TopMyGrade

GCSE/Computer Science/OCR

1.4.2Identifying and preventing vulnerabilities: penetration testing, anti-malware, firewalls, user-access levels, passwords, encryption, physical security

Notes

Preventing network vulnerabilities

OCR J277 Paper 1 pairs this topic with 1.4.1 (threats). You need to know each preventive method, what kind of threat it counters, and how it works.

Preventive methods

MethodWhat it doesThreats it counters
Penetration testingA controlled attack on a system, by authorised testers, to find weaknesses before real attackers do. White-box (with insider info) or black-box (no info).Reveals all categories of weakness so they can be patched.
Anti-malwareSoftware that scans for, quarantines and removes malware. Uses signature databases (must be kept up to date) and heuristic/behavioural detection.Viruses, worms, trojans, spyware, ransomware.
FirewallHardware or software that monitors and filters network traffic between an internal network and the outside world based on rules (allow/deny by IP, port, protocol).Unauthorised remote access, brute-force probes, some DoS.
User-access levelsDifferent user accounts have different permissions — e.g. read-only, read-write, admin. Principle of least privilege.Limits damage from social engineering or compromised accounts; reduces insider risk.
Strong passwordsLong, mixture of upper/lower/digits/symbols; not reused. Combined with multi-factor authentication where possible.Brute-force, dictionary attacks, credential stuffing.
EncryptionScrambles data using a key so it is unreadable to anyone without the key. Used at rest (disk) and in transit (HTTPS, VPN).Eavesdropping, man-in-the-middle, theft of data files or backups.
Physical securityLocks, swipe cards, CCTV, server-room access controls.Theft, tailgating, hardware tampering, shoulder-surfing.

How preventive methods are layered

Defence in depth — no single method blocks every threat. A real organisation combines firewalls, anti-malware, user-access, encryption and physical security so that breaching one layer is not enough to compromise the system.

Penetration testing — internal vs external

  • Internal pen-test simulates an insider — what could a disgruntled employee or compromised account do?
  • External pen-test simulates an outside attacker — what is reachable from the internet?

Common OCR exam mistakes

  • Saying "encryption stops malware" — encryption protects confidentiality of data, it does not stop malicious software running.
  • Saying "a firewall stops viruses" — that is anti-malware. A firewall blocks unauthorised network traffic.
  • Forgetting penetration testing is authorised — without authorisation it is illegal under the Computer Misuse Act.
  • Listing methods without saying which threat each counters.

AI-generated · claude-opus-4-7 · v3-ocr-computer-science-leaves

Practice questions

Try each before peeking at the worked solution.

  1. Question 16 marks

    Match prevention to threat

    State a suitable preventive method for each of the following threats and briefly justify your choice:
    (a) An attacker repeatedly trying common passwords against a login page. [2]
    (b) A user accidentally clicking an attachment that installs a virus. [2]
    (c) An attacker intercepting Wi-Fi traffic to read login data. [2]

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-ocr-computer-science-leaves

  2. Question 24 marks

    Penetration testing

    (a) Define penetration testing. [2]
    (b) State the difference between black-box and white-box penetration testing. [2]

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-ocr-computer-science-leaves

  3. Question 38 marks

    Defence in depth

    A school wants to protect its network. Identify four different preventive methods it could use and, for each, explain what it would protect against. [8 marks]

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-ocr-computer-science-leaves

Flashcards

1.4.2 — Identifying and preventing vulnerabilities: penetration testing, anti-malware, firewalls, user-access levels, passwords, encryption, physical security

7-card SR deck for OCR Computer Science (J277) — leaves batch 1 topic 1.4.2

7 cards · spaced repetition (SM-2)