Describe the dangers that can arise from the use of computers to store personal data
Describe methods that protect the security of data including access levels, suitable passwords for access and encryption techniques
Explain the need for file backups and generations of files
Explain the need for archiving files
Explain how lossy and lossless data compression algorithms are used
Calculate compression ratios
Recognise the importance of network security and describe the dangers that can arise form the use of networks
Explain the purpose and typical contents of an acceptable use policy and disaster recovery policy
Describe the characteristics and explain the methods of protection against malware, viruses, worms and key loggers
Describe the different forms of attack based on technical weaknesses and/or user behaviour
Describe methods of identifying vulnerabilities
Explain different ways of protecting software systems during design, creation, testing and use
Describe the role of internet cookies
Revision
WJEC Blending Resources - These are interactive resources that will help with your knowledge and understanding. You could use these as revision for the topic