T2 Worksheet 2
T2 Worksheet 2
Task 1
Encryption is used to prevent unauthorised people from reading the contents of files and
communications.
Complete the table below to explain how encryption is used in different circumstances in your
personal life, home and school.
Type of encryption How this is used in your personal life, home and school
Encryption of transmitted HTTPS encrypts data shared with websites. Messages are
data encrypted in messages.
Encryption of individual ?
files
1
Worksheet 2 Preventing vulnerabilities
Unit 4 Network security and systems software
Task 2
1. Fill in the blanks with the words beneath the text.
Firewalls are available as a special hardware device or as ___software___. A firewall will
block __packets___of information that are from certain malicious IP addresses. It can also
block packets that are for _____ports____that are not used. When packets are blocked
from entering a computer or network they are said to be ___dropped______. A firewall
can look at the data inside each packet of data. This is known as __packet
inspection____. Computers that are protected by the firewall are part of the ____trusted
network_______.
2. User access levels allow different users the ability to access different parts of a system.
For files, certain users may be given read, write or execute permissions.
Explain what each of these permissions allow a user or group of users to do with a file.
Read
Write
Execute
2
Worksheet 2 Preventing vulnerabilities
Unit 4 Network security and systems software
Task 3
There are many ways that companies and people can protect their computer systems and
data.
Look at the table below and match the methods on the left with their meanings on the right.
3
Worksheet 2 Preventing vulnerabilities
Unit 4 Network security and systems software
Task 4
Go to: https://www.my1login.com/resources/password-strength-test/
(a) Complete the table below to explain the problems with the suggested passwords.
123456
trustno1
passw0rd
Passw0
jctbbqjc
JcT3£BBQ
4
Worksheet 2 Preventing vulnerabilities
Unit 4 Network security and systems software
(b) Suggest at least three rules that can be made to make strong passwords.
1. 8 letters or more
2. Capital Letter 1+ (the more the better but have a mix of lowercase and uppercase)