cs OL
Assignment #6
Eng. Maged Wageeh
Student Name: Nooeien — wig Sook
School: fi tl
Year: \2
Marks: / 100
Percentage:
Grade (9-1 Grading Scheme):
Scanned with CamScanner[1]
Arya regularly uses the Intemet as a research tool for her school projects.
Identity and describe three risks to Arya’s computer when she is using the Internet for research
Risk 1... MatiKing, fs _ . an
Description .. Teen OL: Bai INGA BCLS le
CORRAL oo SYS AARON te MNES Machel iny.. ASE.
MOA oo ABS AOA BEY. thet:
Risk 2..... Wis. : . — .
Description... P@Sieat.. trad. eobiaheh... S45ELE WAR Aha.
Fb oP hede tag... 0. Covdabtis ENS. ov... Qrk,
the... Comnbutey. tea. Cxash -
Risk 3... SPY Wave...
Decenption..A... Sead... ARM... Shad... ferreaay bY
Wondtol nd... Key _
dated
Scanned with CamScanner[2]
{@) Lola is concerned about the risks to her computer when using the internet,
She wants to use some security methods to help protect her ‘computer from the risks.
\centity a security method she could use for each of the following risks. Each security method
must be different
Describe how each security method will help protect Lola's computer
(Computer virus
Security method... MSA IAS... AMT MAS un SOP Hane,
Description . Ati es... Thee. aa Vis... Slaas...
Pee NEB. Go MNOS and. Peder... Ahem ad
AORCOK8 oo DAN pele BAG oo bade
Sha S Bra aM EE Bbw Mo AS a
Ackected:
(ii) Hacking
Security method .. USe.....0f. Riratalt
Dewrtet ndBenutck..\eveniiees....sille “Cami inde and.
Bert OF cou Abe CDM HON ses
HT lol hbo ABC tak. ABM Meet.
Pree oo ONPEMIBS sce a
(iii) Spyware
security method .. WMSalling,.. ant! -SPYHe....... SAH WAYE
Description DAT... Sea $... Aree... Qoinflot aL... Ae... SPY ave.
nd. VemVeS.....aAY..... Spy... founds... dat..Gr,
PM. AP... Aptraare..Fte eins... dotdsloaded
a)
Scanned with CamScanner(b) Lola is also concerned that the data she st cl
Lola is also co tores could be subject to accidental damage or
(0) State three ways thatthe data Lola stores could be accidentally damaged or accidentally
st
ee
2. Physica... damage.
3 vnnblewdudaré,... ad lure
iS)
(ii) Give two methods that Lola could use to help keep her data safe from accidental damage
or accidental loss.
1 MSA ACK ADS ch MeCN edte..3.
COSC AO HB ANS ocoon MOE ; :
BS Ml RANE Oe AGMA, ABRSIE
COS ees Ree a SO PAW OE. MSIE 00s a
Scanned with CamScanner[3]
An art gallery has a website that is used to display and sell art.
(a) The gallery uses Secure Socket Layer (SSL) to provide a secure connection when selling ant.
Describe the process of SSL and how it provides a secure connection.
Thee MS Wldo.. Wowie. Sea... domes. Sa.. ‘hak.
OM on A GAN MPR atthe MeN... deste... adhich
Bg Bete. la¥.. SSL#
Ye Tee MOD INS Meet ARE AN ba... Soot
Membres... Arse? - —
Fa Mee WE. ANI. Se Be CON 08. 3%S $8 Lo
AN MASE oo WLC bbb
Fe TER Ane MO Va lt. GAs Bla te ogee SSL ite
OS en POEISIY C0 OAM ADO tthe alee...
Ae Alla on Coweta (thon... AD. Mp2 8 Aten
Be PB oo WD... SMO... OKI GAB EE... he Inbb bog
Boo Me $$ ea BERD AIO PRY. AM. ae io)
Bis
Scanned with CamScanner(b) The an gallery also uses a firewall,
Six statements are given about firewalls.
Tick (¥) to show if the statement is True or False,
Statement oy tee
Firewalls are only available as hardware devices v
Firewalls allow a user to set rules for network trafic Y~
Firewalls will automatically stop all malicious tratfic a
Firewalls only examine tratic entering a network 4
Firewalls encrypt all data that is transmitted around a network cd
Firewalls can be used to block access to certain websites Vv
{6
(c) The art gallery is concerned about computer ethics relating to its website,
Explain what is meant by computer ethics and why the art gallery is concerned about
computer ethics.
He Co Bade PICS. AME oO Seek... Mines... ak.
Veg rlate. Pre. Se A COMPARE su
Re Oat BUM Y COS. ae “Msn DaSiovisn
Tore Salley. conth.. Me new. A0.. be
AEDS oo XBL ett BIN. AS... WMA ea,
{4
Scanned with CamScanner[4]
music company wants to send a new music file to many radio stations. it will send the music tle
the day before the release date so that the radio stations can slore the file ready for release.
‘The music company does not want the radio stations to be able to open the music flle until 09:00
on the release date.
Identity two security measures and describe how each measure can be used to make sure the
‘music file cannot be opened until the release date.
Security measure 1 .... Passwort.
Desorption... PasSirevh.... Sex MWStC. BC Medea Bh. AIA
re MAMAS 0... ACY,
EWP occcooennnnnnnnnninnnnssnsonne
Description ..