Lesson details

Key learning points

  1. In this lesson, we will discover different ways to protect software systems. This will include approaches to design and approaches to access.

Licence

This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.

Loading...

3 Questions

Q1.
What is malware an abbreviation of?
Malevolent hardware
Malevolent software
Malicious hardware
Correct answer: Malicious software
Q2.
Which of the sentences below most accurately represents a worm?
A type of malware that can be combated by constantly updating software
A very dangerous type of malware
Correct answer: Self-replicating malware that does not need to infect an existing program but is able to spread very rapidly, infecting large numbers of machines
Self-replicating malware that usually embeds itself into an existing software on a device and then, once that software is run, spreads to other executable files
Q3.
Which of the sentences below most accurately represents a virus?
A type of malware that can be combated by constantly updating software
A very dangerous type of malware
Self-replicating malware that does not need to infect an existing program but is able to spread very rapidly, infecting large numbers of machines
Correct answer: Self-replicating malware that usually embeds itself into an existing software on a device and then, once that software is run, spreads to other executable files

3 Questions

Q1.
Which of the following is the most accurate description of encryption?
Communicating only with certain people
Hiding messages from cybercriminals
Hiding secret messages
Correct answer: The process of encoding data or a message so that it cannot be understood by anyone other than its intended recipient
Q2.
How does input sanitisation tackle SQL injection?
By blocking any input that comes via the web
By ensuring that only correct data is input
By ensuring that programmers do not use SQL when designing a database
Correct answer: By including code that removes any SQL commands from the input data, preventing a hacker from gaining control of the database
Q3.
Which of the following definitions describes asymmetric encryption?
Checking individual subprograms, subroutines, classes, or procedures in a program
Giving a number value to a key: each plain text letter is replaced by a new letter, the one found at the original letter's position in the alphabet plus or minus the value of the key
Correct answer: The use of an algorithm to use two keys: a public key and a private key
The use of an algorithm with one key