5.3

Security

10 flashcards to master Security

Smart Spaced Repetition

Rate each card Hard, Okay, or Easy after flipping. Your progress is saved and cards are scheduled for optimal review intervals.

Definition Flip

Define the term 'malware' and give two examples.

Answer Flip

'Malware' is any software intentionally designed to cause damage to a computer, server, client, or computer network. Examples include viruses, worms, Trojans, and ransomware.

Key Concept Flip

Explain the difference between a virus and a worm.

Answer Flip

A virus requires a host program to infect and spread, while a worm is a self-replicating program that can spread independently across a network without needing a host. Worms exploit vulnerabilities to self-propagate, often causing network congestion.

Definition Flip

Describe what a Trojan horse is and how it deceives users.

Answer Flip

A Trojan horse disguises itself as legitimate software to trick users into installing it. Once installed, it can perform malicious actions like stealing data, installing other malware, or granting unauthorized access to the system.

Definition Flip

What is spyware and what are its potential consequences?

Answer Flip

Spyware is software that secretly monitors and collects user information, such as browsing history, passwords, and financial details. It can lead to identity theft, financial loss, and compromised privacy.

Definition Flip

Explain what ransomware is and how it affects a user's data.

Answer Flip

Ransomware is a type of malware that encrypts a victim's files, making them inaccessible until a ransom is paid to the attacker. It can cripple businesses and individuals by holding their data hostage.

Definition Flip

Describe the technique of 'phishing' and give an example.

Answer Flip

Phishing involves deceiving users into revealing sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in an electronic communication. An example is an email pretending to be from a bank asking you to update your account details.

Definition Flip

What is a firewall and how does it enhance computer security?

Answer Flip

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps protect a network from unauthorized access, malware, and other cyber threats.

Definition Flip

Explain the purpose of authentication and describe two methods used to authenticate users.

Answer Flip

Authentication verifies the identity of a user or device attempting to access a system or network. Two common methods are password authentication (using a secret word or phrase) and biometric authentication (using unique biological traits like fingerprints).

Key Concept Flip

What is two-factor authentication (2FA) and why is it more secure than single-factor authentication?

Answer Flip

Two-factor authentication requires users to provide two different types of authentication factors (

Example: password and a code sent to their phone), adding an extra layer of security compared to single-factor authentication (. password only), making it harder for attackers to gain unauthorized access.
Definition Flip

Describe the purpose and importance of creating regular data backups.

Answer Flip

Data backups involve creating copies of important data to be stored separately from the original source. This provides a safety net in case of data loss due to hardware failure, malware attacks, human error, or natural disasters, allowing for data restoration and minimizing downtime.

Review the material

Read revision notes with definitions, equations, and exam tips.

Read Notes

Test yourself

Practice with MCQ questions to check your understanding.

Take Quiz
5.2 The Internet 6.1 Automated systems

Key Questions: Security

Define the term 'malware' and give two examples.

'Malware' is any software intentionally designed to cause damage to a computer, server, client, or computer network. Examples include viruses, worms, Trojans, and ransomware.

Describe what a Trojan horse is and how it deceives users.

A Trojan horse disguises itself as legitimate software to trick users into installing it. Once installed, it can perform malicious actions like stealing data, installing other malware, or granting unauthorized access to the system.

What is spyware and what are its potential consequences?

Spyware is software that secretly monitors and collects user information, such as browsing history, passwords, and financial details. It can lead to identity theft, financial loss, and compromised privacy.

Explain what ransomware is and how it affects a user's data.

Ransomware is a type of malware that encrypts a victim's files, making them inaccessible until a ransom is paid to the attacker. It can cripple businesses and individuals by holding their data hostage.

Describe the technique of 'phishing' and give an example.

Phishing involves deceiving users into revealing sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in an electronic communication. An example is an email pretending to be from a bank asking you to update your account details.

About Security (5.3)

These 10 flashcards cover everything you need to know about Security for your Cambridge IGCSE Computer Science (0478) exam. Each card is designed based on the official syllabus requirements.

What You'll Learn

How to Study Effectively

Use the Study Mode button above to test yourself one card at a time. Try to answer each question before flipping the card. Review cards you find difficult more frequently.

Continue Learning

After mastering Security, explore these related topics: