
| security | how data is protected from unauthorised access | 
| usage | how data is used | 
3e: Recognise how human errors pose security risks to data
| Keyword | Definition | 
|---|
| blagging | a message that tries to build up a personal relationship with someone so that they trust them enough to share money or personal data with them | 
| name generator attack | getting people to enter personal information in a fun game or app which can then be used to guess their password or security question answers | 
| phishing | a message that often pretends to be from a trustworthy source but which contains dangerous links to steal personal information or scam people | 
| PIN | personal identification number | 
| security risk | a weakness in security due to human or technical error | 
| shoulder surfing | watching someone as they enter a PIN or password | 
| social engineering | tricking people into handing over personal information that can then be used for fraud | 
3f: Implement strategies to minimise the risk of data being compromised through human error
| Keyword | Definition | 
|---|
| blacklist | blocking messages from unreliable sources | 
| data breach | when security has been compromised so personal data has been shared without permission | 
| data policy | rules which people in an organisation or business have to stick to in order to make sure data security isn't compromised | 
| email filter | checking all email messages to block messages that may contain security risks | 
| human error | when someone makes a mistake that leads to unauthorised access to data | 
| training | educating people about the risks | 
| whitelist | only allowing messages from reliable sources | 
3g: Define hacking in the context of cyber security
| Keyword | Definition | 
|---|
| authorised access | reading / changing data when you have permission to do so | 
| computer system | hardware and software | 
| hacking | Gaining unauthorised access to or control of a computer system | 
| unauthorised access | reading / changing data when you do not have permission | 
3h: Explain how a DDoS attack can impact users of online services
| Keyword | Definition | 
|---|
| DDoS | Distributed Denial of Service (an attack that attempts to take down a web service, launched from multiple sources at the same time) | 
| Denial | preventing other people from accessing | 
| Distributed | spreading out an attack so that it is launched from multiple sources | 
| DoS | Denial of Service (an attack that attempts to take down a web service) | 
| Service | a website or online application | 
3i: Identify strategies to reduce the chance of a brute force attack being successful
| Keyword | Definition | 
|---|
| brute force | type of attack where all combinations of a password are tried until the correct one is found | 
| complexity | avoiding common sequences and including a variety of capitals, numbers and symbols makes passwords harder for a brute force algorithm to detect | 
| dictionary attack | type of brute force attack where a list of common words or phrases are combined to try to guess a password | 
| length | longer passwords take longer for a brute force algorithm to detect | 
| strategies | plans and steps that can be taken | 
3j: Explain the need for the Computer Misuse Act
| Keyword | Definition | 
|---|
| Computer Misuse Act | UK law passed in 1990 which makes it illegal to misuse a computer system or network without permission | 
| Section 1 | Part of the Computer Misuse Act which makes it illegal to gain unauthorised access to data | 
| Section 2 | Part of the Computer Misuse Act which makes it illegal to gain unauthorised use of a computer to commit or facilitate another offence | 
| Section 3 | Part of the Computer Misuse Act which makes it illegal to perform unauthorised acts with intent to impair the operation of a computer | 
| unauthorised | without permission from the person who owns a computer or network | 
3k: List the common malware threats
| Keyword | Definition | 
|---|
| Adware | a form of malware which displays adverts on a user's computer | 
| Malicious | deliberately harmful | 
| Malware | malicious software that is designed to gain access to your computer with malicious intent | 
| Ransomware | a form of malware which encrypts user data and demands payment before they can access it again | 
| Self replicate | the ability of some malware to copy itself and spread to infect other computers or programs | 
| Spyware | a form of malware which shares user data without their permission | 
| Trojan Horse | a form of malware that tricks you into installing it so that it can give someone else remote control over your computer | 
| Virus | A form of malware which, when run by a user, infect other programs to self-replicate and cause damage | 
| Worm | A form of malware which is able to self replicate without needing to be run by the user | 
3l: Examine how different types of malware causes problems for computer systems
| Keyword | Definition | 
|---|
| Adware | type of malware which causes additional adverts or popups to appear which might irritate users and slow down their computer | 
| Malware | malicious software which might disable hardware, steal data, show unwanted adverts, send spam or demand payment | 
| Ransomware | type of malware which encrypts users files and demands payment before they can decrypt and access them again | 
| Spyware | type of malware which collects and shares user data without permission | 
| Trojan Horse | type of malware which opens a back door to your computer so hackers can control it or access your data remotely | 
| Virus | type of malware which can infect a computer by copying itself into other programs and trigger other malware | 
| Worm | type of malware which spreads through a network using up the system's resources | 
3m: Question how malicious bots can have an impact on societal issues
| Keyword | Definition | 
|---|
| Bot | automated program that performs tasks repeatedly | 
| bot herder | a malicious attacker who controls a botnet to launch a DDoS attack | 
| botnet | network of malware infected computers which can be remotely controlled | 
| chat bot | helpful bot which provides advice or support online | 
| DDOS | distributed denial of service attack which tries to overwhelm a computer system with loads of traffic from multiple sources the same time | 
| Malicious bot | automated program that performs a malicious task repeatedly | 
| shop bot | useful bot which monitors prices of products at different online stores | 
| web crawler | friendly bot which constantly searches the internet for new web pages to add to a search engine | 
| zombie | a malware infected computer which can be remotely controlled as part of a botnet | 
3n: Compare security threats against probability and the potential impact to organisations
| Keyword | Definition | 
|---|
| high impact | type of threat that can severely disrupt a business or organisation if it occurred | 
| high probability | type of threat that is very likely to occur | 
| low impact | type of threat that might not disrupt a business or organisation much at all | 
| low probability | type of threat that is unlikely to occur | 
| security threat | risk of a cyber attack occuring | 
3o: Explain how networks can be protected from common security threats
| Keyword | Definition | 
|---|
| anti malware | software which detects and removes malware on a computer | 
| authentication | making users log in before they can access data | 
| auto updates | a setting which tells a computer to keep installing the latest security updates | 
| firewall | network traffic filter which allows or blocks connections to and from remote computers | 
| permissions | restricting access to certain files and folders based on user groups | 
| quarantine | temporarily preventing access to certain files to prevent the spread of malware | 
| virus definitions | details of how to detect viruses which need to be regularly updated to protect against recent threats | 
3p: Identify the most effective methods to prevent cyberattacks
| Keyword | Definition | 
|---|
| anti-malware | software which can detect and remove malware on a computer | 
| auto updates | telling a computer to install the latest updates automatically so that insecure software can be fixed | 
| biometrics | using fingerprints, iris scanning or other unique biological identifiers to log in a user | 
| CAPTCHA | completely automated public turing test to tell the difference between people trying to log in and malicious software trying all password combinations | 
| cost benefit analysis | working out if it's worth spending money to get the advantages it brings | 
| firewall | a filter on network traffic which blocks or allows connections to and from computers based on a set of rules | 
| password rules | requirements for passwords to make them harder for hackers to guess | 
| staff training | educating users how to choose secure passwords and keep their login details safe | 
| two factor authentication | making a user confirm that they are trying to log in using text, phone or app after they've put in their password |