WJEC GCSE Digital Technology - Topic 5 Fill in the blanks

TimeHonoredSwan avatar
TimeHonoredSwan
·
·
Download

Start Quiz

Study Flashcards

5 Questions

Identify three errors that the hospital's staff could make, that may endanger the security of the network and outline a procedure that could be put in place to prevent each ______.

Error

Using the network threats provided, suggest a suitable strategy that will identify and/or prevent this form of ______.

Attack

A web server storing a user’s IP address is an example of a ______ footprint.

Passive

Explain how digital footprint would be used for the following purposes: Monitoring current employees, Monitoring prospective employees (people applying for jobs), ______, Businesses.

Marketing

Malware, social engineering, brute force attack, data interception, and denial of service attack are all types of network ______.

Threats

Study Notes

Network Security Threats

  • Errors hospital staff could make to endanger network security include:
    • Unintentional download of malware or viruses
    • Weak passwords or password sharing
    • Unsecured access to sensitive data
  • Procedures to prevent each error:
    • Implementing regular software updates and antivirus scans
    • Enforcing strong password policies and regular password changes
    • Implementing access controls and encrypting sensitive data

Network Threats

  • A suitable strategy to identify and prevent network threats includes:
    • Implementing a firewall and intrusion detection system
    • Conducting regular security audits and penetration testing
    • Educating staff on network security best practices

Digital Footprint

  • A digital footprint refers to the trail of data left online, such as a user's IP address
  • Digital footprint is used for:
    • Monitoring current employees: tracking online activity to ensure compliance with company policies
    • Monitoring prospective employees: researching online presence to assess character and fit
    • Businesses: analyzing online presence to understand customer behavior and preferences

Network Attacks

  • Types of network attacks include:
    • Malware: malicious software designed to harm or exploit systems
    • Social engineering: manipulating individuals to reveal sensitive information
    • Brute force attack: using automated tools to guess passwords
    • Data interception: intercepting and accessing sensitive data
    • Denial of service attack: overwhelming a system with traffic to make it unavailable

Test your knowledge of network security threats and procedures with this quiz. Identify potential errors that could endanger network security and learn preventive procedures. Explore strategies to identify and prevent various types of network threats. Understand the concept of digital footprint and its applications in monitoring employees and businesses. Identify and differentiate types of network threats like malware, social engineering, brute force attack, data interception, and denial of service attack.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Security Profile Management Lesson 6
27 questions
Cyber Security Fundamentals and Tools
29 questions
Network Security Fundamentals
12 questions
Use Quizgecko on...
Browser
Browser