Lesson details

Key learning points

  1. In this lesson, we will find out about ways to protect network systems from cybercrime. We will learn about the importance of network security before looking at a number of ways to achieve network security.

Licence

This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.

Loading...

3 Questions

Q1.
Which of the following is the most accurate description of encryption?
Communicating only with certain people
Hiding messages from cybercriminals
Hiding secret messages
Correct answer: The process of encoding data or a message so that it cannot be understood by anyone other than its intended recipient
Q2.
How does input sanitisation tackle SQL injection?
By blocking any input that comes via the web
By ensuring that only correct data is input
By ensuring that programmers do not use SQL when designing a database
Correct answer: By including code that removes any SQL commands from the input data, preventing a hacker from gaining control of the database
Q3.
Which of the following definitions describes asymmetric encryption?
Checking individual subprograms, subroutines, classes, or procedures in a program
Giving a number value to a key: each plain text letter is replaced by a new letter, the one found at the original letter's position in the alphabet plus or minus the value of the key
Correct answer: The use of an algorithm to use two keys: a public key and a private key
The use of an algorithm with one key

3 Questions

Q1.
Which of the following most accurately defines an acceptable use policy?
It allows an organisation to resume business quickly during or after a disaster, which could include a cyberattack.
It is an archiving policy that determines how long data can be kept for.
Correct answer: It states how a network may be used including what is and what is not acceptable, e.g. online shopping or gambling.
It usually contains both an archiving policy and a network use policy.
Q2.
Tick all the three correct firewall-related sentences below.
Correct answer: A firewall blocks unexpected connections coming into the network; most operating systems include a firewall.
A firewall can only be software.
Correct answer: A firewall sits between a local network or computer and another network, controlling incoming and outgoing network traffic.
Correct answer: A firewall’s rules determine which traffic is allowed through and which isn’t.
Q3.
Firewalls stop viruses from entering the network
Correct answer: False
True

Lesson appears in

UnitComputing / Security

Computing