Year 10
Lesson details
Key learning points
- In this lesson, we will find out about ways to protect network systems from cybercrime. We will learn about the importance of network security before looking at a number of ways to achieve network security.
Licence
This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.
Loading...
3 Questions
Q1.
Which of the following is the most accurate description of encryption?
Communicating only with certain people
Hiding messages from cybercriminals
Hiding secret messages
Q2.
How does input sanitisation tackle SQL injection?
By blocking any input that comes via the web
By ensuring that only correct data is input
By ensuring that programmers do not use SQL when designing a database
Q3.
Which of the following definitions describes asymmetric encryption?
Checking individual subprograms, subroutines, classes, or procedures in a program
Giving a number value to a key: each plain text letter is replaced by a new letter, the one found at the original letter's position in the alphabet plus or minus the value of the key
The use of an algorithm with one key
3 Questions
Q1.
Which of the following most accurately defines an acceptable use policy?
It allows an organisation to resume business quickly during or after a disaster, which could include a cyberattack.
It is an archiving policy that determines how long data can be kept for.
It usually contains both an archiving policy and a network use policy.
Q2.
Tick all the three correct firewall-related sentences below.
A firewall can only be software.
Q3.
Firewalls stop viruses from entering the network
True