IGCSE - PAPER-1 - Student Notes-115-120
IGCSE - PAPER-1 - Student Notes-115-120
Accidental Damage
Data could also be accidentally damaged through:
Loss of power
Liquids being spilt
Flooding
Fire
Hardware failure
Software failure
Human error
Pressing delete by mistake
Not saving data
Not shutting down the computer correctly
Automating software updates ensures that software systems are up-to-date with the
latest security patches, which helps to prevent security threats
This is especially important for operating systems and software that are frequently
targeted by hackers
It does this by scanning the Internet for known updates to software which are installed on
the computer
If any updates are found, these can either install automatically or notify the user to install
them
Communications
Checking the spelling and tone of communications is important to prevent phishing
attacks
URL
Checking the URL attached to a link is another way to prevent phishing attacks.
Hackers often use fake URLs to trick users into visiting fraudulent websites
e.g. http://amaz.on.co.uk/ rather than http://amazon.co.uk/
Firewalls
A firewall can be software or hardware based
It monitors incoming and outgoing traffic between the computer and the network
The user sets criteria for the traffic
The firewall will accept or reject the traffic based on this
It can help prevent hacking and malicious software that could be a threat to the security of
the data
Privacy Settings
Privacy settings are used to control the amount of personal information that is shared
online
They are an important measure to prevent identity theft and other forms of online fraud
Users should regularly review their privacy settings and adjust them as needed
Proxy-Servers
Proxy-servers are used to hide a user's IP address and location, making it more difficult
for hackers to track them
They act as a firewall and can also be used to filter web traffic by setting criteria for traffic
Malicious content is blocked and a warning message can be sent to the user
Proxy-servers are a useful security measure for protecting against external security threats
Secure Socket Layer
SSL is a security protocol which is used to encrypt data transmitted over the internet
This helps to prevent eavesdropping and other forms of interception
SSL is widely used to protect online transactions, such as those involving credit card
information or other sensitive data
It works by sending a digital certificate to the user’s browser
This contains the public key which can be used for authentication
Once the certificate is authenticated, the transaction will begin
Physical Methods
Physical methods are used to physically protect hardware that stores sensitive data
This can include:
Locked rooms needing a key or card access
CCTV
Bodyguards
Backup
This is the process of making a copy of files in case something happens to the original
ones
Backing up data is important to protect against data loss due to hardware failure, cyber-
attacks, or other disasters
Backups should be stored in a secure location, and multiple copies should be made
Regular backups ensure that data can be recovered in the event of a security breach or
data loss