1. A library does not use encryption when data is transmitted through the network.
Give two reasons why the library should use encryption
[2]
Login to save your answers
π Mark Scheme:
1 mark each to max 2 e.g.
β’ Data cannot be understood if intercepted // The
data will be meaningless
β’ So that only authorised users can access the
confidential material // protect
confidential/personal/user/library data
β’ To follow legislation/DPA
/ 2
2. A software development company wants to protect their computer systems and data from
unauthorised access.
Identify two methods of physical security that the company could use to protect their
computer systems
[2]
Login to save your answers
π Mark Scheme:
1 mark each to max 2 e.g.
β’ Locks
β’ Keycard entry
β’ Biometric entry to room
β’ Passcode entry to room
β’ Alarms
β’ Security guards/team
β’ CCTV
/ 2
3. Identify and describe two software-based security methods that the company can use to protect their computer systems and data
[6]
Login to save your answers
π Mark Scheme:
1 mark for each name, 1 per bullet for matching to description to max 2 each. e.g.
β’ Anti-malware
o Scans for / identifies virus/spyware/malware
o Compares data to a database of malware
o Alerts user and requests action such as ..
o Quarantines/deletes virus/spyware/malware
o Stops the download of virus/spyware/malware
β’ Firewall
o Scans incoming and outgoing traffic
o Compares traffic to a criteria
o Blocks traffic that is unauthorised
o Blocks incoming/outgoing traffic
β’ Encryption
o Scrambles data
o β¦using an algorithm
o So if intercepted it cannot be understood
o Key needed to decrypt
β’ User access levels
o Data can be read/write/ read-write // by example
o Prevents accidental changes
o Limits data users can access
β’ Anti-virus
6 Mark method first. If method
is wrong, do not read on. If
method is unclear, or part of
a description of a method,
read full answer.
If second method is a repeat
of the first (for example
password and then locking
out) mark whole answer for
max 3.
J277/01 Mark Scheme June 2022
o Scans for / identifies virus/malware
o Compares data to a database of viruses/malware
o Alerts user and requests action such as ..
o Quarantines/deletes virus/spyware
o Stops the download of virus/malware
β’ Anti-spyware
o Scans for / identifies spyware / keylogger
o Compares data to a database of spyware
o Alerts user and requests action such as ..
o Quarantines/deletes spyware
o Stops the download of spyware/malware
β’ Passwords/biometrics/authentication
o code/fingerprint etc. has to be correctly entered to gain access
o strong password // letters, numbers, symbols // fingerprint is unique to
individual β¦
o harder/impossible for a brute-force attack to succeed
o lock after set number of failed attempts
β’ Two-step authentication
o a code is sent to user's separate device
o unauthorised person will need access to this device as well
/ 6
4. Tick one or more boxes on each row to identify all of the methods that can help to
prevent each threat.
[4]
Threat
Anti-Malware
Penetration Testing
Encryption
Firewall
Spyware
Brute-force attack
Data Interception
SQL Injection
π Mark Scheme:
/ 4
5. Apart from spyware, brute-force, data interception and SQL injection - name and describe one threat to a computer system.
[3]
Login to save your answers
π Mark Scheme:
1 mark for threat 1 mark each to max 2 for description e.g.
β’ Threat: Social engineering
β’ Using deception to manipulate users
β’ β¦to gain personal data
β’ Threat: Shoulder surfing (threat or expansion)
β’ Watching a person entering a password
β’ β¦and using it to access an account
β’ Threat: Phishing
β’ Fake emails sent to person // click on link from fake email
β’ Person sends personal data // gives away personal data
β’ Threat: Pharming
β’ Software that redirects user to fake website // use of a fake website
β’ Person enters personal data // gives away personal data
β’ Threat: Denial of service // DOS // DDOS
β’ Multiple requests sent to a server (simultaneously) // server is flooded with requests
β’ More requests than the server can process // uses all of the bandwidth available
β’ Server cannot respond // server crashes/denies access // stops access to a network //
slows access to a network
β’ Threat: Hacker
β’ Person gaining unauthorised access to a system/account
To delete/damage/access data
β’ Threat: Virus/malware
β’ Software that replicates/spreads
β’ Fills disk space
β’ Deletes/corrupts data // allows unauthorised access
β’ Threat: Trojan
β’ Malware disguised as legitimate software
β’ Once installed acts as a virus // by example of action e.g. deleting files / allows
unauthorised access
β’ Threat: Worm
β’ Software that replicates across a network
β’ Uses up all the bandwidth
β’ Threat: Ransomware
β’ Encrypts/corrupts/locks access to data
β’ Cannot access data without paying a fee/money // pay fee/money to get them
back/decrypted // Cannot access data without meeting demands
β’ Threat: Physical threat // by example
β’ Damage to hardware
β’ Deletes/corrupts data