Purpose: These notes are written to meet the 2025‑2027 Cambridge syllabus for AS (Topics 1‑11) and A‑Level (Topics 12‑21). Where a topic is not covered in detail, a brief outline and suggested activities are provided so teachers can fill the gap before the exam.
| Topic (Syllabus code) | Title (Syllabus) | Coverage in these notes | Gap / Issue | Actionable suggestion |
|---|---|---|---|---|
| AS 1 | Data processing and information | ✓ (see Section 1) | None | Use the case‑study questions for AO3 practice. |
| AS 2 | Hardware and software | ✗ | No material. | Prepare a “starter slide” covering input, processing, output, storage, and examples of hardware vs. software. |
| AS 3 | Systems of computers | ✗ | No material. | Outline client‑server, peer‑to‑peer, cloud, and IoT architectures. |
| AS 4 | Data representation | ✗ | No material. | Include binary, hexadecimal, character encoding (ASCII/Unicode), and image/audio/video representation. |
| AS 5 | E‑security – encryption, TLS/SSL, IPsec | ✓ (see Sections 2‑4) | Depth exceeds syllabus. | Trim to core concepts; keep “extension” box for deeper study. |
| AS 6 | Networks – types, topologies, protocols | ✗ | No material. | Provide a concise overview of LAN, WAN, MAN, topologies, OSI model, and key protocols (TCP/IP, UDP). |
| AS 7 | Database concepts | ✗ | No material. | Introduce tables, fields, records, primary keys, relationships, and simple SQL SELECT statements. |
| AS 8 | Spreadsheets | ✗ | No material. | Cover cell references, formulas, functions, charts, and data validation. |
| AS 9 | Multimedia – audio, video, animation | ✗ | No material. | Explain sampling, bit rate, codecs, and basic editing tools. |
| AS 10 | Web technologies | ✗ | No material. | Outline HTML, CSS, client‑side scripting, and basic web‑server concepts. |
| AS 11 | Project management & documentation | ✗ | No material. | Introduce project life‑cycle, Gantt charts, risk registers, and user documentation. |
| A 12‑21 | A‑Level extensions (e.g., advanced networking, security, data structures) | ✗ | None of the A‑Level topics are covered. | Develop separate “A‑Level deep‑dive” modules for each required topic. |
Use this checklist at the start of each term to verify that every syllabus requirement will be addressed before the examinations.
Typical sources
Classroom example: A Year 10 class surveys the devices students use at home. Raw responses (“iPhone 12”, “Windows 10 PC”) are data. After grouping into “mobile”, “desktop”, “tablet” and calculating percentages, the result is information that can guide the choice of learning apps.
| Criterion | What it means | Example |
|---|---|---|
| Accuracy | Correctness of content | GPS coordinates to the nearest metre vs. kilometre. |
| Relevance | Suitability for the intended purpose | Student‑age data are relevant for a school‑attendance study but not for traffic‑flow analysis. |
| Timeliness | How up‑to‑date the information is | Five‑year‑old traffic data are unsuitable for a real‑time navigation app. |
| Completeness | All required data are present | A sales report missing the “region” field cannot be used for regional analysis. |
| Consistency | Uniform format and meaning across the dataset | Using both “USA” and “United States” for the same country creates inconsistency. |
Evaluation prompt (AO3): For a given dataset, list two advantages and two disadvantages of each quality criterion. This develops the ability to analyse and evaluate information – a key exam skill.
| Method | Key type | Typical algorithm(s) | Typical use‑case |
|---|---|---|---|
| Symmetric‑key | Same secret key for encryption & de‑cryption | AES, 3DES, ChaCha20 | Bulk data transfer, VPN tunnels, disk encryption |
| Asymmetric‑key (public‑key) | Public key encrypts, private key decrypts (and vice‑versa for signatures) | RSA, ECC (ECDSA, ECDH) | Key exchange, digital certificates, email encryption (PGP) |
| Hash functions (one‑way) | None | SHA‑256, SHA‑3 (MD5 deprecated) | Data integrity checks, password storage, digital signatures |
Summary box – core concepts required by the syllabus
| Protocol | Layer (OSI) | Typical use‑case |
|---|---|---|
| TLS/SSL | Presentation / Session (above TCP) | Secure web browsing, email (STARTTLS), FTP over TLS. |
| IPsec | Network (IP layer) | Site‑to‑site VPNs, remote‑access VPNs, protecting any IP traffic. |
https://, TLS encrypts the HTTP traffic, ensuring passwords are not exposed on the network.| Type | Purpose | Typical technique |
|---|---|---|
| Input validation | Prevent incorrect or malicious data entry | Range checks, format (regex) checks, mandatory‑field checks |
| Output verification | Ensure data sent to another system are intact | Checksums, CRC, cryptographic hash comparison |
| Cross‑validation | Confirm consistency between data sources | Re‑calculating totals, comparing with reference tables |
Classroom example: A web form that records a student’s age should reject values below 0 or above 120 (range check) and verify that the submitted data match the hash sent back from the server (integrity verification).
Transport Layer Security (TLS) is the modern successor to Secure Sockets Layer (SSL). It sits above the transport layer (TCP) and below application protocols such as HTTP, SMTP or FTP, creating a secure point‑to‑point channel for a single session.
Both parties compute the master secret (MS) from the pre‑master secret (PM) and the two random values:
MS = PRF(PM, "master secret", R_C || R_S)
From MS the protocol derives separate session keys for encryption and integrity (or an AEAD tag).
ECDHE (provides forward secrecy).RSA or ECDSA (verifies server identity).AES‑256‑GCM (encrypts data).| Attack | What it exploits | Mitigation (syllabus level) |
|---|---|---|
| BEAST | CBC mode padding oracle in TLS 1.0 | Use TLS 1.1+ or AEAD ciphers. |
| CRIME / BREACH | Compression side‑channel | Disable TLS compression. |
| Heartbleed | Buffer‑overread bug in OpenSSL | Patch libraries; replace vulnerable versions. |
| POODLE | SSL 3.0 fallback attack | Disable SSL 3.0; enforce TLS 1.2+. |
Scenario: A school’s learning‑management system (LMS) uses HTTPS. Evaluate the advantages and disadvantages of using TLS 1.2 with ECDHE‑RSA‑AES256‑GCM versus TLS 1.3 with AES256‑GCM only.
IPsec is a suite of protocols that secures IP traffic at the network layer. It can protect all traffic between two hosts or between two networks, regardless of the application.
| Protocol | Function | Security services |
|---|---|---|
| AH (Authentication Header) | Adds an Integrity Check Value (ICV) to the packet. | Integrity, authentication, anti‑replay (no confidentiality). |
| ESP (Encapsulating Security Payload) | Encrypts the payload and optionally adds an ICV. | Confidentiality, integrity, authentication, anti‑replay. |
An SA is a unidirectional agreement that defines how traffic will be protected.
A multinational company links its London and Singapore offices via an IPsec tunnel in tunnel mode. Evaluate the security benefits (confidentiality, integrity, anti‑replay) and any operational drawbacks (e.g., increased latency, need for compatible routers).
| Aspect | TLS/SSL | IPsec |
|---|---|---|
| OSI layer | Presentation / Session (above TCP) | Network layer (IP) |
| Typical use‑case | Secure web, email, FTP | Site‑to‑site VPN, remote‑access VPN, protecting any IP traffic |
| Mode of operation | Per‑session (handshake creates one SA) | Transport or Tunnel mode; can protect multiple flows under a single SA |
| Key exchange | RSA, (EC)DHE, (EC)ECDHE – negotiated in handshake | Diffie‑Hellman/ECDH via IKEv2 |
| Encryption algorithms | AES‑GCM, ChaCha20‑Poly1305, etc. | AES‑CBC/GCM, 3DES, etc. |
| Authentication | Certificates (PKI) – server, optional client | Certificates or pre‑shared keys; can also use EAP methods |
| Forward secrecy | Provided when (EC)DHE/ECDHE is used | Provided by DH/ECDH in IKEv2 |
| Common attacks | BEAST, POODLE, Heartbleed (implementation bugs) | SA replay attacks, weak DH groups, mis‑configured policies |
strongSwan or OpenVPN and compare its security model with IPsec.| Topic | Key points to remember |
|---|---|
| Data vs Information | Data = raw facts; Information = processed, meaningful data. |
| Quality criteria | Accuracy, relevance, timeliness, completeness, consistency – be ready to evaluate advantages/disadvantages. |
| Validation vs Verification | Validation = check input meets rules; Verification = confirm data transferred correctly. |
| Symmetric encryption | Fast, same secret key, e.g., AES. |
| Asymmetric encryption | Solves key‑distribution, e.g., RSA/ECC; used for exchanging a symmetric session key. |
| TLS/SSL | Transport‑layer security; handshake creates a master secret; provides confidentiality, integrity, authentication, and optional forward secrecy. |
| IPsec | Network‑layer security; two modes (transport/tunnel); uses AH for integrity only, ESP for confidentiality+integrity; keys negotiated by IKEv2. |
| Comparison | TLS protects individual sessions at the application level; IPsec protects all IP traffic between hosts or networks. |
Create an account or Login to take a Quiz
Log in to suggest improvements to this note.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.