Methods of Protecting Digital Systems (Edexcel GCSE Computer Science)
Revision Note
Anti-Malware
What is anti-malware software?
Anti-malware software is a term used to describe a combination of different software to prevent computers from being susceptible to viruses and other malicious software
The different software anti-malware includes are
Anti-virus
Anti-spam
Anti-spyware
How does anti-malware work?
Anti-malware scans through email attachments, websites and downloaded files to search for issues
Two ways anti malware can approach the task are:
Use a list of known unique malware fingerprints (signatures) to block immediately if they try to access your device in any way
Monitor the behaviour of programs to identify suspicious activities that might indicate malware such as;
Rapid deletion/modification of files
Attempts to access sensitive data/resources
Communicating with known malicious servers
Anti-malware will also perform checks for updates to ensure the database of signatures is up to date
Encryption
What is encryption?
Encryption is the process of encoding data so that it cannot be read by anyone not in possession of the decryption key
Encryption uses complex mathematical algorithms to scramble the text
Asymmetric encryption, also known as private key, public key encryption is often used for web pages and other communication
When can encryption be used?
Encryption should be used in any situation where sensitive data is being transmitted across a network
Examples include:
Passwords
Bank details
Personal information
Acceptable Use Policies (AUP)
What is an acceptable use policy (AUP)?
An acceptable use policy is a document that outlines what is and isn't acceptable behaviour when using a computer on a network
AUPs are typically used by organisations to make expectations of responsible technology use clear
AUPs do not stop the misuse of computes, however they provide a way of holding people accountable if rules are violated
It is often a requirement of a business or school for employees/students to sign, signifying acceptance of the terms and conditions for using the network
An AUP can cover aspects such as:
Acceptable file downloads
Restrictions on personal use of company resources
Data security practices etc.
Backup & Recovery Procedures
What are backup & recovery procedures?
Backup and recovery procedures are put in place by organisations to set out the steps to take in case of a situation that could lead to data loss
Situations include:
Hardware failure
Software issues
Cyberattacks
Natural disasters
Information relating to backups can be found here
Example recovery procedures that can be put in to place include:
RAID - Redundant Array of Independent Disks (RAID) is a method of combining multiple hard drives to keep copies of data, if one drive fails it is safe because you have copies on other drives
Off-site storage - Storing data off-site, using remote data centres (cloud) to safeguard data from events such as fire/flood
Stand-by equipment/premises - Spare computers or components that can be used to replace primary equipment in the event of failure or buildings that can be used temporarily in the event of the main building becoming unusable
Worked Example
Explain TWO reasons why schools or businesses might have an Acceptable Use Policy (AUP) for their computers and networks [2]
Answer
To protect their IT systems
To ensure responsible user behaviour
Last updated:
You've read 0 of your 10 free revision notes
Unlock more, it's free!
Did this page help you?