We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
PREMIER EDUCATION SOCIETY’S
TRINITY INTERNATIONAL SCHOOL (IGCSE - A LEVEL)
STD. IX INFORMATION AND COMMUNICATION 2023-2024 TECHNOLOGY ASSIGNMENT SHEET 21 –(Pages – 02)
Name: __________________ Roll No. ______ Date: ________
Safety and security
1. Use of computers can lead to health and safety risks.1A
Name three health risks. For each one, describe what causes the risk and suggest a way of reducing or eliminating the risk.
2. Describe the main principles of Data Protection Act. (
Textbook Pg no.195) 3 a. What is meant by e-safety? 2 .a. b. Describe five ways of ensuring e-safety.
4. Explain the following two terms: (4)
a. phishing b. pharming
5. Biometrics is used as a security method in many applications.
Complete the following table which identifies: comparative accuracy required input devices what can interfere with the biometric technique.
Biometric Comparative Input What can
technique accuracy devices interfere with High Medium required biometric () () technique? Fingerprinting Retina scans Voice recognition Face recognition
Strictly For Private Internal Circulation only
2 6. Indicate () which of the following tasks are carried out by a firewall. Task Carried out by a firewall Firewall can control employee misconduct or carelessness, preventing them divulging passwords. Firewalls can examine traffic between a user’s computer and the public network (e.g. internet) Firewalls can help to prevent viruses or hackers entering the user’s computer or computer network Firewalls can be used to log all incoming and outgoing traffic to allow later interrogation by a network manager Firewalls can prevent individuals on internal networks from using their own modems to by-pass the firewall. Firewalls warn the user if software on their computer is trying to access an external data source (e.g. automatic software update) 7 a. Explain the term SSL. (6.a i, c) b. Five stages that occur when a user wants to access a secure website and receive/send data from/to if are shown below. Put the five stages in their correct order. A If the web browser can authenticate the SSL certificate, it sends a message back to the web server to allow communications to begin. B The web server responds by sending a copy of its SSL certificate to the user’s web browser. C The user’s web browser sends a message so that it can connect with the required website which is secured by SSL. D Once the message is received, the web server acknowledges the web browser and the SSL-encrypted two-way data transfer begins. E The web browser requests that the web server identifies itself. 8. Explain what is meant by Personal data. 9. Explain why it is important to encrypt emails. 10. Which of the following are weak passwords and which are strong passwords? Explain your decision in each case. i 25-Apr-2005 ii Password1 iii ChapTer@06 iv rX!3&tp% v 111111” **********
Botnet Attack Detection in the Internet of Things Using Selected Learning Algorithms: A Research Study on Securing IoT Against Cyber Threats Using Machine Learning