Networks face constant threats: malware, phishing, brute-force attacks, and eavesdropping. Effective security is layered — no single defence is enough on its own. The OCR spec expects you to know which defence counters which threat.
Monitors all incoming and outgoing network traffic and blocks anything that doesn't match security rules.
Scrambles data into an unreadable format using an algorithm and key. Only someone with the correct key can decrypt and read it.
Longer, more complex passwords take exponentially longer to crack by automated guessing tools.
Requires two or more forms of verification before granting access. Combining something you know (password) with something you have (phone) or are (biometric).
Software that detects, quarantines, and removes malicious programs.
Limits what users are allowed to access, read, write, or execute — the principle of least privilege: users only have access to what they need for their role.
Software developers release patches to fix security vulnerabilities. Unpatched systems are a primary target for attackers.
Humans are often the weakest link. Training staff and users to recognise attacks reduces the chance of falling for social engineering.
For each scenario, select the best primary defence from the dropdown. Then click Check to see your results.
Describe how a firewall can protect a network.
Explain why encryption is used when sending data over the internet.
A company suffers a phishing attack where an employee clicks a link in a fake email and enters their password.
Identify two defences the company could implement to reduce the impact of future phishing attacks. [4 marks]