Full Descriptive and Informative Notes for IGCSE ICT Paper 1
(Theory)
1. Unauthorized Access & Accidental Deletion
Unauthorized Access: Unauthorized access refers to situations where individuals gain access to computer
systems, networks, or data without the required permission. This is a major concern for organizations because it
can result in data breaches, theft, or misuse of sensitive information.
Direct Entry: This includes methods such as brute force attacks where a user attempts to guess
passwords repeatedly using software.
Indirect Entry: This involves exploiting software bugs or manipulating users into revealing access
credentials (e.g., through social engineering).
Botnets: A collection of compromised computers (often infected by malware) controlled remotely to
perform malicious activities without the owner's knowledge.
Accidental Deletion: Data may be deleted accidentally due to human error. Examples include:
Pressing the wrong key
Formatting a drive unintentionally
Sudden power loss during data write operations
To reduce the risk of accidental deletion, regular backups and permission-based access control should be used.
2. Malware
Malware (Malicious Software): Malware refers to any software intentionally designed to cause damage to a
computer, server, or computer network.
Virus: A program that can replicate itself and spreads to other files. It can corrupt files, delete data, or
make the system unstable.
Worm: Similar to a virus but spreads automatically across a network without user action.
Trojan Horse: A malicious program disguised as legitimate software. Often creates a backdoor for
hackers.
Spyware: Installed secretly to monitor user activity and gather sensitive information.
Ransomware: Encrypts files and demands payment for a decryption key. Paying does not guarantee
data recovery.
Prevention:
Use updated anti-malware software.
Avoid opening unknown email attachments or visiting unsafe websites.
Regularly update operating systems and software.
3. Phishing & Pharming
Phishing: A type of social engineering attack where attackers send fake emails or messages that look like
they're from trustworthy sources to steal information.
Effects: Identity theft, bank fraud, data breaches.
Prevention: Use spam filters, staff awareness training, verify email sources.
Pharming: Redirects a user from a legitimate website to a fraudulent one using DNS poisoning.
Effects: User unknowingly enters login info to fake site.
Prevention: Anti-malware, checking for HTTPS, and padlock icon.
4. Securing Data
Passwords: Strong passwords contain a mix of letters, numbers, and symbols. Change regularly.
Biometrics: Uses unique human features for identification (fingerprint, retina, face scan). Harder to forge than
passwords.
CAPTCHA: Tests like selecting images or entering distorted text to confirm the user is human.
Anti-malware Software: Detects and removes malicious software. Includes antivirus, anti-spam, anti-spyware.
Access Rights: Control who can view or edit files. Levels include full, read-only, and no access.
HTTPS: Encrypts communication between browser and server. Safer than HTTP.
Email Safety: Be cautious of unknown senders, attachments, and suspicious links.
Backup Procedures:
Full Backup: All files saved; time-consuming.
Incremental Backup: Only new or changed files saved; faster.
Storage: Local (hard drives) or remote (cloud).
5. Online Payment Systems
Types:
Bank cards (credit/debit)
Third-party processors (PayPal, Stripe)
Contactless (NFC)
Security Features:
Encryption
Two-Factor Authentication (2FA)
HTTPS
Bank monitoring and fraud alerts
6. Impact of Internet on Employment & Working Practices
Skill Requirements: Increased demand for tech literacy, critical thinking, and problem-solving.
New Opportunities:
Cyber security professionals
AI/ML engineers
Digital marketers
Data scientists
Job Losses: Automation replaces some manual roles. Lifelong learning is essential.
Working Practices:
Flexible/Remote work allows employees to work from anywhere.
Benefits: No commuting, better work-life balance.
Drawbacks: Lack of social contact, harder to manage employees.
7. Access to Information
Internet Advantages:
Real-time updates (news, sports, weather)
24/7 access
Interactive learning (VLEs, gamification, social learning)
Digital Divide: Gap between those with access to digital tech and those without. Influenced by income,
geography, politics, and education.
8. Online Communities
Types:
Social Networks (Facebook, LinkedIn)
Online Gaming (Steam, Xbox Live)
Workspaces (Slack, Google Workspace)
VLEs (Moodle, Google Classroom)
Features:
Profiles, status updates, messaging
Groups, friend lists, forums
Notifications, commenting, reactions
Sharing content and collaboration tools
9. User-Generated Content
Wikis: Websites edited by users collaboratively.
Forums: Online message boards for structured discussion.
Video/Photo Sharing Sites: YouTube, TikTok, Instagram. Allow uploads, comments, likes.
Social Bookmarking: Save/share links (Pinterest, Reddit).
10. Legal & Ethical Use of Information
Data Protection Act (DPA): Protects personal data from misuse. Includes principles such as:
Data must be accurate and up to date
Collected for specified, lawful purposes
Not kept longer than necessary
Copyright: Protects original work. Illegal to copy, distribute, or alter without permission. Includes software
piracy.
Plagiarism: Presenting someone else’s work as your own. Avoid by referencing sources.
11. Monitoring Individuals
Methods:
CCTV, GPS, ANPR
Social media activity
Internet browsing and communication logs
Pros: Public safety, crime prevention, locate missing persons. Cons: Privacy invasion, high costs, public
distrust.
12. Health & Physical Safety
Health Risks:
RSI (from repetitive typing)
Eye strain (staring at screens)
Back/neck pain (poor posture)
Headaches (lighting, screen flicker)
Prevention:
Ergonomic furniture
Anti-glare screens
Regular breaks
Proper screen brightness
Physical Safety Risks:
Electrocution (spills, damaged cables)
Fire (overloaded sockets)
Trip hazards (loose wires)
13. Online Safety
Why It's Needed: To protect users from scams, cyberbullying, privacy threats, and online predators.
Good Practices:
Avoid sharing personal information
Use privacy settings on social media
Use anonymous usernames in games
Block/report harmful users
Respect others online (digital citizenship)
14. Environmental Impact
Carbon Footprint: Emissions from device manufacturing and usage.
E-Waste: Toxic electronic waste harming the environment.
Resource Use: Digital devices use rare materials.
Energy Use: Data centers and homes consume significant power.
Sustainability Solutions:
Recycling programs
Renewable energy
Energy-efficient devices
15. Evaluating Information
Criteria to Check:
Accuracy: Is the source reliable and evidence-based?
Age: Is the info current?
Relevance: Does it meet the research need?
Reliability: Does it match other credible sources?
Bias: Is it balanced or one-sided?
Types of Sources:
Primary: Created by you (surveys, photos)
Secondary: Created by others (books, articles)
IGCSE Paper 1 - Exam Style Questions (Edexcel Format)
Section A: Multiple Choice
1. Which of the following best describes a 'botnet'? A. A type of antivirus software
B. A group of interconnected printers
C. A network of infected computers controlled by a hacker
D. A firewall designed to prevent spam
[1 mark]
2. What is the main purpose of a CAPTCHA? A. Encrypt user data
B. Prevent automated access to websites
C. Speed up internet browsing
D. Scan emails for viruses [1 mark]
Section B: Short Answer
3. Explain two ways a user can prevent unauthorised access to their computer system.
[4 marks]
4. Describe what is meant by ‘ransomware’ and explain one way to reduce the risk of infection.
[4 marks]
5. State three features of a Virtual Learning Environment (VLE).
[3 marks]
6. Give two reasons why someone might evaluate the accuracy of an online article.
[2 marks]
Section C: Extended Response
7. A student is creating an online project and wants to protect it from loss or damage. Discuss the methods
they can use to secure their work. Include reference to backups and access controls.
[6 marks]
8. Discuss the environmental effects of using digital devices and explain how these effects can be reduced.
[6 marks]
9. Explain the advantages and disadvantages of working from home for both employers and employees.
[6 marks]