A-level Computing/CIE/Advanced Theory/Security

From Wikibooks, open books for an open world
Jump to navigation Jump to search
A-level Computing
System Software Security Monitoring and Control Systems


Specification link

Asymmetric keys and encryption methods

  • show understanding of the terms: public key, private key, plain text, cipher text, encryption and asymmetric key cryptography
  • show understanding of how the keys can be used to send a private message from the public to an individual/organisation\
  • show understanding of how the keys can be used to send a verified message to the public

Digital signatures and digital certificates

  • show understanding of how a digital certificate is acquired
  • show understanding of how a digital certificate is used to produce digital signatures

Encryption protocols

  • show awareness of the purpose of Secure Socket Layer (SSL)/Transport Layer Security (TLS)
  • show awareness of the use of SSL/TLS in client-server communication
  • show awareness of situations where the use of SSL/TLS would be appropriate

Malware

  • show understanding of malware: viruses, worms, spam, phishing, pharming
  • describe vulnerabilities that the various types of malware can exploit
  • describe methods that can be used to restrict the effect of malware