Topic F : Cyber Security (7) Keeping secrets (2) Encryption / codebreaking / ciphers (caesar, matrix / grid, vernam) symmetric encryption Security Threats (3) Actors Hacking Security Breaches Social engineering (blagging / shouldering) Phishing Pharming Malware - Spyware, Adware, Randomware Infection methods - Worms, Trojan horses, Viruses https://www.ncsc.gov.uk/news/new-cyber-attack-categorisation-system-improve-uk-response-incidents Getting protected (2) Passwords Antimalware software Firewalls passwords and biometric authentication https://www.youtube.com/watch?v=AuYNXgO_f3Y INCLUDE : Mixture of all Assessing suitability of office applications for a purpose. - word processing - desktop publishing - spreadsheets - presentation |