Cambridge Nationals IT Revision Guide and Workbook

Page 19

What the different tools are that can be used for data validation

How validation can reduce user errors

What the different tools are that can be used for data verification

How verification can reduce user errors

The different primary methods of collecting data and their advantages and disadvantages

The different secondary methods of collecting data and their advantages and disadvantages

The advantages and disadvantages of storing data in a logical location

The advantages and disadvantages of storing data in a physical location

The characteristics of each internal and external storage device and their advantages and disadvantages

Why testing is needed and the effects of not testing and its advantages and disadvantages

What each type of test data is and the role each plays

The advantages and disadvantages of technical testing and of user testing

R

A

FT

Topic Area 4:

D

Cyber-security and legislation

The definition of each of the following threats: denial of service (DoS), hacking (black/white/grey), malware, adware, botnet, ransomware, spyware, Trojan Horse, virus, worm, social engineering, baiting, phishing, pretexting, quid pro quo, scareware and shoulder surfing

Revision checklist

Why each of the threats are used by attackers

How each of the threats are used by attackers

How each threat works

How the methods of social engineering can be used to collect data and information

How each of the threats can be prevented

What data destruction is and the impact it can have on an individual and organisation

17

Original material © Cambridge University Press 2022. This material is not final and is subject to further changes prior to publication.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Cambridge Nationals IT Revision Guide and Workbook by Cambridge International Education - Issuu