Defence Software

The specifically engineered software tools used to secure networks and scramble data.

Examiner's Eye - Avoid the Trap!

The "Encryption" Trap: Encryption does NOT stop data from being intercepted! A hacker with a packet sniffer can still steal your encrypted data mid-transit. To get the mark, you must state that encryption makes the intercepted data "meaningless", "unintelligible", or "unreadable without the decryption key". Never say it "prevents theft".

Concept Explorer: The Firewall Configurator

A Network Firewall sits exactly at the boundary between the Internet and a Local area network. It monitors traffic and acts based on predefined rules. Configure the rule below to defend the school network from a known malicious IP.

Firewall Rule 1: Traffic From IP:
The Internet
Local Server
85.12.99.2
192.168.1.55
> Firewall log standing by...

Defence Software Methods

Anti-Malware / Anti-Virus

Utility software that actively scans files and incoming data, comparing them against a regularly updated database of known malware file signatures. It prevents attacks by alerting the user, stopping malicious downloads, and successfully quarantining or deleting infected files.

Firewalls

Software (or hardware) that sits at the network boundary. It monitors all incoming and outgoing network traffic, comparing it against a set of predefined security rules. It actively blocks any unauthorised data packets from entering or leaving.

Encryption

The process of scrambling plaintext data using a mathematical algorithm before it is transmitted. Ensuring that if the data is intercepted, the ciphertext remains totally unreadable to unauthorised users without possessing the specific decryption key.

Authentication

  • Strong Passwords: Mandating mixed character types makes brute-force attacks mathematically unfeasible.
  • Limiting Attempts: Locking an account after 3 failed tries directly stops automated brute-force bots.
  • Two-Factor Auth (2FA): Requiring a secondary one-time code sent to a mobile phone.

Check Your Understanding

A student connects to the public Wi-Fi at a library. A hacker on the same network uses a packet sniffer and manages to intercept a copy of the message the student just sent. However, the hacker cannot read what the message says. Which specific defence software prevented the hacker from reading the message?

Stretch & Challenge (AO2 Application)

Written Exam Scenario (AO2/AO3)

1 / 3

...

Previous: Threats Next: Vulnerabilities