GCSE Algorithms

How to solve problems

GCSE Algorithms
Everything you need to learn for this unit…
6 - Fundamentals of cyber security

Be able to define the term cyber security and be able to describe the main purposes of cyber security.
Students should know that cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.

6.1 Cyber security threats

Understand and be able to explain the following cyber security threats:
~ social engineering techniques
~ malicious code
~ weak and default passwords
~ misconfigured access rights
~ removable media
~ unpatched and/or outdated software.

Explain what penetration testing is and what it is used for.

Penetration testing is the process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access.
Students should understand that the aim of a white-box penetration test is to simulate a malicious insider who has knowledge of and possibly basic credentials for the target system.
Students should understand that the aim of a black-box penetration test is to simulate an external hacking or cyber warfare attack.

6.1.1 Social engineering

Define the term social engineering. Describe what social engineering is and how it can be protected against. Explain the following forms of social engineering:
~ blagging (pretexting)
~ phishing
~ pharming
~ shouldering (or shoulder surfing).

Students should know that social engineering is the art of manipulating people so they give up confidential information.

Blagging is the act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.
Phishing is a technique of fraudulently obtaining private information, often using email or SMS.
Pharming is a cyberattack intended to redirect a website's traffic to another, fake site.
Shouldering is observing a person's private information over their shoulder eg cashpoint machine PIN numbers.

6.1.2 Malicious code

Define the term 'malware'.
Describe what malware is and how it can be protected against.
Describe the following forms of malware:
~ computer virus
~ trojan
~ spyware
~ adware.

Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software.

6.2 Methods to detect and prevent cyber security threats

Understand and be able to explain the following security measures:
~ biometric measures (particularly for mobile devices)
~ password systems
~ CAPTCHA (or similar)
~ using email confirmations to confirm a user’s identity
~ automatic software updates.

1.1 Algorithms, Decomposition and Abstraction
Looking at computational thinking…
1.2 Developing algorithms using flowcharts
How to communicate your algorithm…
1.3 Developing algorithms using pseudocode
How to communicate your algorithm…
1.4 Searching Algorithms
Common algorithms for searching data…
1.5 Sorting Algorithms
Common algorithms for sorting data…
1.6 Unit Assessment
Checking your understanding…
If you need to get in touch with Mr McG then this is the way….

What's your name?
Thank you [name], that's great.

Can I ask where you are from?
Hey [name], can I ask where you are from?
Hey [name], which class are you in?
OK [name], thanks for that.

I will need your email address so I can get back to you!!
Thanks [name], nearly there.

What can I help you with?

Thanks [name] from [whichclass][location], Mr McG will get your message…"
[message]"…and will get back to you ASAP via [email]. Catch you soon.

Thank you [name], Mr McG got your message.
Thanks [name], Mr McG will get back to you as soon as he can!!

Have a great day!!

K McGuinness - 2018

No personal data will be shared with any third party. The only data processed via this website is anonymous browsing data to best manage your user experience.