0% found this document useful (0 votes)
90 views

IGCSE Security

1. The document provides instructions for answering questions about data security and ethics. It asks to define different types of internet security threats like viruses, phishing, and pharming. 2. Questions are asked to match security issues like pharming, phishing, and viruses to their definitions. Terms related to data security are also defined, including hacking, spyware, cookies, encryption, secure socket layer, proxy server, and denial of service attacks. 3. The document asks how tools like secure socket layer and firewalls can keep data safe during transmission and storage, and what additional security measures a company should take to protect customer data stored on its computer systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views

IGCSE Security

1. The document provides instructions for answering questions about data security and ethics. It asks to define different types of internet security threats like viruses, phishing, and pharming. 2. Questions are asked to match security issues like pharming, phishing, and viruses to their definitions. Terms related to data security are also defined, including hacking, spyware, cookies, encryption, secure socket layer, proxy server, and denial of service attacks. 3. The document asks how tools like secure socket layer and firewalls can keep data safe during transmission and storage, and what additional security measures a company should take to protect customer data stored on its computer systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Friday 28 May 2021

Security and Ethics: Security


Instructions

 Write your answers in complete sentences


 Highlight the answer
 Write neatly and legibly

1. Data is valuable. It needs to be kept secure and can easily be


damaged. Give three different ways that data can be easily
damaged. [3]
2. Viruses, Phishing and Pharming are examples of internet security
issues. Explain what is meant by each of these three terms. [6]
3. Six security issues and six descriptions are shown below. Link each
security issue to the correct description

Security Issue Description

a. Pharming illegal access to a computer system without


the owner’s consent or knowledge.

b. Phishing software that gathers information by


monitoring key presses on a user’s
keyboard, the data is sent back to the
originator of the software.

c. Viruses malicious code installed on the hard drive


of a user’s computer or on a web server,
this code will re-direct the user to a fake
website without the user’s knowledge.
d. Hacking creator of code sends out a legitimate-
looking email in the hope of gathering
personal and financial information from the
recipient; it requires the user to click on the
link in the email or attachment.

e. Spyware a message given to a web browser by a web


server, it is stored in a text file; the message
is then sent back to the server each time a
browser requests a page from the server.

f. Cookies program or code that replicates itself,


designed to amend, delete or copy data or
files on a user’s computer; often causes the
computer to crash or run slowly.

g. Encryption computer that acts as an intermediary


between a web browser and the internet.

h. Secure Socket Layer scrambles data for secure transmission.

i. Proxy Server provides a secure connection between web


browsers and websites allowing secure
transmission of private data. [9]

4. Explain what is meant by a denial of service attack. [2]


5. a) Data is transmitted between offices over the Internet. In order to
keep the data safe the company is using Secure Socket Layer (SSL)
protocol and a firewall at each office.
Explain how SSL protocol and a firewall keep the company’s data
safe. [4]
b) A company stores personal details of its customers on a computer
system behind a firewall. Explain with reasons, what else the company
should do to keep this data safe. [6]

Total: 30 Marks

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy