Year 10
These resources will be removed by end of Summer Term 2025.
Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.
Lesson details
Key learning points
- In this lesson, we will discover different ways to protect software systems. This will include approaches to design and approaches to access.
Licence
This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.
Loading...
3 Questions
Q1.
What is malware an abbreviation of?
Malevolent hardware
Malevolent software
Malicious hardware
Q2.
Which of the sentences below most accurately represents a worm?
A type of malware that can be combated by constantly updating software
A very dangerous type of malware
Self-replicating malware that usually embeds itself into an existing software on a device and then, once that software is run, spreads to other executable files
Q3.
Which of the sentences below most accurately represents a virus?
A type of malware that can be combated by constantly updating software
A very dangerous type of malware
Self-replicating malware that does not need to infect an existing program but is able to spread very rapidly, infecting large numbers of machines
3 Questions
Q1.
Which of the following is the most accurate description of encryption?
Communicating only with certain people
Hiding messages from cybercriminals
Hiding secret messages
Q2.
How does input sanitisation tackle SQL injection?
By blocking any input that comes via the web
By ensuring that only correct data is input
By ensuring that programmers do not use SQL when designing a database
Q3.
Which of the following definitions describes asymmetric encryption?
Checking individual subprograms, subroutines, classes, or procedures in a program
Giving a number value to a key: each plain text letter is replaced by a new letter, the one found at the original letter's position in the alphabet plus or minus the value of the key
The use of an algorithm with one key