You are on page 1of 2

Student Book Answers

6 Security
6.1 Security threats purposes. If someone else knows it they can
Data security pretend to be you.

1. These are the two reasons why this data is 2. Typically teachers, administrative staff and
valuable to the company: students will be authorised to access a school
computer system. Sometimes parents also have
● The data represents an investment. It has
access.
taken time, effort and resources to create the
data. 3. Crime is deliberate, and typically done for
personal gain. Malpractice is poor use of the
● The data has value because it can be used to
computer system by accident or because of not
make a new product that can be sold to make
knowing the right thing to do.
a profit.
4. Software downloaded from the Internet can
2. The company has personal and financial
contain hidden malware.
data about employees. This could be used
by criminals. It has personal value to the
Online attacks
employees. The data must be kept safely so
the employees are paid correctly. For all these 1. A DoS attack overloads the system with many
reasons it should be kept private, safe and requests for access.
secure. 2. Pharming is pretending to be a respectable
3. Looking at someone else’s emails without website from a reliable company. People may
permission is a data privacy issue. input personal data because they trust the
company, but the website is a trick. Criminals
4. Changing a test result on a computer system is a
will take someone’s identifying details and use
data integrity issue.
them to impersonate that person online (this is
identity theft).
Security threats
3. The email might not be from the bank. The
1. Hardware faults: The computer might be
person on the other end of the line might be
poorly made. Someone might break it by
a criminal hoping to get your identifying
accident. There could be a fault in secondary
details.
storage or data transmission to and from the
computer. 4. The Internet is extremely useful and beneficial
for a business. It can be used to find information,
Software faults: There might be errors in the
to buy and sell, and to market products and
application software or in the operating system.
services. With proper precautions the online risks
2. To protect the file, you could: can be avoided.
● take a backup
● provide guidance and training for employees 6.2 Security protection
about how to treat equipment with care Proof of identity
● test equipment and software before use. 1. There are many valid answers: for example to get
3. There are many correct answers. There could be money out of a bank account, to log on to a social
designated areas for eating and drinking which media account such as Facebook or Twitter.
are well away from the computer. 2. You can make a password harder to guess by
4. There are many correct answers, depending using unusual words, or unusual combinations
on local conditions. Some places are affected of words, letters and other characters.
by different types of bad weather, earthquakes, 3. Two physical characteristics that might be used
flooding, power cuts, etc. for biometric identity checks: fingerprint, retinal
scan.
Malpractice and crime 4. Advantages of biometric checks are that there
1. You shouldn’t you tell anyone else your password is nothing to lose or forget and the results are
because it is used to identify you for security difficult to steal or fake. The disadvantage is that

© Oxford University Press 2016


www.oxfordsecondary.com/acknowledgements 1
Student Book Answers
biometric checks are more expensive than other to know the encryption key. The computer takes
identity checks, partly because special equipment care of encryption and decryption without the
is required. user’s involvement.
4. In asymmetric encryption the private key is not
Firewalls transmitted so it cannot be intercepted by a third
1. A router joins two networks together. Typically it party.
joins a LAN to the Internet.
2. A proxy server holds a copy of a web page. This Security examples
is accessed instead of the page itself. 1. Advantages:
3. A proxy server provides a fast connection to the ● You can bank from home or elsewhere at
Internet. It allows a check on traffic to and from times convenient to you.
the site. It gives greater privacy and security. ● You don’t have to spend time travelling to a
4. The firewall system is composed of a device bank.
(hardware) and a set of instructions (software).
Disadvantages:
5. All data passing to and from the local network
● You don’t get personal service.
is checked before it is passed on. Dangerous
● There is less human contact.
content is not passed through the firewall.
● The service is not tailored to your particular
Security protocols needs.
1. The two parts of the TLS protocol are the record ● There may be security issues.
protocol and the handshake protocol. 2. Advantages:
2. TLS protects transmission between two devices. ● It is quicker.
No other device can read a message sent between ● There is less travel.
the two devices and nobody can make changes to
● You don’t have to carry your purchases home.
the message.
Disadvantages:
3. During the handshake a device can check the
other device’s certificate for authenticity and ● There is more risk in sharing your financial
can agree on an encryption key for the record details online.
protocol. ● The goods might not arrive.
4. Your computer checks that you are connected to ● You have to be at home to accept the delivery,
the Amazon website so that you don’t send your or pick it up from somewhere.
bank payment details and other personal facts to
3. Advantages:
any other site.
● Less time and money is spent commuting.
● Roads have less traffic, so it is better for the
Encryption
environment.
1. If someone intercepts the communication they
● The employer can have smaller cheaper
cannot read it if it is encrypted in cypher text. It
will look like random letters and other symbols. business premises.

2. The key is used by the sender to encrypt the text Disadvantages:


according to a regular formula. A key is also ● It is harder to supervise employees.
needed to decrypt the text by the receiver. ● Only some business can be carried out
3. A computer user needs to remember the remotely.
password and type it in. The user doesn’t need ● There is less social contact for the workers.

© Oxford University Press 2016


2 www.oxfordsecondary.com/acknowledgements

You might also like