Why Does Network Security Matter?
Every time you log into a school system, make an online purchase, or send a private message, data travels across networks. That data — your passwords, your bank details, your personal photographs, your medical records — is valuable. To you, it is private. To a cybercriminal, it is a target. Network security is the practice of protecting computer networks and the data they carry from unauthorised access, misuse, theft, and damage.
Without network security, anyone could intercept your emails, steal your identity, drain your bank account, or hold your files for ransom. Businesses could lose trade secrets worth millions of pounds. Hospitals could lose access to patient records in a life-or-death situation. Governments could have classified information leaked to hostile nations.
In this topic you will learn:
- Why network security is essential for individuals, businesses, and society
- The major types of cyber attack: malware, social engineering, DDoS, SQL injection, brute force, and man-in-the-middle
- How each attack works and the damage it can cause
- The prevention methods used to defend networks, including firewalls, encryption, authentication, and more
- How to match specific threats to the most appropriate prevention methods
Why Is Security So Important?
There are several critical reasons why organisations and individuals must take network security seriously:
- Personal data protection: Networks store and transmit personal information such as names, addresses, dates of birth, passwords, and photographs. If this data is stolen, it can be used for identity theft — criminals impersonating you to open bank accounts, take out loans, or commit fraud in your name.
- Financial data protection: Online banking, credit card transactions, and payment systems all rely on secure networks. A breach can result in direct financial loss — money stolen from accounts, fraudulent purchases, or businesses losing revenue.
- Business secrets and intellectual property: Companies store trade secrets, product designs, customer lists, and strategic plans on their networks. If a competitor or criminal gains access, the business could lose its competitive advantage or suffer reputational damage.
- Legal requirements: Laws such as the General Data Protection Regulation (GDPR) and the Data Protection Act 2018 require organisations to protect personal data. Failing to do so can result in enormous fines — up to 20 million euros or 4% of global annual turnover under GDPR — as well as legal action from affected individuals.
- National security: Government and military networks contain classified information. Breaches can compromise national defence, intelligence operations, and critical infrastructure such as power grids and water systems.
- Public trust: When a company suffers a data breach, customers lose trust. This can lead to loss of business, falling share prices, and long-term reputational harm that takes years to recover from.
Types of Attack
Cyber attacks come in many forms. Some target the software on your computer, some exploit human behaviour, and some overwhelm entire servers. Understanding each type of attack is essential for knowing how to defend against it. There are six main categories you need to know for GCSE Computer Science.
1. Malware
Malware (short for “malicious software”) is any software that is intentionally designed to cause damage, steal data, or gain unauthorised access to a system. Malware is an umbrella term that covers several specific types:
Viruses
A virus is a type of malware that attaches itself to a legitimate file or program. It cannot run on its own — it needs a “host” file. When the infected file is opened or executed, the virus activates and can replicate itself by attaching copies to other files on the same computer or files shared across a network. Viruses can corrupt or delete data, slow down systems, and spread to other computers via email attachments, USB drives, or file downloads.
Worms
A worm is similar to a virus but with one crucial difference: it does not need a host file. A worm is a standalone program that can self-replicate and spread across networks automatically, without any human interaction. It exploits vulnerabilities in operating systems or software to move from computer to computer. Worms can consume bandwidth, overload networks, and deliver harmful payloads. Because they spread without needing someone to open a file, worms can infect thousands of machines very rapidly.
Trojans
A Trojan (named after the Trojan Horse from Greek mythology) is malware that is disguised as legitimate, useful software. The user willingly downloads and installs it, thinking it is a game, a utility, or a helpful tool. Once installed, the Trojan performs its hidden malicious purpose — this might include opening a “backdoor” for hackers to access the system, stealing data, or installing additional malware. Unlike viruses and worms, Trojans do not replicate themselves — they rely on tricking the user into installing them.
Ransomware
Ransomware is one of the most devastating types of malware. Once it infects a computer, it encrypts the user’s files (documents, photos, databases — everything), making them completely inaccessible. The attacker then demands a ransom payment (usually in cryptocurrency like Bitcoin, to remain anonymous) in exchange for the decryption key. If the victim does not pay, they may lose their data permanently. Even if they do pay, there is no guarantee the attacker will provide the key.
Spyware
Spyware is malware that secretly monitors the user’s activity and steals data without their knowledge. It can record keystrokes (a “keylogger”), capture screenshots, track browsing history, and harvest login credentials, credit card numbers, and personal information. Spyware often runs silently in the background, making it difficult for the user to know they are being watched.
2. Social Engineering
Social engineering attacks exploit human behaviour rather than technical vulnerabilities. Instead of hacking into a system with code, the attacker manipulates people into giving away confidential information or performing actions that compromise security. Social engineering is extremely effective because humans are often the weakest link in any security system.
Phishing
Phishing is the most common form of social engineering. The attacker sends fake emails or creates fake websites that closely mimic legitimate organisations (banks, social media platforms, online retailers, HMRC). The messages typically create a sense of urgency: “Your account has been compromised — click here to verify your identity.” When the victim clicks the link and enters their login credentials or personal information, that data goes directly to the attacker.
Pretexting
Pretexting involves the attacker creating a false scenario (a “pretext”) to trick the victim into revealing information or granting access. For example, an attacker might phone an employee pretending to be from the IT department: “We are performing a security audit and need your password to verify your account.” The attacker builds trust through a convincing story and exploits the victim’s willingness to be helpful.
Baiting
Baiting exploits human curiosity. The attacker leaves an infected USB drive (or other storage device) in a public place — a car park, a reception area, a coffee shop. The drive might be labelled “Confidential” or “Salary Information” to make it irresistible. When a curious person picks it up and plugs it into their computer, malware is automatically installed.
Shoulder Surfing
Shoulder surfing is one of the simplest attacks: the attacker physically watches someone as they type a password, enter a PIN at a cash machine, or log into a system. This can be done in person (standing behind someone at an ATM) or remotely using cameras or binoculars. No technical skill is required — just the ability to look over someone’s shoulder.
3. DDoS (Distributed Denial of Service)
A DDoS attack does not aim to steal data. Instead, its goal is to make a service unavailable by overwhelming a server with an enormous volume of traffic. The attacker uses a botnet — a network of thousands or even millions of compromised computers (often infected with malware without their owners’ knowledge) — to flood the target server with requests simultaneously.
The target server becomes so overwhelmed trying to process the flood of fake requests that it cannot respond to legitimate users. Websites go offline, online services become unusable, and businesses lose revenue for every minute of downtime. Major companies including Amazon, GitHub, and the BBC have all been targets of DDoS attacks.
DDoS attacks are particularly difficult to defend against because the traffic comes from multiple distributed sources (the botnet), making it hard to distinguish malicious requests from legitimate ones and impossible to block a single attacker’s IP address.
4. SQL Injection
SQL injection is an attack that targets websites and web applications that use databases. The attacker enters specially crafted SQL code into web forms (login boxes, search fields, registration forms) instead of normal input. If the website is poorly coded and does not properly validate or sanitise user input, the SQL code is passed directly to the database server and executed.
This can allow the attacker to:
- Bypass login authentication (gaining access without a valid password)
- Read sensitive data from the database (usernames, passwords, credit card numbers)
- Modify or delete data in the database
- Execute administrative operations on the database server
Normal login:
Username: john_smith
Password: mypassword123
SQL injection attack:
Username: ' OR '1'='1' --
Password: anything
The injected SQL tricks the database into thinking the
login is valid, because '1'='1' is always true. The --
comments out the rest of the original query.
SQL injection exploits poorly written websites that do not validate user input. Well-coded websites use techniques like parameterised queries (also called prepared statements) to ensure user input is treated as data, not as executable SQL code.
5. Brute Force Attack
A brute force attack is a method of cracking passwords by systematically trying every possible combination of characters until the correct password is found. The attacker uses automated software that can test thousands or millions of combinations per second.
For example, if a password is a 4-digit PIN (0000 to 9999), there are only 10,000 possible combinations — a computer can try all of them in seconds. However, a long, complex password with uppercase letters, lowercase letters, numbers, and symbols has so many possible combinations that a brute force attack could take years or even centuries to succeed.
Variations of brute force include dictionary attacks, where the software tries common words and known passwords first (e.g., “password123”, “qwerty”, “letmein”), and credential stuffing, where stolen username-password pairs from one data breach are tried on other websites (exploiting people who reuse passwords).
6. Man-in-the-Middle (MITM) Attack
In a man-in-the-middle attack, the attacker secretly intercepts communication between two parties who believe they are communicating directly with each other. The attacker positions themselves between the sender and receiver, eavesdropping on the conversation and potentially altering the messages being exchanged.
For example, if you connect to an unsecured public Wi-Fi network in a coffee shop, an attacker on the same network could intercept the data passing between your laptop and the Wi-Fi router. They could capture your login credentials, read your emails, or even modify the web pages you see (for example, redirecting you to a fake banking website). The victim has no idea that their communication is being intercepted because everything appears to work normally.
Prevention Methods
Now that you understand the threats, you need to know how to defend against them. No single method can protect against all attacks — organisations use a layered approach (sometimes called “defence in depth”) that combines multiple prevention methods to create comprehensive security.
1. Firewalls
A firewall is a security system that monitors and controls incoming and outgoing network traffic based on a set of predefined security rules. It acts as a barrier between a trusted internal network and untrusted external networks (such as the internet).
- Packet filtering: The firewall examines each packet of data and checks it against a set of rules. It can allow or block packets based on source IP address, destination IP address, port number, and protocol. For example, a rule might block all incoming traffic on port 23 (Telnet) because it is an insecure protocol.
- Hardware firewalls: Dedicated physical devices that sit between the internal network and the internet. They protect the entire network and are commonly used by businesses.
- Software firewalls: Programs installed on individual computers. Windows and macOS both include built-in software firewalls. They protect the specific device they are installed on.
Firewalls are a first line of defence. They can block many common attacks, but they cannot protect against threats that arrive through legitimate channels (such as a phishing email that passes through the email port).
2. Encryption
Encryption is the process of scrambling data into an unreadable format (ciphertext) so that only someone with the correct decryption key can convert it back to the original readable form (plaintext). Even if an attacker intercepts encrypted data, they cannot understand it without the key.
- Symmetric encryption: Uses the same key for both encryption and decryption. It is fast and efficient but requires both parties to securely share the key beforehand. If the key is intercepted, the encryption is broken. Example: AES (Advanced Encryption Standard).
- Asymmetric encryption: Uses a pair of keys — a public key (shared openly) for encryption and a private key (kept secret) for decryption. Anyone can encrypt a message using your public key, but only you can decrypt it with your private key. This solves the key distribution problem but is slower than symmetric encryption. Example: RSA.
Encryption is used everywhere: HTTPS websites (the padlock in your browser), email encryption, Wi-Fi passwords (WPA2/WPA3), VPNs, and encrypted messaging apps like Signal and WhatsApp.
3. Authentication
Authentication is the process of verifying the identity of a user before granting them access to a system. There are several methods:
- Passwords: The most common form of authentication. Strong password rules should require a minimum length (at least 8 characters, ideally 12+), a mix of character types (uppercase, lowercase, numbers, symbols), no dictionary words or easily guessable information (birthdays, pet names), and regular changes.
- Two-factor authentication (2FA): Requires two different forms of identification — typically something you know (password) and something you have (a code sent to your phone, or a hardware security key). Even if an attacker steals your password, they cannot access your account without the second factor.
- Biometrics: Uses unique physical characteristics to verify identity — fingerprint scanning, facial recognition, iris scanning, or voice recognition. Biometrics are very difficult to forge, but they cannot be changed if compromised (you cannot get a new fingerprint).
4. Anti-Malware Software
Anti-malware software (often called antivirus software) protects computers by:
- Scanning for known malware signatures: The software maintains a database of known malware “signatures” (unique patterns of code). It scans files and programs, comparing them against this database to identify threats.
- Real-time protection: Continuously monitors the system for suspicious activity, blocking malware before it can execute.
- Regular updates: New malware is created constantly, so the signature database must be updated regularly to detect the latest threats. Outdated anti-malware software is significantly less effective.
5. Access Control
Access control ensures that users can only access the data and resources they are authorised to use:
- User permissions: Different users are granted different levels of access. An administrator might have full access, while a regular employee can only access files in their department.
- Principle of least privilege: Users should be given the minimum level of access necessary to perform their job. This limits the damage if their account is compromised.
- User accounts: Every user should have their own individual account (not shared accounts). This ensures accountability — actions can be traced back to a specific person.
6. Physical Security
Network security is not just about software. Physical security protects the hardware and infrastructure:
- Locked server rooms: Servers and network equipment should be kept in secure, locked rooms with restricted access (key cards, PIN codes).
- CCTV: Security cameras deter unauthorised access and provide evidence if a breach occurs.
- Security guards: Human security personnel can verify identities and prevent unauthorised people from entering sensitive areas.
7. Regular Backups
Regular backups protect against data loss from ransomware, hardware failure, natural disasters, or accidental deletion. If files are encrypted by ransomware, a recent backup allows the organisation to restore data without paying the ransom. Backups should be stored in a separate location (offsite or in the cloud) so they are not affected by the same incident. Backups should be performed frequently and tested regularly to ensure they work.
8. Penetration Testing
Penetration testing (pen testing) involves hiring ethical hackers (also called “white hat” hackers) to deliberately attempt to break into an organisation’s network. The goal is to identify vulnerabilities before real attackers find them. The ethical hackers use the same tools and techniques as malicious hackers, but they have permission and report their findings so the organisation can fix the weaknesses. Penetration testing is a proactive measure — it finds problems before they are exploited.
9. Network Policies
Technical measures alone are not enough. Organisations need policies that define rules and expectations for network use:
- Acceptable use policies: Define what employees can and cannot do on the network (e.g., no personal email on work devices, no downloading unauthorised software).
- Password policies: Set rules for password creation (minimum length, complexity requirements, how often passwords must be changed).
- Training staff: Regular security awareness training teaches employees to recognise phishing emails, avoid social engineering attacks, and follow security procedures. Humans are often the weakest link, so training is one of the most cost-effective security measures.
Prevention-to-Threat Mapping
The table below shows which prevention methods are most effective against each type of threat. Note that multiple prevention methods are usually needed for each threat — this is the principle of defence in depth.
| Threat | Primary Prevention Methods |
|---|---|
| Viruses | Anti-malware software, regular updates, firewalls, staff training (do not open suspicious attachments), regular backups |
| Worms | Anti-malware software, firewalls (block suspicious network traffic), keeping software updated (patch vulnerabilities), network monitoring |
| Trojans | Anti-malware software, staff training (do not install untrusted software), access control (restrict software installation), download policies |
| Ransomware | Regular backups (most critical), anti-malware software, staff training (recognise phishing), email filtering, keeping software updated |
| Spyware | Anti-malware software, firewalls, access control, regular system scans, staff training |
| Phishing | Staff training (most critical), email filtering, two-factor authentication (limits damage if credentials stolen), checking URLs carefully |
| Shoulder surfing | Physical security (privacy screens, awareness of surroundings), biometric authentication, two-factor authentication |
| Baiting | Staff training, network policies (no unknown USB devices), disabling autorun on USB ports, physical security |
| DDoS | Firewalls, traffic monitoring and filtering, using content delivery networks (CDNs), rate limiting, having excess server capacity |
| SQL injection | Input validation and sanitisation, parameterised queries, penetration testing, keeping web software updated, web application firewalls |
| Brute force | Strong password policies (long, complex passwords), account lockout after failed attempts, two-factor authentication, CAPTCHA |
| Man-in-the-middle | Encryption (HTTPS, VPN), avoiding unsecured public Wi-Fi, certificate verification, two-factor authentication |
Test Your Knowledge
Try these interactive exercises to check your understanding of network security. Read each scenario carefully and think before you answer.
Exercise 1: Threat Identifier
Read the attack scenario below and identify what type of attack is being described.
Exercise 2: Match the Prevention
A threat is shown below. Choose the most effective primary prevention method for this specific threat.
Exercise 3: Security Concepts Quiz
Test your knowledge of network security concepts with these multiple-choice questions.
Practice Questions
Click on each question to reveal the answer. Try to answer in your head or on paper first before checking!
Answer: Malware (malicious software) is any software that is intentionally designed to cause damage, steal data, or gain unauthorised access to a computer system. Four types of malware are: (1) Virus — attaches to legitimate files and replicates when the file is executed; (2) Worm — a standalone program that self-replicates across networks without needing a host file; (3) Trojan — disguised as legitimate software but contains hidden malicious code; (4) Ransomware — encrypts files and demands payment for the decryption key. (Other valid answers: spyware.)
Answer: In a phishing attack, the attacker sends fake emails or creates fake websites that mimic legitimate organisations (such as a bank or social media platform). The message typically creates a sense of urgency (e.g., “Your account has been suspended”) and includes a link. When the victim clicks the link and enters their login credentials or personal information, the data is sent to the attacker. Two protection methods: (1) Staff training — educate employees to recognise signs of phishing (suspicious sender addresses, urgency, spelling errors, unexpected links) and never enter credentials via email links. (2) Two-factor authentication (2FA) — even if credentials are stolen, the attacker cannot access the account without the second factor (e.g., a code sent to the user’s phone).
Answer: A DDoS (Distributed Denial of Service) attack aims to make a server or service unavailable by flooding it with an enormous volume of traffic. The attacker uses a botnet — a network of thousands of compromised computers infected with malware — to send millions of requests to the target simultaneously. The server becomes overwhelmed and cannot process legitimate requests, causing the website or service to go offline. DDoS attacks are difficult to defend against because: (1) the traffic comes from many different IP addresses, so blocking a single source is ineffective; (2) the malicious traffic can be hard to distinguish from legitimate traffic; (3) the sheer volume of traffic can exceed the server’s capacity even with protective measures in place.
Answer: Symmetric encryption uses the same key for both encryption and decryption. Advantage: it is fast and efficient, making it suitable for encrypting large amounts of data. Disadvantage: both parties must share the key securely beforehand; if the key is intercepted during transmission, the encryption is broken. Asymmetric encryption uses a pair of keys: a public key (shared openly) for encryption and a private key (kept secret) for decryption. Advantage: no need to share a secret key; anyone can encrypt data with the public key, but only the holder of the private key can decrypt it, solving the key distribution problem. Disadvantage: it is much slower than symmetric encryption, making it less practical for encrypting large volumes of data.
Answer: A firewall protects a network by monitoring all incoming and outgoing traffic and applying a set of predefined security rules to determine whether each packet should be allowed through or blocked. It acts as a barrier between the trusted internal network and untrusted external networks. It uses packet filtering to inspect packets based on source/destination IP addresses, port numbers, and protocols. A hardware firewall is a dedicated physical device placed between the network and the internet. It protects the entire network and is commonly used in business environments. A software firewall is a program installed on an individual computer. It protects only the specific device it is installed on. Most operating systems include a built-in software firewall. Organisations typically use both for layered defence.
Answer: (1) Regular backups stored in a separate location — if ransomware encrypts the school’s files, they can restore all data from a recent backup without paying the ransom. Backups should be stored offsite or in the cloud so they are not encrypted by the same attack. (2) Anti-malware software with real-time protection — this can detect and block ransomware before it executes by scanning files against a database of known malware signatures. The software must be kept up to date to recognise the latest ransomware variants. (3) Staff training — ransomware is often delivered through phishing emails with malicious attachments or links. Training staff to recognise suspicious emails, avoid clicking unknown links, and report potential threats significantly reduces the risk of ransomware infection.
Answer: SQL injection is an attack where an attacker enters SQL code into a web form (such as a login box or search field) instead of normal input. If the website does not properly validate the input, the SQL code is passed directly to the database server and executed. This can allow the attacker to bypass login authentication, read sensitive data (usernames, passwords, credit card numbers), modify or delete data, or perform administrative operations on the database. It can be prevented by: (1) Input validation and sanitisation — checking all user input and removing or escaping special characters before it reaches the database; (2) Parameterised queries (prepared statements) — a coding technique that ensures user input is always treated as data, never as executable SQL code; (3) Penetration testing — regularly testing the website for SQL injection vulnerabilities.
Answer: The principle of least privilege states that users should be given the minimum level of access necessary to carry out their job. This is important because it limits the potential damage if a user’s account is compromised. If an attacker gains control of an account that only has access to one department’s files, they cannot access the entire organisation’s data. Example: a school receptionist needs access to the student contact database to phone parents, but they do not need access to the school’s financial records or exam papers. Under the principle of least privilege, their account would only have permission to view the contact database — not financial or academic systems. If their account were hacked, the attacker could only access contact information, not the school’s finances.
Answer: Social engineering is a type of attack that exploits human behaviour rather than technical vulnerabilities. Instead of hacking software, the attacker manipulates, deceives, or tricks people into revealing confidential information or performing actions that compromise security. Types include phishing (fake emails/websites), pretexting (fabricated scenarios), baiting (infected USB drives), and shoulder surfing (watching someone enter a password). Social engineering is effective even against organisations with strong technical security because humans are often the weakest link. A firewall cannot prevent an employee from giving their password to a convincing caller. Encryption cannot stop someone from willingly entering their credentials on a fake website. The strongest technical defences are undermined if the people using them can be manipulated. This is why staff training is essential.
Answer: (1) Encryption using HTTPS and VPN — if all communication is encrypted, even if an attacker intercepts the data, they cannot read or understand it. HTTPS encrypts web traffic between the browser and server, while a VPN (Virtual Private Network) creates an encrypted tunnel for all network traffic. The attacker would only see scrambled, unreadable data. (2) Avoid unsecured public Wi-Fi networks and use only trusted, authenticated networks — man-in-the-middle attacks commonly occur on public Wi-Fi where the attacker can position themselves between users and the router. A network policy requiring employees to use only the company’s secured Wi-Fi or a VPN when working remotely removes the opportunity for the attacker to intercept the connection. Certificate verification (checking that HTTPS certificates are valid) also helps users confirm they are communicating with the genuine server and not an impersonator.
Key Vocabulary
This table summarises the essential terms for this topic. Use it for revision and to check your understanding.
| Term | Definition |
|---|---|
| Network security | Policies, practices, hardware, and software used to protect a network and its data from unauthorised access, attacks, and damage |
| Malware | Malicious software designed to cause damage, steal data, or gain unauthorised access (includes viruses, worms, Trojans, ransomware, spyware) |
| Virus | Malware that attaches to a legitimate host file and replicates when the file is executed |
| Worm | Standalone malware that self-replicates and spreads across networks without needing a host file |
| Trojan | Malware disguised as legitimate software; does not self-replicate but relies on tricking users into installing it |
| Ransomware | Malware that encrypts a victim’s files and demands payment for the decryption key |
| Spyware | Malware that secretly monitors user activity and steals data (e.g., keyloggers) |
| Social engineering | Attacks that exploit human behaviour through manipulation and deception rather than technical vulnerabilities |
| Phishing | Sending fake emails or creating fake websites to trick victims into revealing login credentials or personal information |
| Pretexting | Creating a fabricated scenario to trick a victim into revealing information or granting access |
| Baiting | Leaving infected storage devices (e.g., USB drives) in public places to exploit curiosity |
| Shoulder surfing | Physically watching someone enter a password or PIN |
| DDoS | Distributed Denial of Service — overwhelming a server with traffic from many sources (a botnet) to make it unavailable |
| Botnet | A network of compromised computers controlled by an attacker, often used to launch DDoS attacks |
| SQL injection | Entering SQL code into web forms to exploit poorly coded websites and access or modify database contents |
| Brute force attack | Trying every possible password combination, often using automated software, until the correct one is found |
| Man-in-the-middle | Intercepting communication between two parties who believe they are communicating directly |
| Firewall | A security system that monitors network traffic and blocks packets that violate predefined security rules |
| Encryption | Scrambling data into an unreadable format that can only be decoded with the correct decryption key |
| Symmetric encryption | Encryption that uses the same key for both encryption and decryption |
| Asymmetric encryption | Encryption that uses a pair of keys: a public key for encryption and a private key for decryption |
| Authentication | The process of verifying a user’s identity before granting access (passwords, 2FA, biometrics) |
| Two-factor authentication (2FA) | Requiring two different forms of identification (e.g., password + phone code) for access |
| Biometrics | Using unique physical characteristics (fingerprint, face, iris) to verify identity |
| Penetration testing | Authorised ethical hackers attempting to find vulnerabilities in a system before malicious attackers do |
| Principle of least privilege | Giving users the minimum level of access necessary to perform their role |
| GDPR | General Data Protection Regulation — EU/UK law requiring organisations to protect personal data or face significant fines |
How to Succeed in the Exam
Video Resources
These Craig 'n' Dave videos cover threats, vulnerabilities, and protection methods in detail.
Past Paper Questions
Practise these exam-style questions. Click each question to reveal the mark scheme.
Describe two methods an organisation could use to protect their network from cyber attacks. 4 marks
Mark scheme:
- Firewall: Monitors incoming and outgoing network traffic (1 mark) and blocks unauthorised access/suspicious activity (1 mark)
- Anti-malware software: Scans files for known malware/viruses (1 mark) and removes or quarantines infected files (1 mark)
- Encryption: Scrambles data so it cannot be read (1 mark) if intercepted by hackers (1 mark)
- Strong passwords: Complex passwords are harder to guess/crack (1 mark) reducing risk of unauthorised access (1 mark)
Network Security in the Real World
Network security is not an abstract concept confined to textbooks — it affects your daily life. Consider how the topics you have just studied connect to the real world:
- Your own devices: Your phone, laptop, and gaming console are all potential targets. Every app you install, every public Wi-Fi network you connect to, and every link you click carries some level of risk. The security awareness you have gained from this topic can help you protect yourself. Do you use strong, unique passwords? Do you have 2FA enabled on your important accounts? Do you think before clicking links in emails?
- Schools and workplaces: Schools handle enormous amounts of sensitive data — student records, assessment results, safeguarding information. The firewalls, access controls, and network policies your school uses are all examples of the security measures covered in this topic. Teachers are trained to recognise phishing, and your school likely has backup systems in case of ransomware.
- Major incidents: In 2017, the WannaCry ransomware attack hit the NHS, locking hospital computers and forcing the cancellation of thousands of appointments and operations. In 2020, a DDoS attack took down large portions of the internet when a major DNS provider was targeted. In 2023, the MOVEit vulnerability led to data breaches affecting millions of people worldwide. These events demonstrate why network security matters at every level.
- Career opportunities: Cybersecurity is one of the fastest-growing career fields in the world. There is a global shortage of cybersecurity professionals, meaning excellent job prospects and salaries for those with the right skills. Understanding the fundamentals in this topic is the first step towards a career protecting organisations from cyber threats.
Challenge yourself: Over the next week, pay attention to the security features you encounter in your daily life. How many websites use HTTPS? How many of your accounts have 2FA available? Can you spot any potential phishing emails in your inbox? Have you ever connected to unsecured public Wi-Fi without a VPN? The more aware you are, the safer you will be online.
Interactive Games
- Cybersecurity Revision Game — Interactive revision covering network security, malware, threats and protection methods
- CS Escape Room — Solve computing puzzles including security challenges
Further Reading & External Resources
- BBC Bitesize — Edexcel GCSE Computer Science — Comprehensive coverage of network security topics
- Isaac Computer Science — Network Security — In-depth explanations of threats and protection methods
- GCSE Topic 4: Networks & Security — Full Edexcel specification coverage with interactive examples