Notes-for-CAIE

Table of contents

3.5.3 Encryption protocols

How SSL or TLS helps to keep secure

s18 32 Q5.b [4]
s19 31 Q5.b [6]
s19 33 Q5 [6]

Write as much as possible! The marking schemes varies.

3.5.4 Malware

Vulnerabilities that a malware can exploit.

s18 32 Q5.c [3]

Spam [1]

Solution: setup filters to delete spam email

Spyware [1]

s18 33 Q6 [1]

Worm

s17 31 Q2.a.i [1]

Solution: run anti-virus software in the background

Virus [2]

s17 31 Q2.a.iii

Pharming [1]

w20 33 Q6 [2]

Phishing [1]

w20 33 Q6 [2]