0% found this document useful (0 votes)
42 views5 pages

T2 Worksheet 2

Uploaded by

arushi.agupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views5 pages

T2 Worksheet 2

Uploaded by

arushi.agupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Worksheet 2 Preventing vulnerabilities

Unit 4 Network security and systems software

Name:...................................................................................................... Class: ......................

Task 1
Encryption is used to prevent unauthorised people from reading the contents of files and
communications.

Complete the table below to explain how encryption is used in different circumstances in your
personal life, home and school.

Type of encryption How this is used in your personal life, home and school
Encryption of transmitted HTTPS encrypts data shared with websites. Messages are
data encrypted in messages.

Encryption of individual ?
files

Encryption of drives Regularly done automatically by the computer

1
Worksheet 2 Preventing vulnerabilities
Unit 4 Network security and systems software

Task 2
1. Fill in the blanks with the words beneath the text.
Firewalls are available as a special hardware device or as ___software___. A firewall will
block __packets___of information that are from certain malicious IP addresses. It can also
block packets that are for _____ports____that are not used. When packets are blocked
from entering a computer or network they are said to be ___dropped______. A firewall
can look at the data inside each packet of data. This is known as __packet
inspection____. Computers that are protected by the firewall are part of the ____trusted
network_______.

Dropped Packet inspection Software


Packets Ports Trusted network

2. User access levels allow different users the ability to access different parts of a system.
For files, certain users may be given read, write or execute permissions.
Explain what each of these permissions allow a user or group of users to do with a file.

Read

Write

Execute

2
Worksheet 2 Preventing vulnerabilities
Unit 4 Network security and systems software

Task 3
There are many ways that companies and people can protect their computer systems and
data.
Look at the table below and match the methods on the left with their meanings on the right.

Method of protecting computer


Meaning
systems and data
Encrypting stored data A string of characters used to
gain access to a computer
system
Anti-malware software A company or person employed
to try and find security holes in a
system
Passwords Files stored in an encoded
format that cannot be decoded
without a key or password
Encrypting communications Prevents viruses, spyware,
Trojans, worms and other
malicious software
Penetration testing Prevents users from accessing
files or resources
Firewalls Prevents certain packets of data
from entering the network

User access levels Using methods such as HTTPS


(secure HTTP) for website
access or WPA (Wi-Fi Protected
Access) for wireless
connections
Physical security Any device that prevents people
accessing computer hardware,
software or networks – such as
CCTV or locks

3
Worksheet 2 Preventing vulnerabilities
Unit 4 Network security and systems software

Task 4
Go to: https://www.my1login.com/resources/password-strength-test/

(a) Complete the table below to explain the problems with the suggested passwords.

Password Problems with password


password

123456

trustno1

passw0rd

Passw0

jctbbqjc

JcT3£BBQ

[Try a password that you


have previous used –
DO NOT USE A
CURRENT
PASSWORD]

4
Worksheet 2 Preventing vulnerabilities
Unit 4 Network security and systems software

(b) Suggest at least three rules that can be made to make strong passwords.

1. 8 letters or more

2. Capital Letter 1+ (the more the better but have a mix of lowercase and uppercase)

3. Numbers (at least two) with a symbol

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy