Methods of Protecting Digital Systems (Edexcel GCSE Computer Science)

Revision Note

Robert Hampton

Written by: Robert Hampton

Reviewed by: James Woodhouse

Anti-Malware

What is anti-malware software?

  • Anti-malware software is a term used to describe a combination of different software to prevent computers from being susceptible to viruses and other malicious software

  • The different software anti-malware includes are

    • Anti-virus 

    • Anti-spam 

    • Anti-spyware 

How does anti-malware work?

  • Anti-malware scans through email attachments, websites and downloaded files to search for issues

  • Two ways anti malware can approach the task are:

    • Use a list of known unique malware fingerprints (signatures) to block immediately if they try to access your device in any way

    • Monitor the behaviour of programs to identify suspicious activities that might indicate malware such as;

      • Rapid deletion/modification of files

      • Attempts to access sensitive data/resources

      • Communicating with known malicious servers

  • Anti-malware will also perform checks for updates to ensure the database of signatures is up to date

Encryption

What is encryption?

  • Encryption is the process of encoding data so that it cannot be read by anyone not in possession of the decryption key

  • Encryption uses complex mathematical algorithms to scramble the text

  • Asymmetric encryption, also known as private key, public key encryption is often used for web pages and other communication

When can encryption be used?

  • Encryption should be used in any situation where sensitive data is being transmitted across a network

  • Examples include:

    • Passwords

    • Bank details

    • Personal information

Acceptable Use Policies (AUP)

What is an acceptable use policy (AUP)?

  • An acceptable use policy is a document that outlines what is and isn't acceptable behaviour when using a computer on a network

  • AUPs are typically used by organisations to make expectations of responsible technology use clear

  • AUPs do not stop the misuse of computes, however they provide a way of holding people accountable if rules are violated

  • It is often a requirement of a business or school for employees/students to sign, signifying acceptance of the terms and conditions for using the network

  • An AUP can cover aspects such as:

    • Acceptable file downloads

    • Restrictions on personal use of company resources

    • Data security practices etc.

Backup & Recovery Procedures

What are backup & recovery procedures?

  • Backup and recovery procedures are put in place by organisations to set out the steps to take in case of a situation that could lead to data loss

  • Situations include:

    • Hardware failure

    • Software issues

    • Cyberattacks

    • Natural disasters

  • Information relating to backups can be found here

  • Example recovery procedures that can be put in to place include:

    • RAID - Redundant Array of Independent Disks (RAID) is a method of combining multiple hard drives to keep copies of data, if one drive fails it is safe because you have copies on other drives

    • Off-site storage - Storing data off-site, using remote data centres (cloud) to safeguard data from events such as fire/flood

    • Stand-by equipment/premises - Spare computers or components that can be used to replace primary equipment in the event of failure or buildings that can be used temporarily in the event of the main building becoming unusable

Worked Example

Explain TWO reasons why schools or businesses might have an Acceptable Use Policy (AUP) for their computers and networks [2]

Answer

  • To protect their IT systems

  • To ensure responsible user behaviour

Last updated:

You've read 0 of your 5 free revision notes this week

Sign up now. It’s free!

Join the 100,000+ Students that ❤️ Save My Exams

the (exam) results speak for themselves:

Did this page help you?

Robert Hampton

Author: Robert Hampton

Expertise: Computer Science Content Creator

Rob has over 16 years' experience teaching Computer Science and ICT at KS3 & GCSE levels. Rob has demonstrated strong leadership as Head of Department since 2012 and previously supported teacher development as a Specialist Leader of Education, empowering departments to excel in Computer Science. Beyond his tech expertise, Robert embraces the virtual world as an avid gamer, conquering digital battlefields when he's not coding.

James Woodhouse

Author: James Woodhouse

Expertise: Computer Science

James graduated from the University of Sunderland with a degree in ICT and Computing education. He has over 14 years of experience both teaching and leading in Computer Science, specialising in teaching GCSE and A-level. James has held various leadership roles, including Head of Computer Science and coordinator positions for Key Stage 3 and Key Stage 4. James has a keen interest in networking security and technologies aimed at preventing security breaches.