Communication 1
Communication 1
3) Disk Mirroring
4) Firewall
6) Anti Malware
7) Access Rights
8) Physical Measure
Types Of
Description
Software
Proxy Server
192.168.1.1 22.11.22.1
Malware
Malware is software that is intentionally designed
to cause damage to a computer or server.
Types Of Malware
Virus, Spyware
Explain the term virus ?
Use anti-virus
update anti-virus on regular basis
avoids downloads from unknown sources
use a firewall
avoid suspicious websites.
(1) Virus
(2) Spyware
PHARMING
Malicious code installed on user’s computer or webserver.
The code redirects the user to fake website.
Difference:
Pharming is malicious code that redirects to a fake
website. Phishing uses an email to prompt user action.
Pharming is automatic. Phishing requires user action.
Similarity:
Both try to obtain financial or personal information
Both are a false representation of an official
organization, e.g. a bank
Both make use of fake websites
Explain how the data security risks of Malware can be
restricted
Data
Data needs protecting from someone amending /
deleting or taking it
Computer System
Computer system need protecting to stop people for
example, installing malware or damaging the system
Data Integrity
Validation: Checks that the data entered is reasonable.
Verification: Checks that the data entered is same as the original.
Validation
Range Check: Checks whether data entered is between a lower
and an upper limit
e.g. using 13 as months or -120 as age
Limit Check: Checks only one of the limits (such as the upper
limit or lower limit)
e.g. 1.5 litre only.
Check Digit
Checks whether a numeric or alphanumeric identifier has been
entered correctly by verifying the last digit, which is derived
from the other digits using a specific algorithm.
Validation
protects the data by ensuring that the data is reasonable
and within specified bounds
Verification
Is a way of preventing errors when data is entered manually
using a keyboard or when data is transferred from one
computer to another.
Explain why the data in the system may not be correct even
after validating and verifying the data ?
Hashing Algorithm
Hashing algorithms are mathematical functions that produce a
hash key.
Explain how digital signature is used to ensure email is
authentic?
Question 22
Question 24
Question 26
Answer 1
Answer 2
Answer 5
Answer 7
Answer 10
Answer 12
Answer 13
Answer 21
Answer 23
Answer 38