Network Security

Unit 1.4 explores the devastating threats facing systems, and the crucial preventative measures required to lock them down.

Concept Explorer: Cyber Threat Simulator

As a network administrator, you must understand exactly how different attacks target a system. Launch a targeted attack on the server below to observe its specific purpose.

System Secure Status: Awaiting network requests...

Module Theory 1.4

The Examiners' Top 4 Zero-Mark Traps

Unit 1.4 contains the highest density of common student misconceptions. Every year, thousands of students lose guaranteed marks by falling into these four traps. Memorise them now.

1. The Encryption Trap

Encryption does NOT stop data from being intercepted. Hackers can still steal the data packet mid-transit! You must state that encryption makes intercepted data "unreadable/meaningless without the decryption key".

2. The Firewall Trap

Firewalls do NOT stop data interception across the wider Internet. A firewall can only monitor incoming/outgoing traffic directly passing through its specific network boundary node.

3. The 'Malware' Generalisation

Never write the generic term "Malware" or "Virus" as your final answer. If an exam asks for a specific threat that locks data, you must specify the precise type (e.g., "Ransomware").

4. The 'Hacking' Generalisation

Never use the generic phrase "Hacking". You must specify the exact method used to gain unauthorised access: (e.g., Brute-force attack, SQL injection, Social engineering, or Packet sniffing).

Baseline Check

Q1 A bank uses strong Encryption on their customer connection. A hacker uses a packet sniffer to intercept the customer's payment details. What happens?

Q2 Which of the following is the single most accurate description of how a Network Firewall prevents vulnerabilities?

Written Exam Scenario (AO2/AO3)

Stretch (Grade 9)

"A small dental surgery stores patient medical records on a network-connected server. They have recently been targeted by Ransomware.

Describe the specific purpose of a Ransomware attack, and recommend two technical preventative methods the surgery should implement." (3 marks)