Computing, Computer Science, and Information Technology resources for GCSE, IGCSE, IB, and GCE A-Level
Revision notes, activities, lesson plans, teaching ideas, and other resources for GCSE, A-Level, and IB Computer Science teachers and students.
Examples of Local Cryptocurrencies
Digital Money for Local Communities covers three examples of country-wide c...
A hash function takes arbitrary sized input data (e.g. a fil...
Cryptocurrencies vs regular currencies
What is Bitcoin and How Does it Work? is a high level overview of the Bitco...
Examples of Cryptocurrencies
Bitcoin is by far the most well known cryptocurrency. The Bitcoin website w...
Practice paper 3 exam questions
One of the drawbacks of the yearly case study is that there are no past p...
Emergency Management System Explainer Video
This short video gives an overview of some EMIS features. It includes many ...
Geographic Information Systems (GIS)
For some functionality, an EMIS may also be connected to a GIS (Geographic ...
Programming languages - from Scratch to machine code
The CS Field Guide has a very comprehensive guide to different types of pro...
Assembly language simulators
There are several assembly language simulators available for use online. Si...
5.2 Network Security
5.2.1 Validation and Authentication techniques
5.2.2 Cloud storage security
5.2.3 Types of Cyberattack
Types of Malware
This video explains the various types of malware including viruses and trojans, as well as explaining related terminology such as vector and payload.
Video: Network Security #1
This video gives an overview of the threats to networked computer systems, including a huge range of vectors from software exploits and code injections to malware to social engineering and misconfigured software.
5.2.4 Identifying Vulnerabilities
Video: Network Security #2
The second video in this series covers Identifying Vulnerabilities & Security Measures. This covers the techniques used to identify weaknesses in computer security before potential malefactors do: penetration testing and ethical hacking.
5.2.5 Protecting systems from cyberattack
Protecting against Malware
Following on from the Types of Malware video, this video explains techniques for preventing and removing malware - both technological and human based solutions.