You are on page 1of 17
cs OL Assignment #6 Eng. Maged Wageeh Student Name: Nooeien — wig Sook School: fi tl Year: \2 Marks: / 100 Percentage: Grade (9-1 Grading Scheme): Scanned with CamScanner [1] Arya regularly uses the Intemet as a research tool for her school projects. Identity and describe three risks to Arya’s computer when she is using the Internet for research Risk 1... MatiKing, fs _ . an Description .. Teen OL: Bai INGA BCLS le CORRAL oo SYS AARON te MNES Machel iny.. ASE. MOA oo ABS AOA BEY. thet: Risk 2..... Wis. : . — . Description... P@Sieat.. trad. eobiaheh... S45ELE WAR Aha. Fb oP hede tag... 0. Covdabtis ENS. ov... Qrk, the... Comnbutey. tea. Cxash - Risk 3... SPY Wave... Decenption..A... Sead... ARM... Shad... ferreaay bY Wondtol nd... Key _ dated Scanned with CamScanner [2] {@) Lola is concerned about the risks to her computer when using the internet, She wants to use some security methods to help protect her ‘computer from the risks. \centity a security method she could use for each of the following risks. Each security method must be different Describe how each security method will help protect Lola's computer (Computer virus Security method... MSA IAS... AMT MAS un SOP Hane, Description . Ati es... Thee. aa Vis... Slaas... Pee NEB. Go MNOS and. Peder... Ahem ad AORCOK8 oo DAN pele BAG oo bade Sha S Bra aM EE Bbw Mo AS a Ackected: (ii) Hacking Security method .. USe.....0f. Riratalt Dewrtet ndBenutck..\eveniiees....sille “Cami inde and. Bert OF cou Abe CDM HON ses HT lol hbo ABC tak. ABM Meet. Pree oo ONPEMIBS sce a (iii) Spyware security method .. WMSalling,.. ant! -SPYHe....... SAH WAYE Description DAT... Sea $... Aree... Qoinflot aL... Ae... SPY ave. nd. VemVeS.....aAY..... Spy... founds... dat..Gr, PM. AP... Aptraare..Fte eins... dotdsloaded a) Scanned with CamScanner (b) Lola is also concerned that the data she st cl Lola is also co tores could be subject to accidental damage or (0) State three ways thatthe data Lola stores could be accidentally damaged or accidentally st ee 2. Physica... damage. 3 vnnblewdudaré,... ad lure iS) (ii) Give two methods that Lola could use to help keep her data safe from accidental damage or accidental loss. 1 MSA ACK ADS ch MeCN edte..3. COSC AO HB ANS ocoon MOE ; : BS Ml RANE Oe AGMA, ABRSIE COS ees Ree a SO PAW OE. MSIE 00s a Scanned with CamScanner [3] An art gallery has a website that is used to display and sell art. (a) The gallery uses Secure Socket Layer (SSL) to provide a secure connection when selling ant. Describe the process of SSL and how it provides a secure connection. Thee MS Wldo.. Wowie. Sea... domes. Sa.. ‘hak. OM on A GAN MPR atthe MeN... deste... adhich Bg Bete. la¥.. SSL# Ye Tee MOD INS Meet ARE AN ba... Soot Membres... Arse? - — Fa Mee WE. ANI. Se Be CON 08. 3%S $8 Lo AN MASE oo WLC bbb Fe TER Ane MO Va lt. GAs Bla te ogee SSL ite OS en POEISIY C0 OAM ADO tthe alee... Ae Alla on Coweta (thon... AD. Mp2 8 Aten Be PB oo WD... SMO... OKI GAB EE... he Inbb bog Boo Me $$ ea BERD AIO PRY. AM. ae io) Bis Scanned with CamScanner (b) The an gallery also uses a firewall, Six statements are given about firewalls. Tick (¥) to show if the statement is True or False, Statement oy tee Firewalls are only available as hardware devices v Firewalls allow a user to set rules for network trafic Y~ Firewalls will automatically stop all malicious tratfic a Firewalls only examine tratic entering a network 4 Firewalls encrypt all data that is transmitted around a network cd Firewalls can be used to block access to certain websites Vv {6 (c) The art gallery is concerned about computer ethics relating to its website, Explain what is meant by computer ethics and why the art gallery is concerned about computer ethics. He Co Bade PICS. AME oO Seek... Mines... ak. Veg rlate. Pre. Se A COMPARE su Re Oat BUM Y COS. ae “Msn DaSiovisn Tore Salley. conth.. Me new. A0.. be AEDS oo XBL ett BIN. AS... WMA ea, {4 Scanned with CamScanner [4] music company wants to send a new music file to many radio stations. it will send the music tle the day before the release date so that the radio stations can slore the file ready for release. ‘The music company does not want the radio stations to be able to open the music flle until 09:00 on the release date. Identity two security measures and describe how each measure can be used to make sure the ‘music file cannot be opened until the release date. Security measure 1 .... Passwort. Desorption... PasSirevh.... Sex MWStC. BC Medea Bh. AIA re MAMAS 0... ACY, EWP occcooennnnnnnnnninnnnssnsonne Description ..

You might also like