1.4 Security
1.4 Security
1.4 Security
Give two other security methods that could be added to improve the security of the data.
Describe how each method will keep the data safe.
Description ……………………..................................................................................................................................
Page 1
…………….....................................................................................................................................................
...................................................................................................................................................................
Description ……………………..................................................................................................................................
…………….....................................................................................................................................................
……………................................................................................................................................................ [2]
Q2 2016-Nov,P12
.........................................................................................................................................................
.........................................................................................................................................................
.................................................................................................................................................... [2]
(b) Name and describe two other potential security threats when using the Internet.
Description ……………................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
Description ……………................................................................................................................................
……...................................................................................................................................................
.................................................................................................................................................... [4]
Q3 2016-June, P12
Viruses: .....................................................................................................................................................
Page 2
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
Pharming: ................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
Spyware: ..................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
............................................................................................................................................................. [6]
1 ......................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
2 ......................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
3 ......................................................................................................................................................
.........................................................................................................................................................
.................................................................................................................................................... [3]
Q4 2015-Nov, P13
4 (b) The four statements below refer to firewalls and proxy servers.
Study each statement.
Tick (v") the appropriate column(s) to indicate whether the statement refers to a firewall
and/or a proxy server.
Statement Firewall Proxy server
Page 3
Speeds up access of information from a web server by
using a cache
1 ......................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
2 ......................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
3 ......................................................................................................................................................
.........................................................................................................................................................
.................................................................................................................................................... [6]
10 Choose five correct terms from the following list to complete the spaces in the sentences below:
cypher text
encryption algorithm
encryption key
firewall
plain text
proxy server
symmetric encryption
Page 4
The ..................................................................................... processes the original message.
Q5 2015-Nov,P12
1 There are a number of security risks associated with using the Internet.
Name three of these risks. For each, state why it is a risk and describe how the risk can be
minimised.
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
Page 5
............................................................................................................................................................. [9]
Q6 2015-June, P12
1 (a) Four statements about cookies are shown in the table below.
Page 6
(b) Five descriptions and five security issues are shown below.
Page 7
4 (a) State what is meant by the term SSL.
……...................................................................................................................................................
.........................................................................................................................................................
....................................................................................................................................................[1]
(b) The following stages take place when a user wishes to access a secure website.
Put each stage in sequence by writing the numbers 1 to 6 in the column on the right. The first
one has been done for you.
equence number
Stage
the encrypted data is then shared securely between the web browser and the
web server
the web server sends the web browser a copy of its SSL certificate
the web server will then send back some form of acknowledgement to allow the
SSL encrypted session to begin
the web browser checks whether the SSL certificate is trustworthy; if it is, then
the web browser sends a message back to the web server
Q7 2015-June, P11
6 (a) Viruses, pharming and phishing are all examples of potential Internet security issues.
Virus ...............................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
Pharming ………................................................................................................................................
Page 8
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
Phishing ..........................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.................................................................................................................................................... [6]
(b) An online bank requires a client to supply an 8-digit code each time they wish to access their
account on the bank’s website.
Rather than ask the client to use a keyboard, they are requested to use an on-screen keypad
(shown on the right) to input the 8-digit code.
The position of the digits on the keypad can change each time the website is visited.
The client uses a mouse or touch screen to select each of the 8 digits.
2 5 1
(i) Explain why the bank has chosen to use this method of
entering the 8 digits.
6 8 3
9 0 4
...............................................................................................................................................
...............................................................................................................................................
.......................................................................................................................................... [2]
(ii) Name and describe another measure that the bank could introduce to improve the
security of their website.
Name .....................................................................................................................................
Description ...........................................................................................................................
Page 9
...............................................................................................................................................
...............................................................................................................................................
.......................................................................................................................................... [2]
Page 10
Q8 2014-June, P11
4 The diagram below shows a number of descriptions and terms used in computer security.
By drawing arrows, connect the correct description to the computer security term.
Q9 2013-Nov, P13
1 (b) Data being held is often referred to as Personal or Sensitive Personal data.
Personal Data
1 ……………........................................................................................................................................
.........................................................................................................................................................
Page 11
2 …………...........................................................................................................................................
.........................................................................................................................................................
1 ……………........................................................................................................................................
.........................................................................................................................................................
2 …………...........................................................................................................................................
.................................................................................................................................................... [4]
4 A customer logs on to a bank website so that she can access her account.
(a) The first thing she was asked to do was to give the 3rd, 4th and 7th character of her
password. This was done using drop-down boxes:
Give two reasons why the customer was asked to supply only 3 characters from her
password.
1 ……………........................................................................................................................................
.........................................................................................................................................................
2 …………...........................................................................................................................................
.................................................................................................................................................... [2]
(b) Authentication is a technique used in bank security to check that the customer is who they
say they are. This involves three pieces of information, other than the password, all related
to the customer.
1 ……………........................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
2 …………...........................................................................................................................................
Page 12
.........................................................................................................................................................
.........................................................................................................................................................
3 ……………........................................................................................................................................
.........................................................................................................................................................
.................................................................................................................................................... [3]
hacking
pharming
phishing
spyware
viruses
For each one, describe the security issue and suggest a way of protecting against it.
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
Page 13
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
chat rooms
cookies
pharming
virus
VoIP
I. typing in the same data twice and the computer checks both sets of data to see if they
exactly match
……………………………………………………………………………………………………………………………………………………
II. Count of the number of bits before transmission which is sent with the transmission so that the
receiver can check to see whether the same number of bits have arrived
Page 14
……………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………… [3]
(b) She lost all her photographs when her computer crashed.
………………………………………………………………………………………………………………………………………….
……………………………………………………………………………………………………………………………….…… [2]
(ii) How could she have avoided losing all her photographs?
………………………………………………………………………………………………………………………………………….
……………………………………………………………………………………………………………………………….…… [2]
(c) Lucy was sent an important attachment in an email, but couldn’t open it.
……………………………………………………………………………………………………………………………………………………
…….…………………………………………………………………………………………………………………………………………[1]
(d) She decided to invest in a wireless (Wi-Fi) mouse and keyboard for her computer.
Benefit ….……………………………………………………………………………………………………………………………………
…….…………………………………………………………………………………………………………………………………………….
Drawback ………..…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………… [2]
Page 15
Q13 2012-June, P11
1 Video conferencing, Voice over Internet Protocol (VoIP) and instant messaging are all used as
c o m m u n i c a t i o n methods. Certain devices are essential to enable each of t h e s e
communication methods to be used.
Tick (“”) the appropriate cells in the table below to show which one or more devices are
essential for each method.
video
conferencing
instant
messaging
2 Describe ways to guard against each of the following Internet security issues. (A different method
should be given in each case.)
Viruses …………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
Hacking …………………….…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
Spyware ………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
Phishing ………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
Page 16
…………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………. [5]
(a) Give one benefit and one drawback of using Internet banking.
Benefit .………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………
Drawback ……………………………………………………………………………………………..……………………………………
……………………………………………………………………………………………………………………………………………… [2]
Page 17
Q15 2011-June, P12
6 FIVE security or data loss issues are shown on the left handside.
FIVE possible methods of data recovery or protection are shown on the right.
Match the definitions/descriptions on the left to the most appropriate method on the right by
drawing connecting arrows.
Q16 2011-June,P11
3 A worker at a company has to go through a logon procedure to gain access to her computer system.
The first thing she has to do is type in a user name and a password.
……………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………… [1]
Page 18
Why is this done?
……………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………… [1]
A menu then appears on her screen. She chooses to connect to the Internet.
(c) Describe two ways her computer system is protected against loss or corruption of files once
the computer system is connected to the Internet.
……………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………… [2]
(d) The worker leaves her computer system for a 10-minute break.
(i) From a health and safety aspect, why does she need to take a regular break?
………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………….
(ii) Apart from switching off her machine, how could she ensure her computer system was
secure whilst taking her regular break?
………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………….
…….……………………………………………………………………………………………………………………………… [2]
(a) Choose a suitable different validation check for each of the following:
Page 19
………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………….
(ii) Today’s Date which must be written as, for example, 15/10/2010
………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………….
(iii) The Examination Result which can be any number from 0 to 100
………………………………………………………………………………………………………………………………………….
……………………………………………………………………………………………………………………………….…… [3]
(b) Apart from validation, how would it be possible to ensure only certain data could be input
into each of the fields on the computer screen?
……………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………… [1]
(i) Apart from switching off, how can the secretary make sure the computer system is
secure whilst she takes a ten minute break?
………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………….
(ii) From a health and safety aspect, why does the secretary need to take regular
breaks?
………………………………………………………………………………………………………………………………………….
……………………………………………………………………………………………………………………………………. [2]
data corruption
data loss
illegal access to data
For each of the above, give one reason why it could occur and state one method of
prevention. Your reasons must be different in each case.
Page 20
Data corruption
Reason: ……………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
Data corruption
Prevention: ………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
Data loss
Reason: ……………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
Data loss
Prevention: ………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………………………….
…………….………………………………………………………………………………………………………………………………………… [6]
16 A company has set up an Internet website to sell their electrical goods online.
(a) Give two features you would expect to see on the website.
1 ……………........................................................................................................................................
Page 21
.........................................................................................................................................................
2 …………...........................................................................................................................................
.................................................................................................................................................... [2]
(b) Payments for goods can be made by credit/debit cards. Data from the cards is
encrypted.
………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………….
…….……………………………………………………………………………………………………………………………… [2]
(c) Apart from credit card fraud, people have other fears about buying from the Internet.
……………………………………………………………………………………………….………………………………………………….
……………………………………………………………………………………………….………………………………………………….
.................................................................................................................................................... [1]
Page 22
Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.
Alternative Proxies: