Security
Cambridge IGCSE Computer Science (0478) · Unit 5: The internet and its uses · 10 flashcards
Security is topic 5.3 in the Cambridge IGCSE Computer Science (0478) syllabus , positioned in Unit 5 — The internet and its uses , alongside Networks and The Internet. In one line: 'Malware' is any software intentionally designed to cause damage to a computer, server, client, or computer network. Examples include viruses, worms, Trojans, and ransomware.
This topic is examined in Paper 1 (computer systems theory) and Paper 2 (algorithms, programming and logic).
The deck below contains 10 flashcards — 8 definitions and 2 key concepts — covering the precise wording mark schemes reward. Use the 8 definition cards to lock down command-word answers (define, state), then move on to the concept and application cards to handle explain, describe and compare questions.
The term 'malware' and give two examples
'Malware' is any software intentionally designed to cause damage to a computer, server, client, or computer network. Examples include viruses, worms, Trojans, and ransomware.
What the Cambridge 0478 syllabus says
Official 2026-2028 specThese are the exact learning objectives Cambridge sets for this topic. Match the command word (Describe, Explain, State, etc.) in your answer to score full marks.
- Describe Describe the processes involved in, and the aim of carrying out, a range of cyber security threats including brute-force attack, data interception, DDoS attack, hacking, malware (virus, worm, Trojan horse, spyware, adware, ransomware), pharming, phishing, social engineering
- Explain Explain how a range of solutions are used to help keep data safe from security threats including access levels, anti-malware, authentication, automating software updates, checking spelling and tone of communications, checking URLs, firewalls, privacy settings, proxy-servers, SSL security protocol
Define the term 'malware' and give two examples.
'Malware' is any software intentionally designed to cause damage to a computer, server, client, or computer network. Examples include viruses, worms, Trojans, and ransomware.
Explain the difference between a virus and a worm.
A virus requires a host program to infect and spread, while a worm is a self-replicating program that can spread independently across a network without needing a host. Worms exploit vulnerabilities to self-propagate, often causing network congestion.
Describe what a Trojan horse is and how it deceives users.
A Trojan horse disguises itself as legitimate software to trick users into installing it. Once installed, it can perform malicious actions like stealing data, installing other malware, or granting unauthorized access to the system.
What is spyware and what are its potential consequences?
Spyware is software that secretly monitors and collects user information, such as browsing history, passwords, and financial details. It can lead to identity theft, financial loss, and compromised privacy.
Explain what ransomware is and how it affects a user's data.
Ransomware is a type of malware that encrypts a victim's files, making them inaccessible until a ransom is paid to the attacker. It can cripple businesses and individuals by holding their data hostage.
Describe the technique of 'phishing' and give an example.
Phishing involves deceiving users into revealing sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in an electronic communication. An example is an email pretending to be from a bank asking you to update your account details.
What is a firewall and how does it enhance computer security?
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps protect a network from unauthorized access, malware, and other cyber threats.
Explain the purpose of authentication and describe two methods used to authenticate users.
Authentication verifies the identity of a user or device attempting to access a system or network. Two common methods are password authentication (using a secret word or phrase) and biometric authentication (using unique biological traits like fingerprints).
What is two-factor authentication (2FA) and why is it more secure than single-factor authentication?
Two-factor authentication requires users to provide two different types of authentication factors (
Describe the purpose and importance of creating regular data backups.
Data backups involve creating copies of important data to be stored separately from the original source. This provides a safety net in case of data loss due to hardware failure, malware attacks, human error, or natural disasters, allowing for data restoration and minimizing downtime.
Key Questions: Security
Define the term 'malware' and give two examples.
'Malware' is any software intentionally designed to cause damage to a computer, server, client, or computer network. Examples include viruses, worms, Trojans, and ransomware.
Describe what a Trojan horse is and how it deceives users.
A Trojan horse disguises itself as legitimate software to trick users into installing it. Once installed, it can perform malicious actions like stealing data, installing other malware, or granting unauthorized access to the system.
What is spyware and what are its potential consequences?
Spyware is software that secretly monitors and collects user information, such as browsing history, passwords, and financial details. It can lead to identity theft, financial loss, and compromised privacy.
Explain what ransomware is and how it affects a user's data.
Ransomware is a type of malware that encrypts a victim's files, making them inaccessible until a ransom is paid to the attacker. It can cripple businesses and individuals by holding their data hostage.
Describe the technique of 'phishing' and give an example.
Phishing involves deceiving users into revealing sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in an electronic communication. An example is an email pretending to be from a bank asking you to update your account details.
More topics in Unit 5 — The internet and its uses
Security sits alongside these Computer Science decks in the same syllabus unit. Each uses the same spaced-repetition system, so progress in one informs the next.
Cambridge syllabus keywords to use in your answers
These are the official Cambridge 0478 terms tagged to this section. Mark schemes credit responses that use the exact term — weave them into your answers verbatim rather than paraphrasing.
Key terms covered in this Security deck
Every term below is defined in the flashcards above. Use the list as a quick recall test before your exam — if you can't define one of these in your own words, flip back to that card.
How to study this Security deck
Start in Study Mode, attempt each card before flipping, then rate Hard, Okay or Easy. Cards you rate Hard come back within a day; cards you rate Easy push out to weeks. Your progress is saved in your browser, so come back daily for 5–10 minute reviews until every card reads Mastered.
Study Mode
Space to flip • ←→ to navigate • Esc to close
You're on a roll!
You've viewed 10 topics today
Create a free account to unlock unlimited access to all revision notes, flashcards, and study materials.
You're all set!
Enjoy unlimited access to all study materials.
Something went wrong. Please try again.
What you'll get:
- Unlimited revision notes & flashcards
- Track your study progress
- No spam, just study updates