Understand how to protect software systems from cyber attacks, including considerations at the software (application) design stage, audit trails, securing operating systems, secure coding, code reviews to remove code vulnerabilities in programming languages and bad programming practices, modular testing and effective network security provision.
Standard detail
CS.CI.2e
Depth 3Parent ID: 0067F7D17AFA4657B683CCC69F929F93Standard set: Computer Science 9-1
Original statement
Quick facts
- Statement code
- CS.CI.2e
- List ID
- 5
- Standard ID
- D4EA7BCCFE5B4C38BF8822B43935DE58
- Subject
- Computer Science
- Grades
- 09
- Ancestor IDs
- 0067F7D17AFA4657B683CCC69F929F9384455E7F9FEF4F35A4868BF661331EE7CEA592C8FB384F4C89CEA0425A43562F
- Source document
- iGCSE_CS(9-1)
- License
- CC BY 4.0 US