what is a firewall
a combination of hardware and software that isolates an organisations internal network from the internet, allowing some packets and blocking others
what are two techniques a firewall will use
explain them
what is a proxy server
provides internet access to other computers on the network but is mostyly deployed to provide safety. it controls the information going in and out of the network
give the steps of a proxy server
what is encyrption
uses an algorithm to convert a message into a form that is not understandable without the key to decrypt it
what is symmetric encyption
the same key is used to encyrpt and decrypt a message
what are the problems with symmetric encryption
the key must be sent with the message so it is vulnerable to interception
what is asymmetric encyrption
one key is made publicily available and the other way is kept secret by its owner.
the communication will be made more secury by the use of a ……. attached to the end of the message
digtal signature
what does a digital signature do
confirms the identity of a sender and detects if a message has been changed
explain how to produce a digital signature
what is a computer virus
attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels
What is a digital certificate?
A file issued by a Certificate Authority (CA) that verifies the owner of a public key, ensuring secure communication.
what enables a virus to spread
a virus cannot be spread without human interaction
what is a worm
what is a trojan horse
whats the difference trojan horse has compared to viruses and worms
trojan horses do not reproduce by infecting other files nor do they self replicate
How can improved code quality, monitoring, and protection help prevent malware?
explain 4 different ways that a firewall can protect computers on a LAN (4 marks)
A business is worried about malware attacks. Give three methods they can use to protect their systems. (3 marks)
Use antivirus software to detect and remove threats. (1 mark)
Regularly update software to fix security vulnerabilities. (1 mark)
Train employees on phishing and social engineering risks. (1 mark)